Patent classifications
G06F2221/2129
System for advanced protection of consumable or detachable elements
A method of authenticating a consumable or detachable element of a continuous inkjet printer comprising: the controller of the printer generating a 1.sup.st item of random information that is dispatched to an authentication circuit of the element; encrypting the 1.sup.st item of information by the authentication circuit using a 1.sup.st encryption algorithm and a 1.sup.st secret key to form a 1.sup.st item of encrypted random information; dispatching the 1.sup.st item of information to the controller; encrypting the 1.sup.st item of information by the controller using a 2.sup.nd encryption algorithm and a 2.sup.nd secret key to form a 2.sup.nd item of encrypted random information; comparing the 1.sup.st item of encrypted random information with the 2.sup.nd encrypted item of random information to authenticate the consumable element; and if the consumable element is authenticated, dispatching at least one part of a 3.sup.rd key, termed the shared key, by the element to the printer.
Server apparatus, mobile shop, and information processing system
A server apparatus includes a controller configured to detect an item to be purchased, based on a temporal change in captured images of an item display position at a mobile shop and, upon acquiring authentication information for a purchaser from a first terminal apparatus, perform a charging process in respect of the purchaser for a price of the item.
System and method for providing security services with multi-function supply chain hardware integrity for electronics defense (SHIELD)
A system and a method for a supply-chain hardware integrity for electronics defense (SHIELD) dielet embedded over a component of a device, a radio frequency identification (RFID) probe system coupled to the SHIELD dielet, and a secure server system communicating with the RFID probe system that can enable security services is provided. Embodiments include a multi-function SHIELD software defined, hardware enabled security system that provides hardware identity, anti-tamper, encryption key generation and management, trusted platform module services, and cryptographic software security services for a device.
Intelligent remote control
A content access device and system may allow portable remote devices to be paired with a variety of different devices, allowing remote control through a network connection. Content access devices may expose application program interfaces, allowing incoming network traffic to control operation of the device much in the same way that a local infrared remote would. Routing content commands through an external application server may also yield other benefits, such as allowing more customized selection of information and advertising content to users based on their viewing history.
Code execution environment customization system for object storage service
Systems and methods are described for modifying input and output (I/O) to an object storage service by implementing one or more owner-specified functions to I/O requests. Such functions can include data access control functions, data manipulation functions, and the like. The owner of an object collection maintained by the object storage service can specify code execution environment rules that can give privileges to the execution of such functions such as by allowing the functions to access external services or the requesting user's private resources. In this manner, owners of the object collection are provided with greater control over how the object collection is accessed.
Identity proofing and portability on blockchain
A system for combining data from various data providers, certain portions of said data necessary to perform identity related services, said portions of said data combined into a central repository with a secure data structure, said data structure made available to outside parties participating in verification or validation services on at least a part of said portions of said data, storing the results of said services as separate entries in said data structure, resulting after a review in a total score, that can be used as a proofed portable identity verification.
Partitioned platform security mechanism
A computer platform is disclosed. The computer platform comprises a central processing unit (CPU) including at least one socket having a plurality of tiles and control circuitry to partition the socket into a plurality of sub-sockets and assign a unique identity to each of the plurality of sub-sockets for security verification, wherein each sub-socket comprises at least one of the plurality of tiles to operate as a cluster of resources.
SYSTEMS FOR ENHANCED BILATERAL MACHINE SECURITY
Embodiments of the invention are directed to systems, methods, and computer program products for providing an enhanced form of machine security through the intelligent correlation of machine identity information with user account information and providing a unique process for automated display of such information to an end user. The system allows for the end user to quickly and visually identify that the user is interacting with a legitimate system or web-form, thereby reducing instances where the user may inadvertently share sensitive information with unauthorized parties.
REMOTELY MANAGING A RING SCANNER DEVICE, AND APPLICATIONS THEREOF
Embodiments position a barcode reader, or other optical detector, to scan upright barcodes when the user hand is in the neutral position. To do this, embodiments rest the body of the ring scanner device on top of the index finger, with the palm facing inward toward the users body. Embodiments have integrated interactivity, including a touchscreen display and separate buttons that can be used to operate the optical detector and input data into an integrated computing device. The integrated computing device can run software applications on board the ring scanner device. Finally, the integrated computing device can be remotely managed.
Authentication system
In an authentication system, when an electrical component with a temporary ID recorded by a temporary ID assignment device is connected to a switching hub, a temporary authentication device performs temporary authentication based on switching hub information describing the switching hub to which the electrical component is connected, the temporary ID of the electrical component, and temporary authentication inquiry information. A main authentication device performs main authentication based on the switching hub information of the switching hub to which the electrical component with a formal ID recorded by the formal ID assignment device is connected, and the formal ID of the electrical component, and main authentication inquiry information.