H04L63/10

Authentication translation
11556617 · 2023-01-17 · ·

Authentication translation is disclosed. A request to access a resource is received at an authentication translator, as is an authentication input. The authentication input corresponds to at least one stored record. The stored record is associated at least with the resource. In response to the receiving, a previously stored credential associated with the resource is accessed. The credential is provided to the resource.

Context information reformation and transfer mechanism at inflection point

Systems, methods, and apparatus for communication assistance for aneurotypical individuals are described. Embodiments of the systems, methods, and apparatus may receive input data during a communication between a first user and a second user, generate feedback based on the input data using a shared network comprising psychological information about the second user, wherein the shared network is based at least in part on interactions between the second user and a third user, and provide the feedback to the first user during the communication.

Automatic transaction processing failover

Transaction authorization systems may include a transaction processor and an authorization server system. The transaction processor obtains transaction requests authorizations for those requests from the authorization server system. The transaction processor may require an authorization be provided within a threshold time; otherwise, the transaction may be processed without authorization. The authorization server system may be hosted using one or more nodes in a distributed system. Degradation of the performance of the distributed system may cause the performance of the authorization server system to fall below the required performance threshold and transactions may not be authorized before automatic processing. Transaction authorization systems may monitor the health of the individual nodes and/or the distributed system and automatically adjust the routing of authorizations based on current and/or future performance degradation. The transaction authorization system may also allocate additional resources and/or reroute authorizations to a separate distributed system to avoid performance degradations.

METHOD, COMPUTER PROGRAM AND DATA SHARING SYSTEM FOR SHARING USER-SPECIFIC DATA OF A USER

A data sharing system comprising a first data processing circuitry configured to store the user-specific data of a user. The data sharing system comprises at least one second data processing circuitry configured to store access rights of an external entity to access the user-specific data stored on the first data processing circuitry. The data sharing system comprises an interface between the first data processing circuitry and the second data processing circuitry configured to communicate the access rights from the second data processing circuitry to the first data processing circuitry. The data sharing system also comprises a user interface configured to authenticate the user to the second data processing circuitry for modifying access rights. Additionally, the data sharing system comprises an interface between the first data processing circuitry and the external entity configured to communicate a portion of the user-specific data to the external entity in accordance with the access rights.

ZERO FOOTPRINT VPN-LESS ACCESS TO INTERNAL APPLICATIONS USING PER-TENANT DOMAIN NAME SYSTEM AND KEYLESS SECURE SOCKETS LAYER TECHNIQUES

Described embodiments provide systems and methods for accessing a web application hosted in an intranet from outside said intranet. A server hosting a domain name service configured for the intranet can receive a request from a client that is outside the intranet to access the web application. The request may include a fully qualified domain name (FQDN) of the web application in the intranet. Responsive to the FQDN of the web application in the intranet, the server may send a notification to an access service, to cause the access service to pre-establish a connection to the intranet. Responsive to the FQDN of the web application in the intranet, the server may direct the client to send a handshake message to the access service to request access to the web application.

DETECTING, VERIFYING, AND PREVENTING UNAUTHORIZED USE OF A VOICE OVER INTERNET PROTOCOL SERVICE
20230011817 · 2023-01-12 ·

A computer-implemented method, a computer program product, and a computer system for detecting, verifying and preventing unauthorized use of a Voice over Internet Protocol (VoIP) service. A computer rates a VoIP call based on a database including information of the caller number, in response to determining that no record of a caller number exists in a database including the information of unauthorized uses. The computer sets a predetermined time period for the VoIP call based on a rating of the VoIP call, adds the predetermined time period to a session initiation protocol (SIP) invite, and connects the VoIP call to a called party. In response to that the predetermined time period is reached, the computer interrupts the VoIP call and prompts the caller to conduct user verification. In response to that the caller is successfully verified, the computer reconnects the VoIP call to the called party.

Providing notifications to authorized users

A method and system for initiating message listening and routing message content to authorized user devices is disclosed. For a second user device to receive notifications regarding records of a first user, the second user device provides information identifying the first user to a notification service. The notification service verifies the identifying information. The notification service initiates one or more listeners to listen for messages flowing over a messaging bus that are relating to the first user. Once a message is identified, at least a portion of the message is used to generate a notification that may be sent to the second user device.

Persistent storage for server clusters

A computer-implemented method includes receiving a request to provision a set of storage volumes for a server cluster, wherein the request includes an identifier for the server cluster and generating a provisioning work ticket for each storage volume in the set of storage volumes, each provisioning work ticket including the identifier for the server cluster. The provisioning work tickets are provided to a message broker. Multiple volume provisioning instances are executed such that at least two of the volume provisioning instances operate in parallel with each other and such that each volume provisioning instance receives a respective provisioning work ticket from the message broker and attempts to provision a respective storage volume of the set of storage volumes for the server cluster in response to receiving the volume provisioning work ticket.

Electronic agent scribe and communication protections

A policy-controlled access security system for managing access security to electronic agents in cloud based multi-tenant systems includes a client device, a mid-link server, and a web server. A local application running on the client device requests for access to an electronic agent of a remote application of the web server. Policies are determined corresponding to the electronic agent for controlled access to the electronic agent. A token for the electronic agent is correlated with a plurality of tokens for identifying a user application associated with the token. The remote application corresponding to the token from the request is compared with the user application. Based on the comparison an authorization is determined by the mid-link server corresponding to the token for accessing the electronic agent. The policies are enforced on the client device and the access to the electronic agent is provided based on the policies via the web server.

User interface for managing access to credentials for use in an operation

The present disclosure generally relates to managing access to credentials. In some examples, an electronic device authorizes release of credentials for use in an operation for which authorization is required. In some examples, an electronic device causes display of one or more steps to be taken to enable an input device for user input. In some examples, an electronic device disambiguates between commands to change the account that is actively logged-in on the device and commands to cause credentials to be released from the secure element.