G06F2221/2129

Identity-based application and file verification
11588646 · 2023-02-21 · ·

A system and method for establishing application identities including application runtime properties. A method includes signing at least one artifact of a first application communicating with a second application, wherein each of the at least one artifact includes data used for executing the first application, wherein a signing result of each artifact is a signed cryptographic hash of the artifact; monitoring events related to communications between the first application and the second application to identify a file event; generating at least one runtime hash for the file event, wherein the at least one runtime hash represents runtime properties of the first application; and generating an application identity for the first application, the application identity for the first application including the signed cryptographic hash of each of the at least one artifact and the at least one runtime hash of the file event.

Device provisioning using dedicated credential storage

A disclosed method for provisioning a computing device includes receiving, by provisioning software that executes on the computing device to provision the computing device for access to an enterprise infrastructure from a device orchestration service through which computing devices are provisioned to access the enterprise infrastructure, a digital certificate representing a credential for accessing, by a user via the computing device, the enterprise infrastructure. The method also includes storing, by the provisioning software, the digital certificate in dedicated secure credential storage on the computing device, receiving, by the provisioning software, a one-time-usable nonce value generated by the device orchestration service and usable by the provisioning software to unlock the digital certificate stored in the dedicated secure credential storage, unlocking the digital certificate, and presenting the digital certificate to the enterprise infrastructure to authorize access to the enterprise infrastructure by the user via the computing device.

Authentication apparatus for authenticating authentication target device
11494481 · 2022-11-08 · ·

Each of the authentication apparatus and the authentication target device holds the last piece of authentication information subjected to an authentication process. When the authentication target device is reconnected to the authentication apparatus, the authentication apparatus collates the authentication information held in the authentication apparatus with the authentication information read out of the authentication target device. The authentication apparatus determines, based on the collation result, whether or not the authentication target device has been authenticated by a different authentication apparatus.

Secure authentication system and method

Methods and systems pertaining secure transaction systems are disclosed. In one implementation, a merchant server payment information from a user computer. The merchant server can transmit a verification request to a gateway as well as receive a verification response from the gateway. The merchant server can transmit an authentication request and receive an authentication response. After receiving the authentication response, the merchant server can initiate an authorization process.

CHILD-FRIENDLY AUTHENTICATION

Systems and methods are provided for child-friendly authentication for autonomous vehicle rides. In particular, systems and methods are provided for offering alternative authentication methods that automatically engage child-friendly features. The systems and methods provided enable unsupervised children to take advantage of autonomous rideshare and delivery programs using child-friendly authentication methods. Additionally, augmented autonomous vehicle safety and security practices for children are provided.

SECURITY VERIFICATION METHOD, CONSUMABLE CHIP, AND CONSUMABLE
20230093184 · 2023-03-23 ·

The present disclosure provides a security verification method, a consumable chip, a consumable chipset, a consumable. The method includes obtaining a preset dynamic parameter configured to determine an authentication sequence; determining authentication sequence data corresponding to a plurality of authentication events according to the preset dynamic parameter; and executing at least one of the plurality of authentication events according to the authentication sequence data and feeding back an authentication result of at least one of the plurality of authentication events to the image forming apparatus. The authentication result is configured to determine whether a consumable corresponding to at least one of consumable chips in the consumable chipset satisfies a preset image forming requirement. The present disclosure effectively avoids the problem of damaging the image forming apparatus and affecting printing quality caused by the use of consumables provided by third parties that do not satisfy requirements.

METHODS AND SYSTEMS FOR SECURE AND RELIABLE IDENTITY-BASED COMPUTING

The embodiments herein provide a secure computing resource set identification, evaluation, and management arrangement, employing in various embodiments some or all of the following highly reliable identity related means to establish, register, publish and securely employ user computing arrangement resources in satisfaction of user set target contextual purposes. Systems and methods may include, as applicable, software and hardware implementations for Identity Firewalls; Awareness Managers; Contextual Purpose Firewall Frameworks for situationally germane resource usage related security, provisioning, isolation, constraining, and operational management; liveness biometric, and assiduous environmental, evaluation and authentication techniques; Repute systems and methods assertion and fact ecosphere; standardized and interoperable contextual purpose related expression systems and methods; purpose related computing arrangement resource and related information management systems and methods, including situational contextual identity management systems and methods; and/or the like.

SOURCE CODE VULNERABILITY SCANNING AND DETECTION SMART GLASSES
20220342998 · 2022-10-27 ·

Systems and methods for leveraging smart glasses for identifying vulnerabilities in application source code is provided. The smart glasses may be configured to scan the code from a user interface (“UI”) linked to an internal development platform and project the scanned code on a display of the smart glasses. Using deep learning, the smart glasses may be enabled to identify one or more vulnerabilities within the scanned application source code. The smart glasses may link a vulnerability classification code for each identified vulnerability. The smart glasses may generate a vulnerability report file including the scanned application source code, each identified vulnerability and its linked vulnerability classification code and transfer the vulnerability report file to a source code repository within the internal development platform. The scanned application source code may be matched to the original application source code and further separate the marched original application source code for assessment.

Logistics system, package delivery method, and program

Association means of a logistics system associates authentication information on a user with the package and storing the associated authentication information into a storage means; Instruction means instructs an unmanned aerial vehicle into which the package is to be loaded to move to the location, based on location information on a location of a collection destination or a delivery destination of the package. Arrival determination means determines whether the unmanned aerial vehicle has arrived at the location. Checking means checks whether the user is at the location based on the authentication information associated with the package and on a situation of the location detected by the unmanned aerial vehicle or details of communication to and from a terminal of the user. Movement control means moves the unmanned aerial vehicle toward the user at the location when the checking means confirms that the user is at the location.

Global identity for use in a hybrid cloud network architecture
11599623 · 2023-03-07 · ·

Global identity contexts are established for unique constituents to interact with a cloud architecture through a variety of relationships. The global identity context enables a particular constituent to access services from different cloud-service providers in a secure and simplified manner. Authenticating one account can provide access to services associated with other accounts linked to the global identity context for the authenticated account. In some embodiments, the global identity platform includes an account management application and an identity management application. The account management application is configured to register one or more accounts for each constituent. The identity management application is configured to perform individualization to establish an individual identifier for each unique constituent and map each account to a particular individual identifier and one or more local identifiers.