Patent classifications
H04L63/105
Controlling access to secure information resources using rotational datasets and dynamically configurable data containers
Aspects of the disclosure relate to controlling access to secure information resources using rotational datasets and dynamically configurable data containers. A computing platform may receive, from a requesting system, a data access request. After authenticating the requesting system, the computing platform may load, using a first data container, first source data from a data track. The computing platform may send the first source data to a second data container. Then, the computing platform may load, using the second data container, second source data from the data track and may produce a first combined dataset. The computing platform may send the first combined dataset to a third data container. Subsequently, the computing platform may load, using the third data container, third source data from the data track and may produce a second combined dataset. Thereafter, the computing platform may send, to the requesting system, the second combined dataset.
VEHICLE, VEHICLE SYSTEM INCLUDING THE SAME, AND CONTROL METHOD OF VEHICLE SYSTEM
A vehicle includes a storage to store an authority value representing authority to access vehicle data generated by at least one vehicular component and a communicator to transmit the vehicle data and the authority value to a user terminal.
Expedited authorization and access management
Aspects of the disclosure relate to simplified and expedited processing of access requests to network resources. Authorized individuals can set rules for accessing network resources. The rules can be implemented as a series of macro steps assigned to various access rights and can be consolidated in a single button or widget for a particular user group. In response to a user's one-click selection of the button or widget, all applicable access rights can be requested sequentially from appropriate services or individuals without requiring complex instructions or myriad user actions. User interfaces and API(s) are provided to enable users to request access and managers to setup access requirements and button configurations. Novel logical systems, architectures, platforms, graphical user interfaces, and methods are disclosed.
Registered encrypted electronic message and redacted reply system
A method and system for processing an email having redacted content, and/or where the message content has been encrypted and recorded as encrypted, is provided.
WIRELESS BASE STATION AND WIRELESS COMMUNICATION TERMINAL AND WIRELESS COMMUNICATION SYSTEM
A wireless communication system transmits information to a communication terminal moving through a spot wireless area. In an integrated base station, an external information communication section controls communication with a server. A contents memory section stores contents received from the server. A wireless LAN communication section communicates with the communication terminal. A control section establishes connection with the communication terminal using a first connection not requiring an authentication procedure for connection with the communication terminal or using a second connection requiring the authentication procedure for connection with the communication terminal. An access control (restriction) section permits access from the communication terminal to the contents memory section and prohibits access to the server when a type of connection with the communication terminal is the first connection and permits access from the communication terminal to the contents memory section and to the server in the case of the second connection.
COLLECTION FOLDER FOR COLLECTING FILE SUBMISSIONS
A content management system for collecting files from one or more authenticated submitters in a collection folder. A collector, who generates the collection folder, can invite one or more submitters to submit one or more files to the collection folder. The one or more submitters have limited rights to the collection folder. The limited rights can include uploading rights and prohibiting a submitter from viewing files that other submitters associated with the collection folder submitted. Thus, the collection folder is able to store files from the one or more submitters, but prevent them from viewing other's submissions.
PROBE-BASED RISK ANALYSIS FOR MULTI-FACTOR AUTHENTICATION
A system for probe-based risk analysis for multi-factor authentication having a multi-dimensional time series data server configured to monitor and record a network’s traffic data and to serve the traffic data to other modules and a directed computational graph module configured to probe connection destinations for a response, analyze any received responses, and determine a verification score needed before granting access based at least in part on the analysis of the received responses. A plurality of verification methods build up a user’s verification score to required level to gain access.
MULTIPLE FACTOR AUTHENTICATION FOR PORTABLE MEMORY STORAGE SYSTEM
A method of configuring a controller 14 for controlling access to a memory 12 is provided. The controller 14 has a display 18 configured to selectively display a plurality of different input screens, wherein each input screen has a unique code associated therewith and the input screens are for receiving user credentials from a user. The method comprises the steps: a) inputting to the controller 14 a plurality of authentication factors required to access at least a first portion of the memory 12; b) generating, by the controller 14, a first encryption key for encrypting data stored on the first portion of the memory 12; c) displaying a first input screen at the display 18; d) entering first user credentials to the first input screen and storing the first user credentials as a first factor of authentication; e) displaying a second input screen at the display 18; f) entering second user credentials to the second input screen and storing the user credentials as a second factor of authentication; g) encrypting the code for the second input screen using the first user credentials; and h) encrypting the first encryption key using at least one of the user credentials. A method of gaining access to the memory 12 is also provided in which the code for each subsequent input screen is decrypted using user credentials provided at the previous input screen. A method of authenticating a user and a device configured according to the method are also disclosed.
Dynamically Controlling Access to Linked Content in Electronic Communications
Aspects of the disclosure relate to dynamically controlling access to linked content in electronic communications. A computing platform may receive, from a user computing device, a request for a uniform resource locator associated with an email message and may evaluate the request using one or more isolation criteria. Based on evaluating the request, the computing platform may identify that the request meets at least one isolation condition associated with the one or more isolation criteria. In response to identifying that the request meets the at least one isolation condition associated with the one or more isolation criteria, the computing platform may initiate a browser mirroring session with the user computing device to provide the user computing device with limited access to a resource corresponding to the uniform resource locator associated with the email message.
APPLICATION MANAGEMENT OF NETWORK SLICES WITH LEDGERS
The technologies described herein are generally directed to facilitating the allocation, scheduling, and management of network slice resources. According to an embodiment, a system can comprise a processor and a memory that can store executable instructions that, when executed by the processor, facilitate performance of operations. The operations can include receiving proposed contract data representative of a proposed contract for access by an application of a user equipment device to resources of a network slice usable for the access by the application. The operations can further include, based on the proposed contract data, storing governing contract data representative of a governing contract in a storage device, with the governing contract being selected to control the access by the application to the resources of the network slice. The operations can further include scheduling use of the resources of the network slice by the application based on the governing contract data.