H04L63/0807

ENHANCED ACCESS TO MEDIA, SYSTEMS AND METHODS

A system and method are described. An illustrative system enables operations such as: receiving new associated content from a user device and quantifying the new associated content via generating at least one new attribute-value pair object according to a multi-dimensional namespace and including at least some quantified attribute-value pairs determined from implementations of recognition algorithms executed on at least some of the new associated content. The operations may further include linking the at least one new attribute-value pair object into the linked list data structure and recording publication of the new associated content and the at least one new attribute-value pair object on a notarized ledger.

System and method for abstracted analysis system design for dynamic API scanning service

Described herein are systems and methods for abstracted analysis system design for a dynamic API scanning service. The disclosure provides a simplified API scanning service by abstracting underlining security scanning techniques and configurations. This presents a normalized view to users of the service. Both input parameters and scan output data is abstracted from users, and is driven based on logic in the service. By providing this simplified view, users can quickly, and without prior security scanning knowledge, use this service to measure their security exposure and mitigate as needed.

Methods and apparatus to manage cloud provider sessions

Methods, apparatus, systems and articles of manufacture are disclosed to manage cloud provider sessions. An example apparatus includes at least one computer readable medium; and processor circuitry to execute instructions that cause the processor circuitry to: in response to detecting a first request to establish a first session with a cloud provider that is to perform a first action: establish the first session using credentials associated with the cloud provider; record a lifespan of a session token associated with the first session; and transmit the session token to a cloud provider adapter to facilitate communication between the cloud provider adapter and the cloud provider; and in response to detecting a second request to establish a second session with the cloud provider that is to perform a second action, transmit the session token to the cloud provider adapter to facilitate communication between the cloud provider adapter and the cloud provider.

AUTHORIZATION BROKERING

A framework for managing credentials for access to a secured entity of an infrastructure service. For example, techniques for maintaining credentials for access to the secured entity within a trusted environment while utilizing the credentials for performance of actions within the infrastructure service.

System and method for storing and distributing consumer information

A computer implemented system for controlling access to data associated with an entity includes a data storage device having a protected memory region, and one or more processors, at least one of which is operable in the protected memory region. The one or more processors are configured for: storing a secret key associated with the entity in a portion of the protected memory region associated with the entity; upon receiving entity data, storing the entity data in the portion of the protected memory region associated with the entity; and upon receiving an access grant signal, generating a smart contract, the smart contract defining the entity data to be accessed and a recipient of the entity data to be accessed.

Body area network facilitated authentication or payment authorization

Disclosed are examples of a method, a wearable device and a system enabling authentication of a user of a payment account or completion of a purchase transaction via signals generated by the wearable device. A process may include a wearable device generating a modulated signal using an encryption algorithm. The modulated signal may contain authentication information related to the wearable device including a cryptographic authentication message. The modulated signal is output to a biological medium interface of the wearable device that is coupled to a biological medium of a wearer of the wearable device. The biological medium is operable to conduct the modulated signal. A receiving device processes including decrypting and demodulating the modulated signal received from the biological medium. Using the demodulated signal, the authentication information transmitted from the wearable device is obtained. Based on the obtained authentication information, a transaction may be authorized, or a user authenticated.

Secure authorization for sensitive information
11700121 · 2023-07-11 · ·

Techniques for securing access to protected resources are provided. In the method and apparatus, an access key and proof of successful completion of a first authentication is obtained in connection to a request. The proof of completion of the first authentication and the access key are verified. The access key is then used to generate a determination that information in the access key indicates that a second authentication was successfully completed prior to allowing the request to be fulfilled.

Trust broker system for managing and sharing trust levels
11700252 · 2023-07-11 · ·

This disclosure is related to devices, systems, and techniques for controlling access to network services based on a trust ledger. In some examples, a trust broker system enables a relying party to control network service access of client device, where the trust broker system comprises one or more computing devices configured to maintain a trust ledger including a trust account balance (TAB) associated with each user of a set of users, where the TAB associated with each user of the set of users represents a value used to determine whether the respective user is permitted to access a resource.

Allocation of tokens for network packets based on application type
11700150 · 2023-07-11 · ·

Described herein are systems, methods, and software to manage the deployment and use of application identifier tokens in a distributed firewall environment. In one implementation, a computing environment generates tokens associated with application types executing on virtual nodes in the computing environment. After generating the tokens, the computing environment provides at least one token of the tokens to each of the virtual nodes based on at least one application type executing on the virtual node. When a communication is identified in the virtual node associated with an application, the virtual node may encapsulate the communication and a corresponding token in a packet and forward the packet via a virtual network interface associated with the virtual node.

Tool registry for DevOps toolchain automation

The present invention extends to methods, systems, and computer program products for tool registry for automating DevOps toolchains. Submission of a DevOps tool, authentication information, and tool configuration data is received from a user. Subsequently, the DevOps tool is selected for inclusion in a DevOps job. The DevOps tool including the authentication information and tool configuration data is automatically accessed from the tool registry. The DevOps tool is configured in accordance with the accessed authentication information and accessed tool configuration data as part of the DevOps job and for interaction with the one or more other DevOps tools. The DevOps job is deployed.