Patent classifications
G06F2221/2101
Systems and methods for providing access to wireless gaming devices
Systems and methods for controlling access to wireless gaming devices and networks are provided. For example, access is controlled through one or more levels of security check, such as a hard security check instead of or in addition to a soft security check. In a hard security check, the user employs an apparatus such as a card or other physical token that can be used to access the wireless gaming device. Such an apparatus may communicate information that identifies the user to the device or may simply be used to produce a signal without which the device is locked to users.
Enforcing trusted application settings for shared code libraries
Access to a shared library API is restricted for a customer application by a security system. A profile for each of a plurality of trusted applications is generated and stored in a security database. When a customer application attempts to access the shared library API, the customer application is verified by extracting a customer application profile for the customer application, comparing the customer application profile with each stored trusted application profile, and verifying that the customer application can access the shared library API based on the comparison. Based on the verification, the customer application may be allowed to or access to the shared library API or may be prevented from accessing the shared library API.
Digital safety and account discovery
Methods, computer-readable media, software, and apparatuses may assist a consumer in keeping track of a consumer's accounts in order to prevent unauthorized access or use of the consumer's identified subscriptions and financial accounts. The identified subscriptions and financial accounts may be displayed to the consumer along with recommendations and assistance for closing unused or unwanted financial accounts and subscriptions to prevent unauthorized access or use.
Data management platform
Techniques are disclosed relating to the management of data. A data provider computer system may store particular data of a user. The data provider computer system may commence sharing of a portion of the particular data with a data consumer computer system. The data provider computer system may continue sharing additional portions of the particular data with the data consumer computer system in response to receiving a report from a verification environment indicating that the particular data is being utilized by the data consumer computer system in accordance with a specified usage policy.
Technologies for scalable security architecture of virtualized networks
Technologies for performing security monitoring services of a network functions virtualization (NFV) security architecture that includes an NVF security services controller and one or more NFV security services agents. The NFV security services controller is configured to transmit a security monitoring policy to the NFV security services agents and enforce the security monitoring policy at the NFV security services agents. The NFV security services agents are configured to monitor telemetry data and package at least a portion of the telemetry for transmission to an NFV security monitoring analytics system of the NFV security architecture for security threat analysis. Other embodiments are described and claimed.
Information processing apparatus, information processing method, and non-transitory computer readable medium
An information processing apparatus includes an extraction unit and a generation unit. The extraction unit extracts a common topic from profiles of plural users. The generation unit generates a community including users who are associated with the topic extracted by the extraction unit.
Automated compliance and testing framework for software development
A system for enforcing compliance and testing for software development, comprising an indexing service configured to create a dataset by processing and indexing source code of a project by a developer, perform a code audit on the indexed source code, store results from the code audit in the dataset, gather additional information relating to the provided project, store the additional information in the dataset, and store the dataset into memory; and a monitoring service configured to continuously monitor the project for source code changes and make changes to the dataset as needed. Further comprising an enforcement module to automatically verify code and other media related to the software development process by ensuring obligations from a rules database are met and where not able to automate the compliance check forward to an appropriate authority, receive back the manually reviewed compliance check, then produce and implement automated recommendations for compliance adherence.
System for event detection, data integration, and data visualization
A system includes one or more data sources. Each data source is configured to collect and store event data. An event bus is configured to monitor the event data of the one or more data sources. The event bus determines that a first portion of the monitored event data satisfies a first task criteria. The first portion of the monitored event data is associated with a first tag that corresponds to the first task. The event bus determines that a second portion of the monitored event data satisfies a second task criteria. The second portion of the monitored event data is associated with a second tag corresponding to the second task. The first portion of the monitored event data with the first tag and the second portion of the monitored event data with the second tag are provided for storage in a data lake.
Methods for verifying database query results and devices thereof
Methods, non-transitory computer readable media, and query verification apparatuses are disclosed that receive data, store the data into a table of a database, and receive a query that is associated with the database table. A query plan and a query result are generated for the query, one or more partial proofs are generated from one or more commitments, and an overall proof is generated from the one or more partial proofs. Each of the one or more partial proofs is associated with at least one node of the query plan in some examples, which can include a directed acyclic graph. The overall proof is returned along with the query result in response to the query to facilitate verification of the query result. One or more GPUs are configured to generate the one or more commitments in some examples to thereby accelerate the verification process and improve database scalability.
Systems and methods of secure provenance for distributed transaction databases
An electronic resource tracking and storage computer system is provided that communicates with a distributed blockchain computing system that includes multiple computing nodes. The system includes a storage system, a transceiver, and a processing system. The storage system includes an resource repository and transaction repository that stores submitted blockchain transactions. A new resource issuance request is received, and a new resource is added to the resource repository in response. A new blockchain transaction is generated and published to the blockchain. In correspondence with publishing to the blockchain, the transaction storage is updated with information that makes up the blockchain transaction and some information that was not included as part of the blockchain transaction. The transaction storage is updated when the blockchain is determined to have validated the previously submitted blockchain transaction.