Patent classifications
G06F7/04
Sanitization of content displayed by web-based applications
Embodiments enable a displayed webpage containing sensitive information to be accurately and efficiently sanitized. The sensitive information is contained within a text string of the webpage and displayed using a font specified in a style sheet. The text string that is to be sanitized is determined based on a tag for sanitization associated with the text string. When the tag is determined the text string is rendered using a font from the style sheet that is not legible. Upon rendering, the text string of the webpage is redisplayed using the non-legible font, which effectively sanitizes the text string containing the sensitive information.
Setting application permissions in a cloud computing environment
Application permissions can be set in a cloud computing environment based on a user's authorization level in the cloud computing environment. For example, a system can determine that a user has a particular authorization level in a cloud computing environment. The system can determine that the user is to have particular permissions for a continuous integration tool by mapping the particular authorization level to the particular permissions. The system can then set a permission setting for the continuous integration tool to limit the user to the particular permissions.
System for automated malicious software detection
A system for automated malicious software detection includes a computing device, the computing device configured to receive a software component, identify at least an element of software component metadata corresponding to the software component, determine a malicious quantifier as a function of the software component metadata, wherein determining the malicious quantifier further comprises obtaining a source repository, the source repository including at least an element of source metadata, and determining the malicious quantifier as a function of the at least an element of software component metadata and the at least an element of source repository metadata using a malicious machine-learning model, and transmit a notification as a function of the malicious quantifier and a predictive threshold.
Lightweight authentication protocol using device tokens
A network protocol provides mutual authentication of network-connected devices that are parties to a communication channel in environments where the amount of memory and processing power available to the network-connected devices is constrained. When a new device is added to a network, the device contacts a registration service and provides authentication information that proves the authenticity of the device. After verifying the authenticity of the device, the registration service generates a token that can be used to by the device to authenticate with other network entities, and provides the token to the device. The registration service publishes the token using a directory service. When the device connects to another network entity, the device provides the token to the other network entity, and the other network entity authenticates the device by verifying the token using the directory service.
Network identifier and authentication information generation for building automation system controllers
Generating network identifier information and authentication information for wireless communication with a controller includes accessing, by the controller, identity information associated with the controller. The controller obfuscates the identity information and generates the network identifier information and the authentication information associated with the controller using the obfuscated identity information. The controller is configured for wireless communication using the generated network identifier information and the generated authentication information.
Multiple level validation
A method may include receiving a digital certificate through a secure connection from a network access server, the secure connection passing through a network address translation device, validating the digital certificate with a policy management system, and establishing a secure tunnel between the network access server and the policy management system when the digital certificate is validated. Also, receiving, through the secure tunnel and from the network access server, a remote authentication dial-in user service access request having a network access server internet protocol address, validating the network access server with the network access server internet protocol address by the policy management system, and allowing a remote authentication dial-in user service traffic when the internet protocol address of the network access server is validated and closing the secure tunnel when the validating the network access server fails.
Systems and methods for passive continuous session authentication
Systems, apparatuses, methods, and computer program products are disclosed for generating behavioral attribute data structures. An example method includes generating, by video monitoring circuitry, a video data structure comprising a video stream captured over a duration of time, wherein the video stream comprises a plurality of video frames, extracting, by biometric attribute generation circuitry, a set of biometric attributes from the video stream, generating, by biometric attribute generation circuitry, a biometric attribute data structure comprising the set of biometric attributes extracted from the video data structure, generating, by sensor circuitry, a sensor data structure comprising a set of sensor data captured over the duration of time, and generating, by behavioral attribute generation circuitry, a behavioral attribute data structure from the sensor data structure and the biometric attribute data structure, wherein the behavioral attribute data structure comprises a set of behavioral attributes of the user derived from the set of sensor data.
Electronic access control and location tracking system
A method and system that allows authorized individuals access into controlled access locations and the ability to grant temporary and limited access to guests into these locations. The method and system allow for navigational services to be provided to members and guests, and real-time tracking and confirmation to members and administrators that guests have arrived at their destination and did not enter any unauthorized areas. The method preferably can work through a system of wireless radio, sound and/or light-based beacons communicating with member and guest's electronic devices. Members and administrators can send one or more temporary electronic access keys to a guest's smartphone or other electronic device. Wireless radio, sound and/or light-based beacons provide an access control and location tracking system with real-time data about the member and guest whereabouts, allowing for the confirmation and tracking.
Card-personalization system
A personalized card may be generated using a card-personalization system accessible via multiple access points on a network. In some aspects, the personalized card may include a physical card having an image selected by a user in a card-personalization process. The user may be assigned a code that may both authenticate the user to access the card-personalization system and identify a position of the user in the card-personalization process. The card-personalization process may include a selection process for selecting an image, an approval process for approving the image, and a creation process for generating the personalized card including the image.
Digital safety and account discovery
Methods, computer-readable media, software, and apparatuses may assist a consumer in keeping track of a consumer's accounts in order to prevent unauthorized access or use of the consumer's identified subscriptions and financial accounts. The identified subscriptions and financial accounts may be displayed to the consumer along with recommendations and assistance for closing unused or unwanted financial accounts and subscriptions to prevent unauthorized access or use.