Patent classifications
H04L63/0807
Entity authentication for pre-authenticated links
Techniques for increasing security for pre-authenticated links are disclosed herein. Computing systems that generate pre-authenticated links are configured to assign an entity identifier to pre-authenticated links to specify an entity permitted to access respective data through the pre-authenticated link. When activating a respective pre-authenticated link, an entity attaches an entity token to the request to prove an identity of the requesting entity. If the identity from the entity token matches the entity identifier, the computing system may grant access to the respective data.
Method and apparatus for securely managing computer process access to network resources through delegated system credentials
A system and method for granting access to network resources through access credentials given to an agent process running on each computer or machine where resource requesters reside. The system extends a traditional token-granting authorization system to the agent processes, where each agent has administrative access to machine information. The agent uses that access to acquire detailed information about resource requesters. Requester qualifications defined by the system limit requester access to resources, and are enforced both by the agent and by the central system on the network resource server. Resource requesters ask for a token for resource use from the agent, not the central system. The agent uses its credentials to get a token from the central system and then return the token to qualified requesters.
Apparatus and locale-based method for thwarting deceptions and/or denial of services
Technical problems and their solution are disclosed regarding the location of mobile devices requesting services near a site from a server. Embodiments adapt and/or configure the transmitting device near the site, the mobile device communicating with the transmitting device using a short haul wireless communications protocol to deliver a token based upon a key shared with the server but invisible to the mobile device. The server can determine the proximity of the mobile device to the site to control actuation of the requested service or disable the service request, and possibly flushing the service request from the server. Solutions are disclosed for traffic intersections involving one or more traffic lights, elevators in buildings, fire alarms in buildings and valet parking facilities.
COMPUTING SESSION MULTI-FACTOR AUTHENTICATION
A computing device may include a memory and a processor configured to cooperate with the memory to receive a connection lease and a token from a client device, with the token being generated responsive to the client device completing multi-factor authentication (MFA) with a provider of MFA. The processor may further verify, responsive to unavailability of the provider of MFA, that the client device has previously performed MFA based upon the token, and connect the client device to a computing session with use of the connection lease and responsive to the verification that the client device has performed MFA.
APPLICATION PROGRAMMING INTERFACE (API) AUTHORIZATION
A method may include receiving, by a first computing system, a first message indicative of a rate at which a second computing system is requesting to make application programming interface (API) calls. The method may further include based at least in part on the first message, configuring the first computing system to enable the second computing system to use an access credential to make API calls at the rate. The method may also include sending, from the first computing system to the second computing system, the access credential.
UNIFIED INTEGRATION PATTERN PROTOCOL FOR CENTRALIZED HANDLING OF DATA FEEDS
System and methods are provided for implementing a Unified Integration Pattern (UIP) protocol for centralized handling of data feeds between client systems. In embodiments, a method includes: receiving an authentication Application Program Interface (API) message and data file transfer request for a data transfer event from a sending client system in a network of distinct client systems; authenticating the sending client system based on the authentication API message; uploading a data file from the sending client system based on the authenticating; receiving a notification API message from the sending client system indicating that that uploading of the data file to the computer system is complete; sending the data file to a receiving client system in the network of distinct client systems based on API message and data file request and the notification API message; and sending a notification message to the sending client system regarding the data transfer event.
ACCESSING INTERNAL NETWORK RESOURCES USING APPLICATION CUSTOM TAB
Methods, apparatuses, and systems for accessing internal network resources using application custom tab are described herein. A first application implemented on a computing device may present a link pointing to a resource of an internal network. After selection of the link, a web browsing tab of a second application may be used to access the link and/or to render a web page corresponding to the link. The web browsing tab may establish a connection with the internal network, and/or may access the resource of the internal network via the connection. The web browsing tab of the second application may be customized by the first application.
DATA COLLECTION CLOUD SYSTEM FOR ELECTRONIC GAMING MACHINES
A listening device is operatively connected to multiple network devices, and is configured to subscribe to one or more EGM data types, and receive first data from a first network device in accordance with the subscription. The listening device is also configured to generate a first data package in a form of a first data structure comprising the first data and configuration information related to the first network device, and transmit the data package across a second network to a collection server. The listening device is also configured to receive second data from a second network device in accordance with the subscription, wherein the second data comports with a second protocol that differs from the SAS protocol, and generate a second data package in the form of the first data structure comprising the second data and configuration information related to the second network device.
LOW COST DEFENSE AGAINST DENIAL-OF-SERVICE ATTACKS
A first message is received from a first communication device. The first message comprises an authentication token. For example, the authentication token may be a username/password. A determination is made if the first message also comprises a valid temporary password. The temporary password is used to prevent a Denial-of-Service (DOS) attack. In response to the first message comprising the valid temporary password, a determination is made if the authentication token is valid. In response to the authentication token being valid, the first message is responded to in a normal manner. If the first message does not contain the temporary password, the first message is handled based on a DOS message handling process.
AUTHENTICATING A CUSTOMER TO A RISK LEVEL USING AN AUTHORIZATION TOKEN
Disclosed herein are system, method, and computer program product embodiments for authenticating a mobile user via an authentication method determined based on a token level associated with the action being completed. An authentication token is created corresponding to the token level and the authentication token is sent to the mobile device. This authentication token may be used to authenticate subsequent actions and engage various services to complete the actions using application programming interfaces. The authentication token stored on the mobile device obviates the need for a user to authenticate multiple times to complete actions requiring a similar token level. The system may authenticate the identity of the mobile user using various authentication methods.