Patent classifications
H04L63/107
Multi-Factor Authentication to Access Services
A technology is provided for using a multi-factor authentication process to access services in a computing service environment. One or more policies can be defined for allowing access to one or more services and/or resources associated with a service provider environment according to an authenticated identity. A device, detected by a voice-capturing endpoint within a defined geographical location, may be authenticated according to a unique identification (ID). Voice data received from the voice-capturing endpoint can be authenticated. The authenticated identity can be established according to the authenticated device and the authenticated voice data. A command, received via a voice command from the voice-capturing endpoint, may be issued with the authenticated identity to access the one or more services and/or resources associated with the service provider environment according to the plurality of policies.
APPARATUS AND METHOD FOR ENHANCING PERSONAL INFORMATION DATA SECURITY
The present disclosure relates to a communication technique for converging a 5G communication system for supporting a higher data rate beyond a 4G system with an IoT technology, and a system therefor. The present disclosure can be applied to intelligent services on the basis of a 5G communication technology and an IoT-related technology (for example, smart home, smart building, smart city, smart car or connected car, healthcare, digital education, retail, security and safety-related service, and the like). The present invention provides a method for enhancing data security, comprising: when a request message including information related to a first privacy level is received from a user device, authenticating the user device; when the user device is an authenticated device as a result of the authentication, verifying the information related to the first privacy level; and when the verification of the information related to the first privacy level is completed, transmitting, to the user device, an image processed on the basis of the first privacy level among images processed on the basis of a plurality of privacy levels.
PROGRAM ACQUISITION METHOD, AND INFORMATION PROCESSING TERMINAL
A program acquisition method performed by an information processing terminal, includes calculating a degree of matching a first condition that authorizes access to a predetermined program with respect to a condition detected in relation to the information processing terminal, acquiring the predetermined program and storing the acquired predetermined program in a storage in response to the degree of matching being within a predetermined range from a first value indicating that the degree of matching satisfies the first condition, and restricting the access to the predetermined program stored in the storage until the degree of matching indicates the first value.
SYSTEMS AND METHODS FOR AUTHENTICATING A USER OF A COMPUTER APPLICATION, NETWORK, OR DEVICE USING A WIRELSSS DEVICE
A method and system for authenticating a user includes providing an invocation element capable of being activated by a single user action, receiving an indication that the invocation element has been activated, obtaining a location of a wireless device associated with the user, determining whether the wireless device is associated with an authorized user, approving the user to use the application based on a predetermined location criterion, and producing an indication that the user has been authenticated.
Systems and methods for controlling data exposure using artificial-intelligence-based periodic modeling
Systems and methods for periodically modifying data privacy elements are provided. The systems and methods may identify a set of data privacy elements. A data privacy element can characterizes a feature of a computing device and can be detectable by a network host. A first artificial profile can be generated by modifying a first data privacy element based on an artificial profile model that defines a relationship associated with one or more constraints between the set of data privacy elements. Subsequent to generating the first artificial profile, a second artificial profile can be generated by periodically modifying a second data privacy element in accordance with the relationship defined by the artificial profile model. The computer device can be masked from being identified by the network host by sending the second artificial profile including the second data privacy element to a requested network location.
Systems and methods for encoding and sharing content between devices
Systems and methods for sharing content between devices are disclosed. To request a shared piece of media content, a playback device generates and sends a request to content server. The playback device includes information in the request that indicates the playback capabilities of the device. The content server receives the request and determines the playback capabilities of the playback device from the information in the request. The content server then determines the assets that may be used by the playback device to obtain the media content and generates a top level index file for the playback device that includes information about the determined assets. The top level index file is then sent to the playback device that may then use the top level index file to obtain the media content using the indicated assets.
LOCATION BASED AUTHENTICATION
A method of enabling a user to access recorded data associated with an event, the method comprising determining the location of a user's device at a control unit, confirming the location is within a predetermined vicinity and that the user's device was at the location within a predetermined period and the control unit enabling access for the user to the data if the location of the user's device in the predetermined period is confirmed.
MULTI STEP AUTHENTICATION METHOD AND SYSTEM
A multi step authentication method for authenticating a person as an authorized person, the multi step authentication method being executed by a multi step authentication system including an authentication server, a user device, the method comprising the steps of executing a first authentication phase, the first authentication phase comprises performing a first authentication technique; executing a second authentication phase, the second authentication phase comprises performing a second authentication technique, wherein the first authentication technique and second authentication technique are disparate; both the first and second authentication techniques utilize contactless authentication techniques; wherein the second authentication phase is performed after the first authentication phase successfully authenticates a person as an authorized user, a person is authenticated as an authorized person or vehicle if both the first authentication phase and second authentication phase successfully authenticate the person or vehicle, and; wherein the first authentication phase and second authentication phase are sequentially alterable.
SYSTEM AND METHOD FOR GLOBAL DATA SHARING
Sharing data in a data exchange across multiple cloud computing platforms and/or cloud computing platform regions is described. An example method can include generating a consumer account corresponding to a first cloud entity and receiving, by the first cloud entity, a copy of a data set from a provider account corresponding to a second cloud computing entity, wherein the first cloud computing entity and the second cloud computing entity represent different regions of a cloud computing platform. The method may also include accessing, by the consumer account, the copy of the data set.
SYSTEMS AND METHODS FOR PERFORMING SECURE DIGITAL FORENSICS INVESTIGATIONS USING A HYBRID OF ON-PREMISES AND CLOUD-BASED RESOURCES
Computer systems and methods for managing sensitive data items when performing a computer-implemented digital forensic workflow using on-premises (“on-prem”) and cloud resources are provided. The system includes a control computing node configured to: store the digital forensic workflow in a memory; and allocate forensic data processing tasks corresponding to portions of the digital forensic workflow to processing node computing devices (“processing nodes”) for execution by the processing nodes, the processing nodes communicatively connected to the control computing node via at least one data communication network and including at least one cloud processing node and at least one on-premises (“on-prem”) processing node. The control computing node automatically restricts allocation of a given forensic data processing task to the at least one on-prem processing node when forensic data to be operated on in performance of the given processing task is tagged as sensitive.