G06F21/44

Management of access credentials

Various embodiments include computing devices and methods for management of access credentials. A processor of a computing device may receive an authentication request from a client application support service to authenticate a client application. The processor may send a response comprising an authentication token to the client application support service. The processor may receive from the client application support service a request for an access token to access a target system. The processor may send a response comprising the access token to the client application support service to enable the client application support service to access the target system using the access token on behalf of the client application.

Technologies for providing shared memory for accelerator sleds

Technologies for providing shared memory for accelerator sleds includes an accelerator sled to receive, with a memory controller, a memory access request from an accelerator device to access a region of memory. The request is to identify the region of memory with a logical address. Additionally, the accelerator sled is to determine from a map of logical addresses and associated physical address, the physical address associated with the region of memory. In addition, the accelerator sled is to route the memory access request to a memory device associated with the determined physical address.

INFORMATION PROCESSING APPARATUS AND INFORMATION PROCESSING METHOD, AUTHENTICATION DEVICE AND AUTHENTICATION METHOD, AUTHENTICATION SYSTEM, AUTHENTICATION METHOD IN AUTHENTICATION SYSTEM, AND COMPUTER PROGRAM
20230043031 · 2023-02-09 ·

An information processing apparatus that performs multifactor and multistage authentication procedures is to be provided. An information processing apparatus includes: an authentication procedure processing unit that performs an authentication procedure on an external device, using a tamper-resistant secure element; and a control unit that controls a process for multistage authentication of the external device, the multistage authentication including the authentication procedure. The control unit controls a process of a second authentication procedure using the identification information about the secure element, the identification information being associated with the user account information. The control unit controls execution of the second authentication procedure during an operation in the login authentication procedure.

TECHNOLOGIES FOR SECURE PHYSICAL ADDRESS ALIAS MAINTENANCE AND USAGE
20230038570 · 2023-02-09 ·

Technologies for physical address aliasing include an alias server, an owner device, and a consumer device in communication over a network. The owner device submits an alias identifier and a physical address to the alias server. The alias server associates the alias identifier and the physical address in a secure address database. The alias identifier may be a human-readable unique identifier. The consumer device submits a request including the alias identifier to the alias server. The alias server authenticates the consumer device, retrieves the physical address associated with the alias identifier, and sends a response based on the physical address to the consumer device. The response may be generated based on an access role associated with the consumer device. The response may include the physical address, a lower-resolution address based on the physical address, or confirmation of validity of the alias identifier. Other embodiments are described and claimed.

TECHNOLOGIES FOR SECURE PHYSICAL ADDRESS ALIAS MAINTENANCE AND USAGE
20230038570 · 2023-02-09 ·

Technologies for physical address aliasing include an alias server, an owner device, and a consumer device in communication over a network. The owner device submits an alias identifier and a physical address to the alias server. The alias server associates the alias identifier and the physical address in a secure address database. The alias identifier may be a human-readable unique identifier. The consumer device submits a request including the alias identifier to the alias server. The alias server authenticates the consumer device, retrieves the physical address associated with the alias identifier, and sends a response based on the physical address to the consumer device. The response may be generated based on an access role associated with the consumer device. The response may include the physical address, a lower-resolution address based on the physical address, or confirmation of validity of the alias identifier. Other embodiments are described and claimed.

DETERMINING ELECTRONIC COMPONENT AUTHENTICITY VIA ELECTRONIC SIGNAL SIGNATURE MEASUREMENT

Examples of determining electronic component authenticity via electronic signal signature measurement are discussed. Reference pin identifiers corresponding to pins of a known authentic electronic component are determined. Measurement values corresponding to characteristics of pins of an electronic component are obtained, and pin identifiers based on the measurement values are generated. Accordingly, an indication that the electronic component is authentic can be provided based at least in part on a comparison of the pin identifiers and the reference pin identifiers.

DETERMINING ELECTRONIC COMPONENT AUTHENTICITY VIA ELECTRONIC SIGNAL SIGNATURE MEASUREMENT

Examples of determining electronic component authenticity via electronic signal signature measurement are discussed. Reference pin identifiers corresponding to pins of a known authentic electronic component are determined. Measurement values corresponding to characteristics of pins of an electronic component are obtained, and pin identifiers based on the measurement values are generated. Accordingly, an indication that the electronic component is authentic can be provided based at least in part on a comparison of the pin identifiers and the reference pin identifiers.

SYSTEMS AND METHODS FOR PROVIDING ONLINE SECURITY
20230043208 · 2023-02-09 ·

A method for providing online security may include: (1) receiving, by a validation computer program executed by a trusted entity backend for a trusted entity, a call from a web browser executed on a customer electronic device browsing a webpage for an online entity, the call comprising an online entity identifier for the online entity and a session identifier, wherein the webpage for the online entity may include a hidden <iframe> comprising code that causes the web browser to execute the call; (2) confirming, by the validation computer program, that a cookie for the trusted entity may be stored on the customer electronic device; and (3) returning, by the validation computer program, a first value indicating that the customer electronic device is known to the trusted entity or a second value indicating that the customer electronic device is not known to the trusted entity based on the confirmation.

CUSTOMIZATION OF MULTI-PART METADATA OF A SECURE GUEST
20230037746 · 2023-02-09 ·

A trusted execution environment obtains a secure guest image and metadata to be used to start a secure guest. The metadata includes multiple parts and a plurality of integrity measures. A first part of the metadata includes one or more integrity measures of the plurality of integrity measures, and a second part of the metadata includes customized confidential data of the secure guest and one or more other integrity measures of the plurality of integrity measures. The trusted execution environment is used to verify at least one select part of the metadata using at least one integrity measure of the plurality of integrity measures of the metadata. Based on successful verification of the at least one select part of the metadata, the trusted execution environment starts the secure guest using the secure guest image and at least a portion of the metadata.

CUSTOMIZATION OF MULTI-PART METADATA OF A SECURE GUEST
20230037746 · 2023-02-09 ·

A trusted execution environment obtains a secure guest image and metadata to be used to start a secure guest. The metadata includes multiple parts and a plurality of integrity measures. A first part of the metadata includes one or more integrity measures of the plurality of integrity measures, and a second part of the metadata includes customized confidential data of the secure guest and one or more other integrity measures of the plurality of integrity measures. The trusted execution environment is used to verify at least one select part of the metadata using at least one integrity measure of the plurality of integrity measures of the metadata. Based on successful verification of the at least one select part of the metadata, the trusted execution environment starts the secure guest using the secure guest image and at least a portion of the metadata.