Patent classifications
H04L63/06
Methods and apparatus to de-authenticate and reroute client sessions for media monitoring
Methods, apparatus, systems, and articles of manufacture are disclosed. A non-transitory medium comprises instructions that, when executed, cause at least one processor to at least determine whether client circuitry has entered a power save mode, in response to a determination that the client circuitry has entered the power save mode, generate an association request for an access point, receive a connection approval frame, and in response to a determination that the access point has sent an acknowledge frame, generate an acknowledge response for the access point.
DYNAMIC CERTIFICATE MANAGEMENT IN CRYPTOGRAPHIC AGILITY FRAMEWORKS
The disclosure provides an approach for certificate management for cryptographic agility. Embodiments include receiving, by a cryptographic agility system, a cryptographic request related to an application. Embodiments include selecting, by the cryptographic agility system, a cryptographic technique based on contextual information associated with the cryptographic request. Embodiments include determining, by the cryptographic agility system, based on the cryptographic request, a certificate for authenticating a key related to the cryptographic technique. Embodiments include providing, by the cryptographic agility system, the certificate to an endpoint related to the cryptographic request for use in authenticating the key.
Protecting information using policies and encryption
A technique and system protects documents at rest and in motion using declarative policies and encryption. Encryption in the system is provided transparently and can work in conjunction with policy enforcers installed at a system. A system can protect information or documents from: (i) insider theft; (ii) ensure confidentiality; and (iii) prevent data loss, while enabling collaboration both inside and outside of a company.
CO-BRANDED SIGNLE SIGN-ON SERVICE WITH SIGN-ON TRACKING
Techniques are described for providing customizable sign-on functionality, such as via an access manager system that provides single sign-on functionality and other functionality to other services for use with those services’ users. The access manager system may maintain various sign-on and other account information for various users, and provide single sign-on functionality for those users using that maintained information on behalf of multiple unrelated services with which those users interact. The access manager may allow a variety of types of customizations to single sign-on functionality and/or other functionality available from the access manager, such as on a per-service basis via configuration by an operator of the service, such as co-branding customizations, customizations of information to be gathered from users, customizations of authority that may be delegated to other services to act on behalf of users, etc., and with the customizations that are available being determined specifically for that service.
Integration of Third-Party Encryption Key Managers with Cloud Services
A method for integrating third-party encryption managers with cloud services includes receiving, at data processing hardware, an operation request requesting a cryptographic operation on data comprising an encryption operation or a decryption operation. When the operation is an encryption operation, the method includes transmitting a data encryption key associated with the data to a remote entity. The remote entity encrypts the data encryption key with a key encryption key and transmits the encrypted data encryption key to the data processing hardware. When the operation is a decryption operation, the method includes transmitting the encrypted data encryption key to the remote entity which causes the remote entity to decrypt the encrypted data encryption key with the key encryption key and transmit the decrypted data encryption key and transmit to the data processing hardware.
Secure and zero knowledge data sharing for cloud applications
Disclosed is a zero-knowledge distributed application configured to securely share information among groups of users having various roles, such as doctors and patients. Confidential information may be encrypted client-side, with private keys that reside solely client side. Encrypted collections of data may be uploaded to, and hosted by, a server that does not have access to keys suitable to decrypt the data. Other users may retrieve encrypted data from the server and decrypt some or all of the data with keys suitable to gain access to at least part of the encrypted data. The system includes a key hierarchy with multiple entry points to a top layer by which access is selectively granted to various users and keys may be recovered.
METHOD FOR REMOTELY PROGRAMMING A PROGRAMMABLE DEVICE
A method for remotely programming a programmable device designed to provide an expected sensitive result. The method including transmitting a first program code to the programmable device, the first program code being configured to get at least one distinctive data unique and physically inherent to the programmable device, retrieving the distinctive data, and transmitting a second program code based on the retrieved distinctive data to the programmable device, so as to load the second program code into the programmable device.
COMPUTING SESSION MULTI-FACTOR AUTHENTICATION
A computing device may include a memory and a processor configured to cooperate with the memory to receive a connection lease and a token from a client device, with the token being generated responsive to the client device completing multi-factor authentication (MFA) with a provider of MFA. The processor may further verify, responsive to unavailability of the provider of MFA, that the client device has previously performed MFA based upon the token, and connect the client device to a computing session with use of the connection lease and responsive to the verification that the client device has performed MFA.
Systems and methods for automatically securing and validating multi-server electronic communications over a plurality of networks
In one embodiment, a method includes receiving, at a privacy transaction platform server, from a transaction network server, a transaction approval request associated with a user device and a requesting server including proffered transaction strings and proffered server properties associated with the requesting server, retrieving a privacy transaction record associated with the user device including tagged transaction strings and server properties associated with a provider server, determining that there is a transaction string match between the proffered transaction strings and the corresponding tagged transaction strings, determining that there is a server match between the requesting server and the provider server based on a validity metric for the transaction approval request exceeding a specified confidence threshold based on an analysis of the proffered server properties and the provider server properties, and transmitting, to the transaction network server, a validation response approving the requested transaction.
Structure of policies for evaluating key attributes of encryption keys
Examples described herein relate to apparatuses and methods for evaluating an encryption key based on policies for a policy operation, including, but not limited to, receiving user request for the policy operation, determining one or more of a node, group, client, or user associated with the user request, determining the policies associated with the one or more of the node, group, client, or user based on priority, and evaluating at least one key attribute of an encryption key based, at least in part, on the policies.