H04W12/66

Dynamically provisioning peripherals to containers

Peripherals may be dynamically provisioned to containers. A peripheral arbitrator may be run in the host operating system environment to detect when containers are started. When a container is started, the peripheral arbitrator may determine which peripherals an application running in the container may use or require. The peripheral arbitrator may then identify any available peripherals matching the application's peripheral requirements and provision the peripherals to the container to thereby make the peripherals accessible to the application. In some instances, the peripheral arbitrator may use a trust score to determine whether to provision available peripherals to a container.

TRUST POLICIES FOR A DATA PROVISIONING LAYER

Techniques for enforcing trust policies for payload data transmitted through a data provisioning layer include: receiving, by a node in the data provisioning layer, payload data to be delivered to a recipient; obtaining, by the node, a trust policy indicating multiple attributes used to determine trustworthiness of payloads; determining, by the node, a set of values of the attributes associated with the payload data; generating, by the node, a trustworthiness opinion based at least on the trust policy and the set of values of the attributes; transmitting, by the node, the payload data and the trustworthiness opinion via the data provisioning layer toward the recipient; computing, by the recipient, a trustworthiness metric associated with the payload data based at least on the trustworthiness opinion; and determining, by the recipient, an action to take with respect to the payload data based at least on the trustworthiness metric.

USER IDENTITY BASED ON HUMAN BREATH ANALYTICS
20220092162 · 2022-03-24 ·

A security platform architecture is described herein. A user identity platform architecture which uses a multitude of biometric analytics to create an identity token unique to an individual human. This token is derived on biometric factors like human behaviors, motion analytics, human physical characteristics like facial patterns, voice recognition prints, usage of device patterns, user location actions and other human behaviors which can derive a token or be used as a dynamic password identifying the unique individual with high calculated confidence. Because of the dynamic nature and the many different factors, this method is extremely difficult to spoof or hack by malicious actors or malware software.

AD-HOC HUMAN IDENTITY ANALTYICS PRIOR TO TRANSACTIONS
20220092163 · 2022-03-24 ·

A security platform architecture is described herein. A user identity platform architecture which uses a multitude of biometric analytics to create an identity token unique to an individual human. This token is derived on biometric factors like human behaviors, motion analytics, human physical characteristics like facial patterns, voice recognition prints, usage of device patterns, user location actions and other human behaviors which can derive a token or be used as a dynamic password identifying the unique individual with high calculated confidence. Because of the dynamic nature and the many different factors, this method is extremely difficult to spoof or hack by malicious actors or malware software.

MACHINE LEARNING LITE
20220092164 · 2022-03-24 ·

A security platform architecture is described herein. A user identity platform architecture which uses a multitude of biometric analytics to create an identity token unique to an individual human. This token is derived on biometric factors like human behaviors, motion analytics, human physical characteristics like facial patterns, voice recognition prints, usage of device patterns, user location actions and other human behaviors which can derive a token or be used as a dynamic password identifying the unique individual with high calculated confidence. Because of the dynamic nature and the many different factors, this method is extremely difficult to spoof or hack by malicious actors or malware software.

VISUAL VOICEMAIL CENTRALIZED AUTHENTICATION SYSTEM FOR WIRELESS NETWORKS
20220086629 · 2022-03-17 ·

A method for authenticating a network entity to access restricted information. The method includes receiving a request to generate a visual voicemail message based on an analysis of network entity profile data and contextual information relating to the network entity. The method includes generating the visual voicemail message based on the network entity profile data and the contextual information, sending the visual voicemail message to the network entity and requesting authentication information included with the visual voicemail message. In response to receiving the requested authentication information, the network entity is authenticated to access to the restricted information.

VISUAL VOICEMAIL AS SERVICE FOR AUTHENTICATION OR ACCOUNT RECOVERY OF WIRELESS DEVICES IN A WIRELESS NETWORK
20220086630 · 2022-03-17 ·

A method performed by a wireless device on a wireless network. The method includes sending an access request for an application. In response to sending the access request, the wireless device receives a visual voicemail message including authentication information. The wireless device can access and send the authentication information of the visual voicemail message to an authentication system. The wireless device is then authenticated to participate in a restricted activity or access restricted content in response to the sent authentication information.

SECURE AND TRUSTED CONVEYANCE FROM USER COMPUTING DEVICE TO MERCHANT COMPUTING ENTITY

A method includes obtaining, by a user computing device, a one-time use code from a merchant computing entity to initiate a data conveyance. The method further includes sending, by the user computing device, the one-time use code and a request to initiate the data conveyance. The method further includes translating, by the secure data conveyance device, the amount of the cryptocurrency to a substantially equivalent amount of the desired currency. The method further includes generating, by the trusted SVA device, an SVA representative of the substantially equivalent amount of the desired currency. The method further includes sending, by the secure data conveyance device, the one-time use code, the SVA, a merchant computing entity identifier (ID) associated with the merchant computing entity, and an expiration time frame to use the SVA to the user computing device. The method further includes verifying, by the merchant computing entity, the one-time use code.

HEALTH AND MOOD MONITORING
20220092165 · 2022-03-24 ·

A security platform architecture is described herein. A user identity platform architecture which uses a multitude of biometric analytics to create an identity token unique to an individual human. This token is derived on biometric factors like human behaviors, motion analytics, human physical characteristics like facial patterns, voice recognition prints, usage of device patterns, user location actions and other human behaviors which can derive a token or be used as a dynamic password identifying the unique individual with high calculated confidence. Because of the dynamic nature and the many different factors, this method is extremely difficult to spoof or hack by malicious actors or malware software.

DRONE CAPABLE OF AUTONOMOUSLY DETERMINING TRUSTWORTHINESS OF MESSAGES RECEIVED
20220078196 · 2022-03-10 ·

In some embodiments, apparatuses and methods are provided herein useful to autonomously determining trustworthiness of a message. In some embodiments, a drone capable of autonomously determining trustworthiness of messages comprises a drone body, a propulsion mechanism, a plurality of sensors, a wireless radio, and a control circuit, wherein the control circuit is configured to receive, from the wireless radio, a message, determine a source transmitting the message, determine content of the message, determine, based on the source transmitting the message, the content of the message, and the observational data, contextual information for the message, determine, based on the contextual information for the message, an expectation for the message, and one of: determine, based on the contextual information and the expectation, that the message is trustworthy, and determine, based on the contextual information and the expectation, that the message is not trustworthy.