G06F2221/2153

VERIFYING GAMING ESTABLISHMENT PATRON IDENTIFICATION
20220292917 · 2022-09-15 ·

A system that a system that enables a patron to sign up for a gaming establishment account independent of any direct interaction with gaming establishment personnel via utilizing one or more image capture devices to obtain images of a picture identification document presented by a user as well as images of the user presenting the picture identification document.

AGENTS AND SYSTEMS FOR RIGHT?S MANAGEMENT
20220114266 · 2022-04-14 ·

An information system is provided that enables stakeholders to define a secure data object that sets permissions, rules, and rights for an asset. The secure data object may be communicated to entities, such as computer hosts or hardware agents, and the entities are enable to act within the permissions, rules, and rights to conduct transactions and gather information as agents of the stakeholders. The secure data object may be received into a hardware agent attached to an asset, and the agent may have sufficient permission to monitor environmental conditions, adjust pricing, consummate a transaction, or communicate a report.

METHOD, SYSTEM AND DEVICE FOR MANAGING AN EXECUTION OF A PROGRAM RELATING TO PART OR ALL OF A FIRST APPLICATION
20220067144 · 2022-03-03 · ·

A method for managing a first application program comprises: executing, by a first processor, a first control flow; executing, by a second processor, in synchronization with the first control flow execution, a second application, comprising a variable and an expected value that the variable has to have or a condition that the variable has to satisfy to authorize an execution of the correct first control flow; verifying, by the second processor, by executing each of the at least one second application, whether the variable has the expected value or the variable satisfies the condition; and inferring, by the second processor, if, for the second application, the variable has (not) the expected value or does (not) satisfy the condition, that the first processor is (not) executing the correct first control flow.

METHODS AND SYSTEMS IMPLEMENTED IN A NETWORK ARCHITECTURE WITH NODES CAPABLE OF PERFORMING MESSAGE-BASED TRANSACTIONS
20220069994 · 2022-03-03 ·

A method for establishing connection weights between network nodes is implemented by communicating data processing units, a public key and a private key being associated with each node, a given node being able to communicate its public key to another node, thus forming a so-called real connection (“IRL-connected”) between two nodes, and each node also being able to communicate to another node a public key received from yet another node, thus forming a so-called indirect connection between the other node and the yet another node. Each node can have a specific connection weight in relation to another node with which it has a real or indirect connection. In order to determine the connection weight of a second node in relation to a first node, the method comprises calculating a set combination of weighting factors (influence, proximity) of third nodes that are IRL-connected to the second node.

SECURITY MEASUREMENT METHOD AND SECURITY MEASUREMENT DEVICE FOR STARTUP OF SERVER SYSTEM, AND SERVER

The present disclosure provides a security measurement method and security measurement device for startup of a server system, and a server. The security measurement method for startup of a server system is applied to a trusted platform control module of the server system, and the method includes: starting the trusted platform control module after the server system is powered on; measuring subsequent startup operations of the server system by the started trusted platform control module to identify and record safety of the startup operations. By adopting the trusted platform control module, the present disclosure effectively improves the safety of startup of the server system.

Information processing apparatus and information processing method

Provided is an information processing apparatus including: a processing unit configured to execute processing of authenticating an external apparatus through communication with the external apparatus which is a communication target and processing of updating information to be updated through communication with the external apparatus, as a series of processing.

Methods and systems implemented in a network architecture with nodes capable of performing message-based transactions
11159318 · 2021-10-26 · ·

A method for establishing connection weights between network nodes is implemented by communicating data processing units, a public key and a private key being associated with each node, a given node being able to communicate its public key to another node, thus forming a so-called real connection (“IRL-connected”) between two nodes, and each node also being able to communicate to another node a public key received from yet another node, thus forming a so-called indirect connection between the other node and the yet another node. Each node can have a specific connection weight in relation to another node with which it has a real or indirect connection. In order to determine the connection weight of a second node in relation to a first node, the method comprises calculating a set combination of weighting factors (influence, proximity) of third nodes that are IRL-connected to the second node.

Edge device and method for operating an edge device

The invention relates to an edge device (10) and to a method for operating an edge device (10), wherein the edge device (10) is supplemented by a unikernel manager (52) and a base unikernel (54), wherein the unikernel manager (52) acts as a means at least for starting and stopping a unikernel (40-46) installed on the edge device (10), and wherein the base unikernel (54), in the form of a standalone unikernel, comprises the base functionality of the edge device (10).

Stack overflow protection by monitoring addresses of a stack of multi-bit protection codes

A hardware monitor circuit includes an electronic control circuit coupled to a processing unit. The electronic control circuit generates multi-bit protection codes and directs operations of the hardware monitor circuit. A bus interface is coupled to an address bus of the processing unit, and the bus interface passes signals associated with a stack structure of the processing unit. The stack structure is arranged to store the multi-bit protection codes in an internal memory coupled to the processing unit. Comparators in the hardware monitor circuit are arranged to accept values from the internal memory and gating logic coupled to the comparators is arranged to generate an error signal when it detects that an address on the address bus read via the bus interface is equal to an address stored in the internal memory. Upon generating the error signal, the processing unit is placed in a secure mode.

Methods and systems for generating history data of system use and replay mode for identifying security events showing data and user bindings

Devices and methods are presented for managing data security. One example method includes receiving user identification information from a screen of a device that is connectable to a database of secure information. The method includes authenticating the user identification information, the authenticating includes capturing image data of a user associated with the user identification information. The method provides access to the database of secure information upon authenticating the user identification information. The method records data of user interactive input and viewed images displayed on the screen while the access provided. The method stores audit data for the user when accessing the database of secure information, the audit data being associated with a history of use by the user. The audit data including a plurality of events associated with the use. The method enables replay of the audit data for at least one of the plurality of events associated with the use.