G06F21/31

System for evaluation and weighting of resource usage activity

Embodiments of the present invention provide systems and methods for evaluating and weighting resource usage activity data. The system may establish a communicable link to a user device via a user application to receive resource activity data and historical data from one or more users or systems via multiple communication channels. The system may evaluate the historical data and determine evaluation criteria based on perceived chance of loss associated with particular metadata characteristics, and use the evaluation criteria as weighted metrics for determining an overall evaluation score for the user based on indication from resource activity data that the user has conducted resource transfers with entities or channels identified in the historical data.

System for evaluation and weighting of resource usage activity

Embodiments of the present invention provide systems and methods for evaluating and weighting resource usage activity data. The system may establish a communicable link to a user device via a user application to receive resource activity data and historical data from one or more users or systems via multiple communication channels. The system may evaluate the historical data and determine evaluation criteria based on perceived chance of loss associated with particular metadata characteristics, and use the evaluation criteria as weighted metrics for determining an overall evaluation score for the user based on indication from resource activity data that the user has conducted resource transfers with entities or channels identified in the historical data.

Information processing apparatus and non-transitory computer readable medium storing information processing program

An information processing apparatus includes an access controller that performs control for enabling a content to be accessed on a second terminal in a case where an icon storing the content is presented and the content is opened in a first terminal.

Information processing apparatus and non-transitory computer readable medium storing information processing program

An information processing apparatus includes an access controller that performs control for enabling a content to be accessed on a second terminal in a case where an icon storing the content is presented and the content is opened in a first terminal.

Multidimensional attribute authentication

A user requesting authentication is presented a keypad that includes multiple keys and respective keys include a character that is associated with a shape. Responsive to selection of a key, a first set of attributes is activated for selection. Responsive to determining a selection of an attribute from the first set of attributes, activating one or more additional sets of attributes associated with the first key. Responsive to determining a selection from the one or more additional sets of attributes, determining whether a selection of an additional key is made. Responsive to determining the selection of the additional key, activating for selection a first set of attributes and one or more additional sets of attributes of the additional key, and responsive to determining selections of keys and corresponding attributes associated with the selection of respective keys, determining the validity of the authentication code.

Multidimensional attribute authentication

A user requesting authentication is presented a keypad that includes multiple keys and respective keys include a character that is associated with a shape. Responsive to selection of a key, a first set of attributes is activated for selection. Responsive to determining a selection of an attribute from the first set of attributes, activating one or more additional sets of attributes associated with the first key. Responsive to determining a selection from the one or more additional sets of attributes, determining whether a selection of an additional key is made. Responsive to determining the selection of the additional key, activating for selection a first set of attributes and one or more additional sets of attributes of the additional key, and responsive to determining selections of keys and corresponding attributes associated with the selection of respective keys, determining the validity of the authentication code.

Method, apparatus, and computer readable medium

A method includes creating a package of an application, registering the package with an orchestrator, triggering instantiation of the application in the orchestrator, generating initial configuration files for the instantiation of the application, changing an application state of the application to a planned state, changing the application state to a Keycloak state in response to obtaining client identification of the Keycloak information for the application, changing the application state to an instantiated state in response to deploying the application on the set of target servers, changing the application state to a configured state in response applying daily configuration files to perform daily configuration of the application in the set of target servers, and changing the application state to a monitored state in response to monitoring the application in the set of target servers by an observability framework tool.

Software safety-locked controls to prevent inadvertent selection of user interface elements

A method includes displaying a user interface having a first region with one or more user interface elements and determining whether a shield is in a locked state or an unlocked state. The shield covers the first region when in the locked state and uncovers at least part of the first region when in the unlocked state. The method includes, in response to determining that the shield is in the locked state, displaying the shield covering the first region and disabling the user interface element(s). The method includes, in response to receiving user input on the shield while the shield is in the locked state, changing the shield to the unlocked state. Additionally, the method includes, in response to determining that the shield is in the unlocked state, displaying the first region such that the user interface element(s) is/are not covered by the shield and enabling the user interface element(s).

ADAPTIVE, MULTI-CHANNEL, EMBEDDED APPLICATION PROGRAMMING INTERFACE (API)

A mobile device configured for communication with a multi-channel, operating-system (OS)-agnostic application programming interface (API) is provided. The API is configured to provide generic access to an OS-agnostic-device API output. The API may be coupled to a library of user credentials, and a library of data. The data provides information for one or more responses to a request from the user. The device may include an OS-based application and a translator. The translator translates communications between the OS-based application and said OS-agnostic API. The translator may convert an OS-compliant message header to a generic message header and to convert a generic message header to an OS-compliant message header. The OS-agnostic API may receive a communication initiation from the device. The device may be associated with a first channel. The API may request and receive 1) user credentials associated with the device and 2) data, authenticate the user credentials, and pull the data.

ADAPTIVE, MULTI-CHANNEL, EMBEDDED APPLICATION PROGRAMMING INTERFACE (API)

A mobile device configured for communication with a multi-channel, operating-system (OS)-agnostic application programming interface (API) is provided. The API is configured to provide generic access to an OS-agnostic-device API output. The API may be coupled to a library of user credentials, and a library of data. The data provides information for one or more responses to a request from the user. The device may include an OS-based application and a translator. The translator translates communications between the OS-based application and said OS-agnostic API. The translator may convert an OS-compliant message header to a generic message header and to convert a generic message header to an OS-compliant message header. The OS-agnostic API may receive a communication initiation from the device. The device may be associated with a first channel. The API may request and receive 1) user credentials associated with the device and 2) data, authenticate the user credentials, and pull the data.