Patent classifications
G06F2221/2135
Detecting Separate Login During Action Based Knowledge-Based Authentication and Disqualifying Validity
Aspects described herein may relate to techniques for detecting login activity to a financial account during a knowledge-based authentication process. The login activity may be related to access to an online interface for the financial account. The detection of login activity during the authentication process my indicate that the integrity of the authentication process is compromised as login access may provide an individual with transaction data that may be used to answer transaction-based authentication questions. As a result of detecting login activity, an alternative authentication process may be initiated or an authentication request related to the financial account may be denied.
Map output device, map output system, and computer-readable storage medium including program
A map output device is provided for preventing a storage medium from being sharedly used. The map output device comprises a connection unit; an output unit that outputs map data; and a control unit. The control unit is configured, when a storage medium is connected to the connection unit or when a movable body is used beyond a predetermined usage amount, to write a file containing information on a unique value related to the movable body into the storage medium connected to the connection unit, and to output, to the output unit, the map data read from the storage medium.
COMMUNICATION ASSET USAGE METRICS
Examples disclosed herein relate to tracking a usage metric for each of a plurality of communication assets, determining whether the usage metric fails to meet a threshold for each of the plurality of communication assets, and in response to determining that the usage metric fails to meet the threshold for at least one of the plurality of communication assets, causing the at least one of the plurality of communication assets to be disabled.
Methods for managing verification and validation of third-party code and devices thereof
The disclosed technology relates to receiving an executable function from a client device, wherein the executable function is to be executed on a function as a service (FaaS) platform. Upon performing a verification and validation process on the received executable function prior to runtime, it is determined when to execute the received executable function based on based on one or more execution initiation techniques upon performing. The verified and validated executable function is executed at the runtime on the FaaS platform based on the determination.
ENTERPRISE KNOWLEDGE ASSISTANT WITH PERMISSIONS-AWARE AUTOMATED RESPONSES
Methods and apparatuses for providing a real-time enterprise knowledge assistant that automatically responds to user comments and questions via a graphical user interface are described. The enterprise knowledge assistant may display automated responses to questions provided by users within a persistent chat channel (or other communications channel). The information displayed or referenced (e.g., via a linked electronic document) within an automated response to a user's factual question may be determined based on access rights to linked documents and the number of electronic interactions between users, such as the number of times that users co-edited or collaborated on documents (e.g., programming code). Upon detection that at least a portion of a user's message within a chat channel has been classified as a factual question, the enterprise knowledge assistant may access question and answer pairings stored within a frequently asked questions database and display an authorized answer.
Determining validity of subscription to use digital content
Some embodiments provide a method for determining whether a subscription for using digital content on a user device has elapsed. The method compares a first collision free image of a first set of entities in the user device with a second collision free image for a second set of entities in the user device at a second instance in time. Based on the comparison, the method determines whether the subscription has elapsed.
Information processing device, information processing method, and storage medium
An information processing device includes a memory; and a processor coupled to the memory and configured to transmit, to a terminal, a program and a first identifier related to the program, the program being encrypted with a first public key corresponding to a first private key of the terminal, the first identifier being encrypted by using the first public key and a second public key not corresponding to the first private key; and when the terminal receives the first identifier decrypted by the first public key and encrypted by the second public key, register, in a blockchain, transaction information which includes the first identifier decrypted with the second private key corresponding to the second public key.
Fuse based replay protection with conservative fuse usage
A TPM is implemented in an SOC for thwarting PIN state replay attacks. Programmable fuses are used as a counter and an on-die RAM stores a blown-fuse count and a TPM state that includes a PIN-failure count and a fuse count. TPM initialization includes incrementing the TPM state PIN-failure count if the blown-fuse count is greater than the TPM state fuse count. Once a PIN is received, if the TPM state PIN-failure count satisfies a PIN failure policy and the PIN is correct, the TPM state PIN-failure count is cleared, and if the PIN is incorrect, a fuse is blown and the blown-fuse count is incremented. If the fuse blow fails, TPM activity is halted. If the fuse blow succeeds, the TPM state PIN-failure count is incremented and the TPM state fuse count is set equal to the blown-fuse count. The TPM state is saved to off-die non-volatile memory.
Methods and apparatus to collect distributed user information for media impressions and search terms
Disclosed examples include accessing impression data collected at a media device by a collector installed with an application, the impression data including a first identifier, a second identifier, and a media identifier, the first identifier to identify at least one of the media device or a user of the media device to a first database proprietor, and the second identifier to identify the at least one of the media device or the user of the media device to a second database proprietor, the collector to obtain the first and second identifiers from a memory of the media device; requesting first demographic information from the first database proprietor based on the first identifier and second demographic information from the second database proprietor based on the second identifier; and storing at least some of the first or second demographic information in association with the media identifier in a data store.
SUBJECT LOGGING
The present application discloses a method, system, and computer system for monitoring tasks with respect to information stored in a database system. The method includes receiving a request to execute a task with respect to a database, wherein the request is associated with an identifier corresponding to a user that inputs a query for the request; determining whether the task is authorized for the user; in response to a determination that the task is authorized for the user, obtaining a set of information that is to be returned for the task; determining a subset of the set of information, wherein the subset of the set of information comprises one or more parts of the set of information for which the user has access permission; and storing a record of the request to execute the task, wherein the record comprises an indication of the user, and an indication of subset of the set of information.