H04L2463/082

Nested media container, panel and organizer
09842125 · 2017-12-12 · ·

A method for the organizing, managing, mapping, distributing, transportation and displaying of multi-layered content and/or data in a tactile volumetric (three-dimensional), flat (two-dimensional) and/or multi-dimensional container and/or panel which functions as a macro controller through tactile, sensatory, audible and/or other forms of user control. This includes the means to manipulate content and/or data through a visual and/or multi-sensatory interface that stores content and media in a nested and sub-nested hierarchical container and sub-container array which can give real-time feedback to any involved party. These containers and/or panels provide a means to permanently move and validate content between servers, devices and/or users, while giving a real-time visual and/or multi-sensatory response and representation to that user. This system also provides a means to ingest and convert legacy media formats.

Client device authentication to a secure network
11683312 · 2023-06-20 · ·

A method for authenticating an electronic client device for purposes of granting/denying access to a secure network is provided. The network device detects whether a client device requesting access to the secure network is a known client device on a list maintained by the network device or an unrecognized client device that is not on the list. If the client device is detected as being an unrecognized client device, the network device causes a message to be sent to a manager of the secure network. When a response is received, identification information of the unrecognized client device is automatically added to the list of known client devices by the network device. A network device is also provided.

Data aggregation using proxy entry of credentials
11683295 · 2023-06-20 · ·

Certain aspects of the present disclosure provide techniques for entering user credentials through a proxy. One example method generally includes receiving, at a user device, a push request for user data from a cloud server and receiving a request file from an aggregation system. The method further includes injecting user credentials stored on the user device into the request file, wherein when injected the user credentials replace at least one dummy entry of the request file, and transmitting the request file to a data source associated with the request file. The method further includes receiving user data from the data source and transmitting the user data to the aggregation system.

METHOD AND SYSTEM FOR IMPROVING NETWORK SECURITY
20170353462 · 2017-12-07 ·

Methods and systems for securing a network including IoT devices are provided. A networking device system can regulate the ability of IoT devices to communicate with their corresponding cloud servers over the Internet, for example, by allowing a device to connect to its associated cloud servers when a user (e.g., an authorized user) requests to use the device. The system can communicate (e.g., directly) with users outside of the network through an app and/or a software development kit installed on user client device(s), where communications received from the app or kit (e.g., to access one or more IoT devices on the network) can be presumed to originate from authorized users.

CENTRALIZED EVENT DETECTION

A threat management facility stores a number of entity models that characterize reportable events from one or more entities. A stream of events from compute instances within an enterprise network can then be analyzed using these entity models to detect behavior that is inconsistent or anomalous for one or more of the entities that are currently active within the enterprise network.

Multifactor identity authentication via cumulative dynamic contextual identity
11514155 · 2022-11-29 · ·

Disclosed are example methods, systems, and devices that allow for generation and maintenance of a central identity databank for a user's digital life. The identity databank may include identity elements with payload values and metadata values corresponding immutable attributes of the user. A multifactor identity authentication protocol allows service provider devices to more reliably validate transactions with user devices via an identity system. The identity databank may include passwords, which may be generated by the identity system linked to user accounts and/or service providers. The passwords may be provided to service provider devices, eliminating the need for users to conceive of a multitude of varying passwords for the user's accounts.

SECURE AUTHENTICATION BASED ON PASSPORT DATA STORED IN A CONTACTLESS CARD

Systems, methods, articles of manufacture, and computer-readable media for secure authentication based on passport data stored in a contactless card associated with an account. An application may receive an indication to perform an operation. The application may receive encrypted data from the card. The application may receive an indication that the authentication server verified the encrypted data based on a private key. The application may receive encrypted passport data from the contactless card, the encrypted passport data for a passport associated with the account. The application may determine an attribute of the passport based at least in part on image data or text input. The application may decrypt the encrypted passport data based on the attribute of the passport. The application may initiate performance of the operation based on the received indication specifying that the authentication server verified the encrypted data and the decryption of the encrypted passport data.

Methods, systems, apparatuses, and devices for facilitating managing digital content

A method and system for facilitating managing digital content is provided. Further, the method comprises receiving digital content, a supplemental content identifier, and a plurality of target identifiers corresponding to a plurality of target consumer devices from the one source user device, identifying a plurality of destination servers associated with the plurality of target identifiers, identifying a supplemental content based on the supplemental content identifier, processing the digital content based on a plurality of platform characteristics corresponding to the plurality of destination servers embedding the supplemental content in the digital content, generating the supplemental content in the digital content, generating a plurality of digital content based on the processing, transmitting, the plurality of digital content to the plurality of destination servers, and authenticating a consumer with the of destination servers based on a credentials.

AUTOMATED ID PROOFING USING A RANDOM MULTITUDE OF REAL-TIME BEHAVIORAL BIOMETRIC SAMPLINGS
20230185896 · 2023-06-15 ·

A security platform architecture is described herein. The security platform architecture includes multiple layers and utilizes a combination of encryption and other security features to generate a secure environment.

SYSTEMS AND METHODS FOR MULTIVARIATE ARTIFICIAL INTELLIGENCE (AI) SMART CARDS

Systems and methods for multivariate Artificial Intelligence (AI) smart cards are provided. An AI smart card may include, for example, pre-stored policy data that may be utilized as a portion of multivariate input by a suite of AI modules to formulate and analyze a claim of loss.