Patent classifications
H04L2463/121
SYSTEM AND METHOD FOR TRACKING AND ARCHIVING MOBILE COMMUNICATIONS
A method and system for tracking electronic communications between a customer phone and a user mobile device for compliance with regulations are provided. The system includes a server configured to send an email to an Enterprise Information Archiving system capable of archiving the email for at least one of eDiscovery and compliance with one or more regulations. The server can associate a virtual phone number with a mobile app residing on a user mobile device and to either: (i) receive a communication originated from the mobile app and intended for a customer phone, and send the communication the customer phone; or (ii) receive a communication originated from a customer phone and sent by the customer phone to the virtual phone number, and send the communication to the mobile app. The server also is configured to include content from the communication in the email.
ENHANCED ACCESS TO MEDIA, SYSTEMS AND METHODS
A system and method are described. An illustrative method includes receiving content associated with a digital original work from a user device, where the associated content includes an object contained therein; determining an attribute-value pair for the content or the object contained within the content; linking the attribute-value pair to the associated content or the object contained within; determining that a second user is interested in the associated content; and causing the associated content to be transmitted to a second user device.
AUTHORIZED OFF-LINE ACCESS METHODS AND APPARATUS
A smart device includes a transceiver for outputting a user identifier to an authentication server, for receiving a data packet and a pre-authorization token from the authentication server, wherein the data packet comprises reader identifiers associated with a plurality of reader devices, and wherein the pre-authorization token indicates that smart device is approved to interact with the plurality of reader devices, a storage device for storing the reader identifiers and the pre-authorization token, wherein the transceiver is for receiving a reader identifier from a reader device, a processor for determining an authorized reader condition when the reader identifiers includes the reader identifier, wherein the processor is for determining a reader token in response to the pre-authorization token and the authorized reader condition, wherein the transceiver for transmitting the reader token to the reader device.
LOCATION-BASED USER AUTHENTICATION
A method at a computing device is described. The method comprises executing an application for verifying a location of a user requesting to access a location-based service, receiving, at the application, information indicating a location of the computing device, and encoding, with the application, at least the location to thereby generate a location token for responding to a challenge for the location token. The method further comprises outputting the location token from the application, the location token configured for use in applying a location-based access policy that controls access by the user to the location-based service.
APPARATUS FOR SECURE DELIVERY OF A PACKAGE
An apparatus for authenticating a package delivery in absence of a recipient. The apparatus includes a frame that can be mounted to ground or an upstanding structure. One or more enclosures and a control unit encased in the frame. Each one or more enclosures having a digital lock operably coupled to the control unit. The enclosures can be reserved for package delivery, wherein the control unit can receive a configuration file from a user device and reserves the enclosure for the package delivery on a predefined date and duration. The control unit can receive and verify the delivery request from a service provider's device for the package delivery. The control unit can verify and authenticate the delivery request based on the configuration instruction and accordingly unlock the enclosure for the package delivery.
SYSTEM AND METHOD FOR AUTOMATIC WAF SERVICE CONFIGURATION
A method and system for continuously configuring a web application firewall (WAF) are provided. The method includes receiving a request directed at a protected web application, wherein the request is received from a client device associated with a trusted user account, and wherein the protected web application is protected by the WAF; validating the received request based on at least a signature included in a header of the received request; when the received request is validated, generating an authorization rule based on the received request, wherein the authorization rule allows access to a resource of the protected web application designated in the received request, wherein the generated authorization rule is included in at least one whitelist the WAF is configured with; and configuring the WAF with the generated authorization rule to allow the received request and subsequent request to be directed to the resource of the protected web application.
PROCESSING DEVICE WITH TRUST/UNTRUST MODES
Method and apparatus for implementing data security and privacy for a processing device. In some embodiments, the processing device is authenticated using a trusted authority. Self-authentication information is stored in a keystore of the processing device as a result of the authentication. The processing device subsequently operates in an untrusted mode by performing self-authentications using the self-authentication information in the keystore without further reference to the trusted authority. The trusted authority can be a remote server with which the processing device communicates over a network. The processing device can subsequently transition to a trust mode in which all authentications take place with the trusted authority without reference to the keystore. The processing device can be a data storage device such as a solid-state drive (SSD), a hard disc drive (HDD) or a hybrid drive (HDSD). The processing device can use untrust mode during manufacturing, and trust mode during field use.
SYSTEM AND METHOD FOR ANALYTICS BASED WAF SERVICE CONFIGURATION
A system and method for configuring a web application firewall (WAF) is provided. The method includes continuously receiving requests related to a first WAF, each request indicative of network traffic directed to a web application protected by the WAF; enriching each received request by associating each event with information from an enrichment source; periodically analyzing the enriched requests; generating at least one network traffic rule based on periodically generated analysis; and configuring at least a second WAF to perform the network traffic rule.
SYSTEMS AND METHODS FOR LOCATION-BASED AUTHENTICATION
Systems and methods are disclosed for performing location-based authentication using location-aware devices. One method includes: receiving an access request comprising authentication credentials and a first location from a first location-aware device; receiving a second location from a second location-aware device associated with the authentication credentials; and upon determining that the first location and second location are within a pre-determined distance, authenticating the authentication credentials.
Supply authentication via timing challenge response
In an example implementation, a print supply cartridge comprises a microcontroller to receive a timing challenge and enable authentication of the cartridge by providing a challenge response. The challenge response is provided in a challenge response time that falls within an expected time window.