Patent classifications
G06F7/04
Controlling maintenance of a fuel dispenser
Systems and methods are provided for controlling maintenance of a fuel dispenser. In one exemplary embodiment, a system is provided having a fuel dispenser that includes an electronics module having a data processor, a remote enterprise server in communication with the electronics module, and a remote code processor in communication with the remote enterprise server. The data processor is configured to determine an authorization password based on data characterizing the fuel dispenser, to receive a remote password that is generated by the remote code processor based on the fuel dispenser data, to determine that the remote password matches the authorization password, and to cause the fuel dispenser to enter a maintenance mode.
Conducting secure interactions utilizing reliability information
Embodiments of the invention are directed assessing reliability between two computing devices. A distributed database may maintain reliability associations between pairs of computing devices. Each reliability association may indicate a particular device has determined (e.g., locally) that another device is reliable. In order to determine an amount of reliability between a first computing device and a second computing device, an ordered combination of the reliability associations may be determined utilizing the distributed database. The ordered combination of reliability associations may identify a reliability path between the first computing device and the second computing device. An amount of reliability may be determined based on the reliability path. An interaction between the devices may be allowed or restricted based at least in part on the amount of reliability between the computing devices.
Apparatus and method for evaluating and modifying data associated with digital identities
An apparatus has a processor and a memory connected to the processor. The memory stores instructions executed by the processor to store identity attributes including real identity attributes for a real individual and at least two sets of digital identity attributes each operative as a personal privacy proxy with compartmental identity attributes. The at least two sets of digital identity attributes each include a digital identity name, a digital identity mobile device number and a digital identity email address. The at least two sets of digital identity attributes are evaluated to produce a similarity measure. The real individual is provided with a recommendation based upon the similarity measure.
Confidential information sharing system
A computer-implemented method for sharing information about a subject without disclosing identification information of the subject includes comparing, by a computer system, a third set of data with a fourth set of data. The third set of data is converted by a transformation from a first set of data. The first set of data comprises identification information of a first subject. The fourth set of data is converted by the transformation from a second set of data. The second set of data comprises identification information of a second subject. The transformation renders the first subject unidentifiable from the third set of data and the second subject unidentifiable from the fourth set of data. The computer-implemented method also determines, by the computer system, that the first subject corresponds to the second subject when the third set of data corresponds to the fourth set of data.
Access management system and access management method
According to one embodiment of the present application, provided is an access management method of an access control device, comprising the steps of: receiving, from a user terminal, a first advertising packet including open authentication information; generating a key on the basis of at least a first random key; confirming the open authentication information on the basis of the generated key; and determining the opening of a door on the basis of the open authentication information.
Systems and methods for authenticating application points of entry to prevent unauthorized use of locked mobile applications
The disclosed computer-implemented method for authenticating application points of entry to prevent unauthorized use of locked mobile applications may include (i) identifying one or more mobile applications having an access restriction and a group of application entry points associated with at least one mobile application function, (ii) intercepting a series of device inputs from a user for accessing the application entry points to bypass the access restriction for the mobile applications, (iii) requesting authentication credentials to bypass the access restriction from the application entry points, (iv) determining that the requested authentication credentials are invalid, and (v) performing a security action that protects against potentially malicious activity associated with unauthorized access to the mobile applications upon determining that the requested authentication credentials are invalid. Various other methods, systems, and computer-readable media are also disclosed.
Processor with network processing stack having separate binary
The disclosed technology is generally directed to network security for processors. In one example of the technology, a device includes: a memory that is adapted to store run-time data for the device, and a processor. The processor is adapted to execute processor-executable code including a first binary that includes at least one application and a kernel, and a second binary. The second binary is configured to perform networking functions exclusively, including networking functions of one more of layers three through seven of the Open Systems Interconnection (OSI) model.
System and method for managing built-in security for content distribution
A system is configured for managing a plurality of files containing sensitive information associated with an organization to be sent to a particular receiver. The system is further configured to determine whether the particular receiver is an internal receiver or an external receiver with respect to the organization. If the particular receiver is an external receiver, a CRC code generated from the personal information and location coordinates of an external server where the plurality of files will be accessed is added to the plurality of files. A security code is also added to the plurality of files to facilitate that they are secured from being exposed and disposed at a retention time set by the organization. The system generates a custom compressed file from the plurality of files, configures it to be decompressed by the personal information of the external receiver, and sends it to the external receiver.
Verification of computer system prior to and subsequent to computer program installation
Embodiments of the present invention provide a method, system, and computer program product for debugging a computer environment. In an embodiment of the invention, an anomaly is detected in a computing environment of multiple different computing devices disposed in multiple different network domains. Thereafter, administrative network privileges to access the multiple different network domains are acquired and existing resources in the computing environment are identified. Additionally, a signature file is loaded into a memory of the computer, where the signature file denotes infrastructure requirements of the computing environment, and the existing resources and the infrastructure requirements denoted in the signature file are compared to determine whether a disparity exists between the existing resources and the infrastructure requirements. Upon determining that the disparity exists between the existing resources and the infrastructure requirements a configuration of the computing environment of the multiple different computing devices is adjusted to fix the disparity.
Peer applications trust center
Concepts and technologies are disclosed herein for a peer applications trust center. A trust client can execute on a client computer and a trust service can execute on a server computer to provide the peer applications trust center. The trust client or trust server can register applications. During registration, the trust server or the trust client can generate a public key or other identifier for identifying the registered application. If another application requests access to the registered application, the trust server or the trust client can determine if the request specifies a registered application by name. If the requestor is granted access to the application, the requestor can be issued a token. Tokens can be revoked, updated, replaced, or renewed for various purposes.