G06F21/128

AUTHENTICATION TRANSLATION
20210173897 · 2021-06-10 ·

Authentication translation is disclosed. A request to access a resource is received at an authentication translator, as is an authentication input. The authentication input corresponds to at least one stored record. The stored record is associated at least with the resource. In response to the receiving, a previously stored credential associated with the resource is accessed. The credential is provided to the resource.

System and method for linking pre-installed software to a user account on an online store

Disclosed herein are systems, methods, and non-transitory computer-readable storage media for associating an application that was pre-installed on a computer with a user account on an online store. A system configured to practice the method presents an application available for download, receives a request to download the application to a computing devices, determines that the application is a pre-installed application, presents an authorization prompt configured to request user authorization to link the application with a user account, receives the user authorization, generates a unique hardware identifier associated with the computing devices, determines that the application is linkable based upon the unique hardware identifier, and links the adoptable application with the user account when the adoptable application is linkable.

SANDBOXED APPLICATION EXTENSIONS

Embodiments are directed to managing sandboxed application extensions. A first request that include includes information that identifies an extension may be provided to an extension server. Information included in a first response may be employed to instantiate an extension shell that corresponds to the extension and embed it in the hosting application such that the extension shell is associated with a first security policy included in the first response. A second request may be provided to the extension server based on information included in the extension shell such that the second request includes an identifier associated with an extension body that corresponds to the extension shell. The first security policy or the second security policy may be employed to enable one or more of the extension shell or the extension body to just access the hosting application or just access the extension server.

Systems and Methods for Temporary Digital Content Sharing
20210165859 · 2021-06-03 · ·

Systems and methods are provided herein for temporary digital content sharing. The systems and methods may involve receiving, from a first device, a selection of a first element associated with a first URL. The systems and methods may also involve determining first content associated with the first URL. The systems and methods may also involve receiving, from the first device, a selection of a second device at which to display the first content associated with the first URL. The systems and methods may also involve providing the first URL to the second device, wherein the URL allows access to the content by the second device.

Providing enhanced functionality in an interactive electronic technical manual

Embodiments of the present disclosure provide methods, apparatus, systems, computer program products for providing a virtual network within an interactive electronic technical manual system (IETM) configured to provide electronic and credentialed access via an IETM viewer to technical documentation for an item. In one embodiment, a method is provided comprising: receiving data from a graphical code as a result of a user scanning the code; and responsive to receiving the data: identifying virtual networks supported within the IETM that are available for the user to join and are associated with a specific object of the item; providing an identifier for each of the virtual networks; receiving selection of an identifier for a particular virtual network; and responsive to receiving the selection, joining the user to the virtual network so that content that is specific to the object associated with the virtual network is available to the user via the IETM.

Systems and methods for causing nonpredictable environment states for exploit prevention and malicious code neutralization for JavaScript-enabled applications
11847213 · 2023-12-19 · ·

Systems, methods, and computer-readable media for cybersecurity are disclosed. The systems and methods may involve receiving, by an application capable of JavaScript execution, code for execution; executing, before execution of the received code, an intercepting code, wherein the intercepting code is configured to intercept at least one application programming interface (API) invocation by the received code; intercepting, by the intercepting code, an API invocation by the received code; determining that the intercepted API invocation results in a manipulation of a backing store object; and modifying an execution of the intercepted API invocation, wherein the modified execution results in a nonpredictable environment state.

SECURE COMMUNICATION APPLICATION REGISTRATION PROCESS

A method for registering and activating an application downloaded to a user device, the application being provided from an application server of an enterprise. The method comprises generating an activation code for activating downloaded applications which are pending activation, storing the generated activation code on the application server, the first server not being accessible to the user and only being accessible to a jump server, enabling an administrator to access the jump server using two-factor authentication, accessing the first sever via the jump server, responding to a command by the administrator, provided through a remote connection between the jump server and the application server, by electronically communicating to the administrator activation codes associated with applications pending activation, and completing registration and activation of the application by providing a manually transferred code into the user device. The activation code is manually transferred from the administrator to the user.

Integrated context-aware software applications

Techniques for integrating context-aware software applications are disclosed. A system generates a mapping of a subset of one or more variables, managed by a parent software application, to a data structure. At runtime of the parent software application, based on the mapping, the system populates an instance of the data structure with one or more values corresponding to the subset of one or more variables. The system injects the instance of the data structure into a child software application. The system renders an interface of the child software application as a component of the parent software application. The child software application executes an operation using the one or more values from the instance of the data structure.

SYSTEMS AND METHODS FOR REMOTELY VERIFYING IDENTITY OF NON-RESIDENT ALIENS
20210110007 · 2021-04-15 ·

A method for remotely verifying a non-resident alien's identity, includes: receiving a request to establish a communication session from a user device; analyzing the request to determine whether the user device is compromised; in response to determining that the user device is not compromised, providing a page flow to the user device to solicit information from the non-resident alien, the information including identity information associated with a local foreign government identification document (ID), and other information not shown on the local foreign government ID; querying one or more foreign governmental data stores to identify foreign data associated with the non-resident alien based on a unique identifier associated with the local foreign government ID; comparing the information with the foreign data; and verifying an identity of the non-resident alien based on the comparing, wherein the verifying includes determining that at least one of the other information matches the foreign data.

Systems and methods for preventing electronic form data from being electronically transmitted to untrusted domains

A computer-implemented method for preventing electronic form data from being electronically transmitted to untrusted domains may include (i) identifying a web page that includes an electronic form with field for data entry, (ii) detecting that the web page is electronically sending first and second messages that each include data from the field of the electronic form and that are directed to first and second destinations, respectively, (iii) determining that the first destination includes an untrusted destination, and (iv) blocking the web page from electronically sending the data from the field of the electronic form to the untrusted destination by blocking the first message from being electronically sent. Various other methods, systems, and computer-readable media are also disclosed.