Patent classifications
G06F2221/2151
DETERMINING RESTING TIMES FOR MEMORY BLOCKS
Example implementations relate to determining resting times for memory blocks. In example implementations, accessed memory blocks in a cross-point non-volatile memory may be tracked. A respective resting time for each of the accessed memory blocks may be determined. An access command may be prevented from being issued to one of the accessed memory blocks.
Verification of service access in a communications system
There is provided mechanisms for verifying a log entry in a communications system. A method is performed by a host server. The method comprises obtaining a log entry of a service access tracker. The log entry indicates access to a service during a client session, the service being tracked by the service 5 access tracker. The method comprises providing the log entry to a trusted third party for digital signing thereof using a digital trusted timestamping scheme. The method comprises verifying that the log entry has been digitally signed by the trusted third party. The method comprises providing a new aggregate comprising the digitally signed log entry and a previous aggregate 10 of previously digitally signed and aggregated log entries to the trusted third party for digital signing thereof using the digital trusted timestamping scheme. The method comprises verifying that the new aggregate has been digitally signed by the trusted third party.
Executing modular alerts and associated security actions
Techniques and mechanisms are disclosed for configuring actions to be performed by a network security application in response to the detection of potential security incidents, and for causing a network security application to report on the performance of those actions. For example, users may use such a network security application to configure one or more “modular alerts.” As used herein, a modular alert generally represents a component of a network security application which enables users to specify security modular alert actions to be performed in response to the detection of defined triggering conditions, and which further enables tracking information related to the performance of modular alert actions and reporting on the performance of those actions.
Method of unlocking an electronic device based on motion recognitions, motion recognition unlocking system, and electronic device including the same
A method of unlocking an electronic device based on motion recognitions generates motion information by detecting a user's motion, calculates optical flows based on the motion information, converts the optical flows into a code by sorting and grouping the optical flows based on predetermined reference directions, generates a comparison result indicating whether the code is consistent with a predetermined password by comparing the code with the predetermined password, and determines whether to unlock the electronic device based on the comparison result.
ANALYSIS APPARATUS, ANALYSIS SYSTEM, ANALYSIS METHOD, AND ANALYSIS PROGRAM
An analysis apparatus analyzes access logs including authentication results and authentication information of users, and includes: a calculation unit that calculates a similarity between pieces of authentication information in two consecutive access logs when access logs of the same access source, from the access logs, are chronologically arranged, and presumes that a piece of authentication information of the access logs of the user has been input by a human if the calculated similarity is equal to or greater than a predetermined value; and a risk determination unit that determines that there is a possibility that the access source in the access logs is being an attack source if an authentication result of any of the two access logs is authentication failure and the calculation unit presumes that any piece of authentication information of the two access logs has not been input by a human.
Security checks for proxied requests
A method begins by a storage unit of a dispersed storage network (DSN) executing transitioning storage of one or more groups of encoded data slices. The method continues while transitioning storage of the one or more groups of encoded data slices with the storage unit receiving a proxied data access request regarding an encoded data slice from another storage unit of the DSN. The method continues by the storage unit determining whether the other storage unit is an authentic storage unit of the DSN based on at least one of the encoded data slice, a previous version of the distributed agreement protocol, and a new version of the distributed agreement protocol. The method continues by when the other storage unit is the authentic storage unit, processing the proxied data access request to produce a data access response and sending the data access response to the other storage unit.
Method and system for review verification and trustworthiness scoring via blockchain
A method for immutability of review verifications includes: storing a blockchain; receiving a review submission from a reviewer about an entity comprising feedback; identifying a review identifier unique to the review submission; generating a new review block for the blockchain including the review submission including the review identifier; receiving verification submissions from other reviewers about the review submission indicating positive or negative verification of the review submission; generating verification blocks for the blockchain that include the verification submissions; adding a trustworthiness block to the blockchain for the review once enough positive verifications are received; and adding a trustworthiness block to the blockchain for the reviewer once they have enough trustworthy reviews.
Method and apparatus for enabling machine to machine communication
A method and apparatus for performing secure Machine-to-Machine (M2M) provisioning and communication is disclosed. In particular a temporary private identifier, or provisional connectivity identification (PCID), for uniquely identifying machine-to-machine equipment (M2ME) is also disclosed. Additionally, methods and apparatus for use in validating, authenticating and provisioning a M2ME is also disclosed. The validation procedures disclosed include an autonomous, semi-autonomous, and remote validation are disclosed. The provisioning procedures include methods for re-provisioning the M2ME. Procedures for updating software, and detecting tampering with the M2ME are also disclosed.
System and method to visualize user sessions
A system and method operable to identify and analyze persistent state information among a plurality of software-related events, and present persistent state information in a unified fashion.
MONITORING USER ACTIVITY
A method for monitoring user activity in respect of a plurality of applications on a computing device. The method comprises storing, by a first application running on the computing device, a first timestamp indicating the time that user activity was last detected with respect to the first application. The first application receives a message from a second application running on the computing device. The message comprises a second timestamp indicating the time that user activity was last detected with respect to the second application. The first application updates the first timestamp based on the second timestamp when the time indicated by the second timestamp is later than the time indicated by the first timestamp. Thus, user activity across the plurality of application can be monitored, such that an inactivity timer running on a particular application in the group of applications can account for user activity with respect to the other application in the plurality.