Patent classifications
H04L63/107
System, computer program product and method for risk evaluation of API login and use
A method, system and computer program product assess risk of an unauthorized API login and mitigate damage from an unauthorized API login. The method includes collecting in a database license attributes of a user license, user profile attributes, and database content change attributes; receiving an API login request; comparing features of the API login request to at least one of the database license attributes, user profile attributes, and database content change attributes against a predetermined threshold; assessing a risk of the an unauthorized API login request based on a result of the comparison; and based on a level of the assessed risk, implemented protective action to mitigate harm that may result from an unauthorized user from accessing information or services from a computer system by way of an API.
Automated monitoring of proximate devices
Aspects of the disclosure relate to an automated monitoring of proximate devices. A computing platform may cause a reporting device to detect a target device in a local network, retrieve network data associated with the target device, and send, to an intermediate server, the network data. The computing platform may send, to the intermediate server, a query. The intermediate server may send the network data in response to the query. Based on the network data, the computing platform may determine an amount of time that has elapsed since network activity was previously detected for the target device, and based on a determination that the amount of time exceeds a predetermined time threshold, the computing platform may generate an alert notification indicating that the target device may need to be traced. Subsequently, the alert notification may be sent to the reporting device.
SYSTEMS AND METHODS FOR CREATING A VIRTUAL KVM SESSION BETWEEN A CLIENT DEVICE AND A TARGET DEVICE
Systems and methods for establishing a KVM session are disclosed. The KVM session is designed to provide a communication channel between a client device and a target device without the use of an appliance. For example, the KVM session includes a virtualized KVM session in which the hardware and software used to create the communication channel are stored on a network-based device, as opposed to a multi-port appliance physically connected to the target device. A virtual KVM session eliminates the need for the target device to have a-priori knowledge related to the client device. The virtual KVM session can individually communicate with the client device and the target device, and negotiate a session between the client device and the target device prior to any communication between the target device and the client device. In some embodiments, the virtual KVM session uses out-of-band signaling and SIP to negotiate a session.
Friend location sharing mechanism for social media platforms
A server system for a map-based social media platform maintains user location information to enable the rendering of friend icons on a map at a corresponding display locations. The system maintains a per user access control list (ACL) that lists all users whose icons can be viewed by a requesting user. The ACL can include a designation of respective display granularity levels for different friend users.
Information processing apparatus, information processing system, information processing method, and non-transitory storage medium
An information processing apparatus including a control unit configured to perform obtaining result data indicating a result of locking and unlocking performed by a locking and unlocking device that performs locking and unlocking based on authentication information obtained from a portable terminal carried by a user, and generating, based on the result data, proposal data including a proposal for a service to be provided to the user.
System to control access to web resources based on an internet of things authorization mechanism
According to one embodiment, a method, computer system, and computer program product for managing access to one or more protected web resources based on the location of an approver is provided. The present invention may include granting the requestor access to the protected web resource based on one or more access requirements being met, wherein at least one access requirement comprises a location of one or more authorization devices corresponding with one or more approvers being within a threshold distance of a computing device of a requestor requesting a protected web resource.
Location-based access to controlled access resources
Systems and methods provide access to location-restricted resources outside of recognized locations. An example, a method includes receiving a request for a controlled access resource from a client device and determining that the request is not associated with a recognized location but that state data exists for the client device identifier. In response to identifying the state data, the method includes generating a link for accessing the controlled access resource at a server, generating an encrypted token including a timestamp, a random number, and licensed resource information from the state data, including the encrypted token in the link, and providing the link to the client device. The client device uses the link to request the controlled access resource from the server, which determines that the request includes the token, determines that the token is not expired, and provides the controlled access resource to the client device.
Location-based asset usage control
A lighting device includes a light source configured to emit a light and a sensor configured to receive identification information from an asset tag of a physical asset. The lighting device further includes a processor configured to send the identification information received from the asset tag and location information of the lighting device to a control device. The processor is further configured to receive a usage control message from the control device and transmit the usage control message, where the usage control message controls whether the physical asset is used at a location indicated by the location information.
Multi-factor autonomous sim lock
Aspects of the subject disclosure may include, for example, initializing a secure timer in a wireless device, determining whether a subscriber identification module (SIM) card installed in the wireless device comprises a carrier identity that matches a carrier identity stored in the machine-readable medium, establishing a network connection with a trusted server, starting the secure timer if the SIM card and network connection are satisfactory, periodically checking the network connection and SIM card until expiry of the secure timer, penalizing the secure timer responsive to a failure of the network connection or SIM card check, and responsive to expiry of the secure timer, unlocking a SIM lock. Other embodiments are disclosed.
Method and device for provisioning a node in a wireless network
A device may receive data relating to a site plan and image data relating to a network device. The device may determine a device identifier based on the image data, associate the device identifier with the site plan based on a common attribute between the network device and the site plan, and cause a certificate to be generated based on an authentication request to a network controller. The authentication request may cause the network controller to generate the certificate based on the device identifier and/or the site plan. The device may cause an Internet protocol (IP) address to be assigned to the network device based on the certificate, a location of the network device, and/or another related parameter, cause a node configuration to be generated based on the IP address, the device identifier, and/or the site plan, and provision the network device according to the node configuration.