H04L63/0846

ACCESS MANAGEMENT AND REPORTING TECHNOLOGY
20230222857 · 2023-07-13 ·

An access management and reporting system includes a keysafe that is located outside of a building and a communication system that is located within the building. The communication system is configured to perform, over a short-range wireless communication protocol, two-way communication with a communication module of the keysafe. The system also includes a server that is located remote from the building and the keysafe. The server is configured to perform, over a long-range communication protocol, two-way communication with the communication system located within the building, is configured to manage access to the keysafe, and is configured to handle reporting related to access of the keysafe.

Authentication of a client device based on entropy from a server or other device

Methods and systems for authenticating a client device using entropy provided by a server and/or a device paired with the client device are described herein. The client device may receive a first user credential. The client device may receive first entropy from a wireless device. The client device may decrypt, using the first entropy, second entropy generated by a server. The client device may decrypt, using the second entropy, a second user credential that was stored in the client device. Based on a comparison of the first user credential with the second user credential, the client device may grant a user of the client device access to one or more resources.

Detecting use of passwords that appear in a repository of breached credentials
11558409 · 2023-01-17 · ·

Provided is a process that includes: obtaining with a distributed application comprising an identity management system, a first password; comparing with the distributed application, the first password to a set of compromised credentials within a database external to the network-accessible resource; receiving one or more passwords that match the first password based on the comparison; determining with the distributed application whether the one or more passwords satisfy a criterion; and in response to the determination that the one or more passwords satisfy the criterion, causing the first user associated with a first account and the first password to be notified that the first password has been compromised.

Methods and apparatus to manage cloud provider sessions

Methods, apparatus, systems and articles of manufacture are disclosed to manage cloud provider sessions. An example apparatus includes at least one computer readable medium; and processor circuitry to execute instructions that cause the processor circuitry to: in response to detecting a first request to establish a first session with a cloud provider that is to perform a first action: establish the first session using credentials associated with the cloud provider; record a lifespan of a session token associated with the first session; and transmit the session token to a cloud provider adapter to facilitate communication between the cloud provider adapter and the cloud provider; and in response to detecting a second request to establish a second session with the cloud provider that is to perform a second action, transmit the session token to the cloud provider adapter to facilitate communication between the cloud provider adapter and the cloud provider.

SYSTEMS AND METHODS FOR AUTHENTICATING A SUBSCRIBER WITHIN THE NETWORK CORE
20230224713 · 2023-07-13 ·

A subscriber authentication system prevents a change from being applied to a subscriber account until the subscriber approves of the change at the network core. The subscriber authentication system identifies one or more subscriber accounts for a network, each subscriber account being associated with a subscriber. The subscriber authentication system receives an indication that a change is requested for a subscriber account. The subscriber authentication system receives, within a network core, authentication information and data indicating whether the change is to be made to the subscriber account. The subscriber authentication system authenticates, within the network core, that the data was received from the subscriber based on the authentication information. The subscriber authentication system causes the change to be made based on the data indicating whether the change is to be made and the result of the

SYSTEMS AND METHODS FOR FIRMWARE PASSWORD MANAGEMENT

One or more computing devices, systems, and/or methods for managing a firmware password of a User Equipment (UE) are provided. In an example, the UE determines that a first firmware password variable is indicative of a firmware password of a firmware of the UE. The UE transmits the first firmware password variable to a first computer for storage in a first dataset. The UE generates a password. The UE sets a second firmware password variable, in a second dataset stored on the UE, to the password. The UE transmits the second firmware password variable including the password to the first computer for storage in the first dataset. The UE sets the firmware password of the firmware of the UE to the second firmware password variable including the password.

DATA PACKET GENERATOR FOR GENERATING PASSCODES
20230214477 · 2023-07-06 · ·

A data packet generator periodically generates a data packet including a passcode comprising a plurality of characters. The data packet is sent to a server or a computing device for validation. If validated, the data packet is used, for example, to identify the location of a user or device. Additional systems and methods involving such a data packet generator are also disclosed.

Management of dynamic credentials

In an embodiment, a method comprises intercepting, from a first computer, a first set of instructions that define one or more original operations, which are configured to cause one or more requests to be sent if executed by a client computer; modifying the first set of instructions to produce a modified set of instructions, which are configured to cause a credential to be included in the one or more requests sent if executed by the client computer; rendering a second set of instructions comprising the modified set of instructions and one or more credential-morphing-instructions, wherein the one or more credential-morphing-instructions define one or more credential-morphing operations, which are configured to cause the client computer to update the credential over time if executed; sending the second set of instructions to a second computer.

Domain management intermediary service

An agent of a domain management intermediary service obtains a security key using a client credential indicated in a request for a read-write domain management operation. A registry credential is obtained using the security key, and the read-write domain administration operation is initiated using the registry credential. A separate read-only agent obtains the completion status of the read-write domain administration operation and provides the status to the client.

Techniques for selective container access to cloud services based on hosting node

A system and technique for a Request Forwarder as for a computer network architecture is disclosed to provide selective access to one or more cloud services. In some implementations, a computer system may receive a request for access to a cloud service, the request including a container credential. The computer system may determine an identification of the container using the container credential. The computer system may verify that the container requesting access to the cloud service is authorized based at least in part on stored policies. Based at least in part on the determination that the container requesting access to the cloud service is authorized: receiving instance credential from a metadata service. The computer system may include the instance credential with the request. The computer system may send the request to the cloud service. In various examples, the Request Forwarder can be provided as a service.