Patent classifications
G06F2221/2113
MULTIFACTOR AUTHORIZATION ON ACCESSING HARDWARE RESOURCES
In an approach for multifactor authorization on hardware calls of resources, a processor receives a request for a hardware resource from a plurality of hardware resources being monitored. A processor calculates a risk level associated with the hardware resource of the request based on a respective risk level data repository. A processor, in response to a determination the risk level requires multifactor authorization, determines that a user associated with the request is logged in. A processor identifies a mechanism used by the user to log in. A processor determines whether a challenge associated with the multifactor authorization based on the mechanism is successful. A processor, in response to a determination the challenge associated with the multifactor authorization is successful, enables access to the hardware resource of the request.
Access Control Using User Behavior Profile and Storage System-Based Multi-Factor Authentication
Techniques are provided for access control using user behavior profiles and storage system-based multi-factor authentication. One method comprises obtaining a behavior profile for a user; obtaining an input/output request from the user; determining whether the input/output request exhibits anomalous user behavior relative to the behavior profile; initiating a multi-factor authentication of the user in response to the input/output request exhibiting anomalous user behavior to obtain a verification result; and processing the input/output request based at least in part on the verification result. The behavior profile for the user may be obtained by obtaining behavioral information from the user and/or monitoring a plurality of input/output requests of the user to learn at least a portion of the behavior profile for the user. The multi-factor authentication may comprise an out-of-band authorization request (e.g., to approve the input/output request) sent to a user associated with the input/output request.
CREDENTIALS MANAGEMENT AND USAGE IN APPLICATION MODERNIZATION
Credentials management and usage in application modernization can be implemented as computer-readable methods, media and systems. A notification identifying an application modernization operation is received. The operation is to be performed on an application deployed by multiple resources arranged in multiple hierarchical levels. A resource residing at a hierarchical level of the multiple hierarchical levels is identified. The application modernization operation is to be performed on the identified resource which has a resource type. A search for a credential is performed. The credential grants access to the resource to enable performing the application modernization operation. In response to the searching, a credential included in the multiple credentials is identified. The identified credential grants access either to the resource or to resources of the resource type. In response to receiving the notification, the identified credential is provided.
Support for multi-type users in a single-type computing system
Persistent storage contains a parent table and one or more child tables, the parent table containing: a class field specifying types, and one or more filter fields. One or more processors may: receive a first request to read first information of a first type for a first entity; determine that, in a first entry of the parent table for the first entity, the first type is specified in the class field; obtain the first information from a child table associated with the first type; receive a second request to read second information of a second type for a second entity; determine that, in a second entry of the parent table for the second entity, the second type is indicated as present by a filter field that is associated with the second type; and obtain the second information from a set of additional fields in the second entry.
System and method for providing user accounts through which users are able to operate computing devices
A smart phone (101) for providing a user account (102) through which a user (103) is able to operate phone (101). The phone (101) includes onboard memory module (104) for storing at least first data records (105). Phone (101) also includes a user interface (106) for receiving input from the user. A processor (107) is responsive to interface (106) receiving a first predetermined input from user (103) for initiating a first authorised session (108) to account (102), and allowing user (103) to access account (102) and discover records (105). Processor (107) is also responsive to interface (106) receiving a second predetermined input from user (103) during session (108) for controlling interface (106) to seek a third input from user (103) to indicate an identifier for a hidden second authorised session (109). Interface (106) does not reveal to user (103) the pre-existence or otherwise of session (109) or any other like session. Processor (107) is also responsive to the third input not corresponding with the identifier for not revealing to user (103) if session (109) or any such other session exists.
Electronic device for displaying information and method thereof
An electronic device is provided. The electronic device includes a display configured to display information, an input device configured to receive a user input, an image sensor, a processor electrically connected with the display, the input device, and the image sensor, and a non-transitory computer readable storage medium electrically connected with the processor that stores instructions that cause the processor to control the display to display first-level information as a locking mode is partially released when partial authentication passes based on bio-information acquired through the image sensor in a state in which the electronic device is in the locking mode, and control the display to display second-level information having a security level higher than a security level of the first-level information as the locking mode is fully released when full authentication passes based on a user input made through the input device.
INFORMATION PROCESSING APPARATUS, INFORMATION PROCESSING SYSTEM, AND NON-TRANSITORY COMPUTER READABLE MEDIUM
An information processing apparatus includes a processor configured to: segment, into multiple voice segments, voice data and text data converted from the voice data; impart a security level to each of the voice segments in accordance with contents of the text data and the voice data in each of the voice segments; and perform control on an output of each of the voice segments in accordance with the security level.
IMAGE FORMING APPARATUS
An image forming apparatus includes a usage frequency determining unit and a security level managing unit. The usage frequency determining unit is configured to determine usage frequencies of respective time zones on the basis of an access log of users to this image forming apparatus. The security level managing unit is configured to determine security levels of the respective time zones on the basis of the usage frequencies, and automatically set the determined security level of each of the time zones when the time zone comes. Further, the security level managing unit sets the higher security level for the lower usage frequency.
SYSTEMS AND METHODS FOR INTERACTIVE CHATBOT AUTHENTICATION OF USERS
A computing system for authenticating users utilizing an interactive chatbot is provided. The computing system includes a processor in communication with a memory, and the processor programmed to: (i) receive an authorization request message for a transaction initiated by a user, wherein the authorization request message includes transaction data, (ii) retrieve user data associated with the user, (iii) determine, based upon the transaction data and the user data, a risk associated with the transaction, (iv) generate, based upon the risk associated with the transaction, one or more prompts for the user, (v) transmit, via the interactive chatbot, the one or more prompts to the user, (vi) receive user input in response to the one or more prompts, and (vii) embed an authentication indicator into the authorization request message, wherein the authentication indicator indicates whether the user is authenticated based upon the user input.
Policy controlled remote operating system (OS) authorization based on automatically entered administrative credential
An automatically predetermined credential system for a remote administrative operating system (OS) authorization and policy control is disclosed. Administrative activities are packaged in single-use downloaded software program. When executed, the administrative access to the OS is activated before completing the administrative activities. The single-use downloaded software program has policies that performs checks on a user computer executing the software program. The policies include checking firewall settings, confirming virus checking, interrogating software to confirm patches or updates have been performed, checking for key loggers or other surveillance software or devices The single-use downloaded software is protected with a passcode to prevent activation in an unauthorized way.