Patent classifications
H04L63/108
Digital account controls portal and protocols for federated and non-federated systems and devices
Systems, methods, and apparatuses for a secure digital controls portal enabling enhanced control over account functionalities and usage of secure information provided to third party systems and devices maintained by various federated and non-federated provider computing systems of various product and service providers. The secure digital controls portal can interface with various provider computing systems via custom APIs protocols. The API protocols may utilize APIs that are particular to the software and hardware operated by the various provider computing systems. The secure digital controls portal can also standardize information from the various provider computing systems. The secure digital controls portal can be a central portal accessible via a client application running on a user device that enhances one-stop switch control and security of a user's digital footprint.
CLOUD-BASED SHARING OF DIGITAL KEYS
A system for managing an access to an asset is provided. A digital key to the asset is generated and synchronized between a first user device of a first user and an access control device that controls the access to the asset. A key-sharing request is initiated by the first user device to grant a second user the access to the asset. Based on the key-sharing request, an application server communicates the digital key to a second user device of the second user. When the second user device is within a detection range of the access control device, the access control device receives the digital key from the second user device, validates the digital key, and grants the second user the access to the asset for an access duration defined in the key-sharing request.
DISTRIBUTED SECURITY IN A SECURE PEER-TO-PEER DATA NETWORK BASED ON REAL-TIME GUARDIAN PROTECTION OF NETWORK DEVICES
In one embodiment, a method comprises: securing, by a security agent executed within a network device, first secure data structures for secure storage in the network device and second secure data structures for secure communications in a secure peer-to-peer data network; monitoring, by the security agent, a corresponding mandatory lifecycle policy for each of the first secure data structures; and cryptographically erasing one of the first secure data structures in response to expiration of the corresponding mandatory lifecycle policy.
PROVIDING ACCESS CONTROL TO DISTRIBUTED RESOURCES TO AN INFORMATION HANDLING SYSTEM
Providing access control to distributed resources, including storing, at a computing dock coupled to an information handling system, a local access database indicating verified credentials of one or more users; receiving, at the computing dock, a request for access to a resource coupled to the computing dock; providing, in response to the request for access, an authentication request to an authentication system; in response to the authentication request, providing, by the computing dock, an authentication challenge to the information handling system; receiving, at the computing dock and in response to the authentication challenge, user credentials at the authentication system; verifying, at the authentication system, the user credentials against the local access database; providing, based on the verified user credentials, an authorization token to the first device; and allocating, based on the authorization token, access to the resource to the information handling system.
OPTIMIZING APPLICATION SECURITY BASED ON MALICIOUS USER INTENT
An example method identifying a request to access or modify a data resource. The request is made by a user. The example method further includes authenticating the user. Based on authenticating the user, the example method includes determining that the request is associated with a malicious intent based on a characteristic of the user. Further, based on determining that the request is associated with the malicious intent, the example method includes blocking the user from accessing or modifying the data resource.
Systems and methods for remote detection of computer device attributes
Methods and systems are presented for assessing a veracity of device attributes obtained from a computer device based on estimating a number of processing cycles used by the computer device to perform a particular function. In response to receiving a transaction request from the computer device, software programming instructions are transmitted to the computer device for obtaining device attributes of the computer device. The software programming instructions may also include code that estimate a number of processing cycles used by the computer to perform a particular function. The particular function may be associated with obtaining at least one of the device attributes of the computer device. The estimated number of processing cycles may be compared against a benchmark profile. A risk associated with the transaction request is determined based on the comparing.
Map output device, map output system, and computer-readable storage medium including program
A map output device is provided for preventing a storage medium from being sharedly used. The map output device comprises a connection unit; an output unit that outputs map data; and a control unit. The control unit is configured, when a storage medium is connected to the connection unit or when a movable body is used beyond a predetermined usage amount, to write a file containing information on a unique value related to the movable body into the storage medium connected to the connection unit, and to output, to the output unit, the map data read from the storage medium.
AUTHENTICATION METHOD, CORRESPONDING DEVICE AND PROGRAM
A method for authenticating access via a communication terminal, before a server is disclosed. The method includes, subsequently to the transmission by an access application of the communication terminal, to the server, of a connection request: transforming a variable element, received from the server, using transformation materials obtained upon a subscription before the server, outputting a transformed element; transmitting to the server, an identifier associated to the access and to the transformed element; and receiving an authentication of the access, originating from the server taking the transformed element into account.
PROCESSING OF REQUESTS TO CONTROL INFORMATION STORED AT MULTIPLE SERVERS
Methods, systems, and apparatus, including computer programs encoded on a computer storage medium, for transmitting/processing requests to control information stored at multiple content platforms/servers. In one aspect, a client device can send a request to verify the device's trustworthiness to a device trustworthiness server. The client device can receive, from the device trustworthiness server, data indicating that the client device is trustworthy, in response to which, the client device can send, to a relay server, a request to control user data stored at a plurality of servers. The client device can receive, via the relay server, a response from each of the plurality of servers. Based on the responses, the client device can determine that at least a subset of the plurality of servers that included the user data has performed the action specified in the request to control the user data.
APPARATUSES, METHODS, AND COMPUTER PROGRAM PRODUCTS FOR SERVICE PERMISSIONS SCALING IN A FEDERATED SYSTEM
Methods, apparatuses, or computer program products according to the present disclosure provide for service permissions scaling. In example embodiments, an apparatus receives a service request from an edge server. The apparatus may generate an authorization token based at least in part on a permissions data vector, where the authorization token is configured for access by one or more computing devices to determine whether to grant access by a first computing device associated with the requesting entity identifier to one or more resources associated with the one or more computing devices. The apparatus may then transmit the authorization token to the edge server. According to some embodiments, the authorization token may be configured for storing in an authorization token cache. In some embodiments, the authorization token may be retrieved from the authorization token cache.