Patent classifications
G06F2221/2151
Method and Device for Determining a Definite Distance
A method for determining a definite safe distance between a wirelessly communicating object transponder and at least one anchor gateway in accordance with a two-way ranging method, wherein transmission and reception timestamps are detected for each communication message via the transponder and the at least one anchor gateway, each of the timestamps from the transponder and the at least one anchor gateway together with at least one respective piece of timestamp monitoring information are transmitted to a failsafe computing device, at least one check is implemented via the failsafe computing device, and the definite safe distance is determined via the failsafe computing device aided by the checked timestamps, where timestamp errors occurring during the detection of the timestamps are caused solely by the transponder or alternatively solely the one anchor gateway.
SYSTEM AND METHOD FOR IMPROVING CYBERSECURITY FOR TELECOMMUNICATION DEVICES
Methods and systems are described herein for improvements for cybersecurity of telecommunication devices. For example, cybersecurity for telecommunication devices may be improved by analyzing activity log data of telecommunication devices for a candidate event (e.g., the uploading of malware) and disabling one or more services of a telecommunication device. By doing so, cybersecurity for telecommunication devices may be improved by detecting a possible malware intrusion attempt and disabling one or more services of the telecommunication devices. For example, activity log data of telecommunication devices may be obtained. A candidate event indicating malware may be detected in the activity log data. A number of proximate telecommunication devices satisfying a proximity threshold condition may be determined. The number of proximate telecommunication devices that satisfy a density threshold condition may be determined. Responsive to the number of telecommunication devices satisfying a density threshold condition, services of telecommunication devices may be disabled.
DETECTING ATTACKS USING COMPROMISED CREDENTIALS VIA INTERNAL NETWORK MONITORING
The threat of malicious parties exposing users' credentials from one system and applying the exposed credentials to a different system to gain unauthorized access is addressed in the present disclosure by systems and methods to preemptively and reactively mitigate the risk of users reusing passwords between systems. A security device passively monitors traffic comprising authorization requests within a network to reactively identify an ongoing attack based on its use of exposed credentials in the authorization request and identifies accounts that are vulnerable to attacks using exposed credentials by actively attempting to log into those accounts with exposed passwords from other networks. The systems and methods reduce the number of false positives associated with attack identification and strengthens the network against potential attacks, thus improving the network's security and reducing the amount of resources needed to securely manage the network.
Authentication of an Entity
There is provided a method performed by a first entity of a network. Contextual information for the first entity and a timestamp for the contextual information is acquired (102). An authentication token is generated (104) using the acquired contextual information. Transmission of an authentication request message is initiated (106) towards a second entity of the network requesting authentication of the first entity with the second entity. The authentication request message comprises the generated authentication token and the timestamp for use in the authentication. An authentication response message indicative of whether authentication of the first entity with the second entity is successful or unsuccessful received (108).
APPARATUSES AND METHODS FOR DETERMINING AND PROCESSING DORMANT USER DATA IN A JOB RESUME IMMUTABLE SEQUENTIAL LISTING
Aspects relate to apparatuses and methods for determining and processing dormant data records on an immutable sequential listing. An exemplary apparatus includes a processor configured to monitor a plurality of timestamps associated with a plurality of data records stored on the immutable sequential listing, where the data record includes a job resume, detect inactivity in a first data record of the plurality of data records over a predetermined time period as a function of a first timestamp of the first data record, wherein the predetermined time period may be set by the user, tag, as a function of the inactivity, the first data record as an inactive first data record, and process, as a function inactivity, the first data record, wherein processing may include adding additional data or archiving inactive data records from the immutable sequential listing.
Preventing digital forgery
A set of security templates is maintained including first and second templates. The first template specifies time and location stamp authentication for a file, and contextual security conditions that must be met before the file can be accessed. The second template specifies the time and location stamp authentication, but not the contextual security conditions. One of the first or second security templates is applied to the particular file. When the second security template is applied, a GPS-crypto device adds a time and location stamp to the particular file. The particular file is signed using a private key associated with the GPS-crypto device to generate an authentication signature based on the time and location stamp. The authentication signature is added to the particular file to allow a recipient to verify the time and location stamp of the particular file using a public key corresponding to the private key.
User controlled event record system
A user controlled mobile device for use in countering phantom billing fraud in connection with receiving or providing health care services includes one or more components capturing and outputting biometric data and location data, and a data storage device holding an event record created without explicit user intervention indicating whether the particular user was at the particular location, the event record including a timestamp corresponding to events at or near a time of the timestamp including a time of capture of the biometric and location data, the biometric data and location data, where the stored event record serves as the personal audit trail evidencing an existence or absence of phantom billing.
SYSTEMS AND METHODS FOR SECURING OPERATION OF AN ULTRASOUND SCANNER
The present embodiments relate generally to systems and methods for securing operation of an ultrasound scanner for use with a multi-use electronic display device. In some embodiments, the multi-use electronic display device can control whether the ultrasound scanner is permitted to generate ultrasound image data for display based on an institution affiliation status of the ultrasound scanner retrieved from a server. In some embodiments, the multi-use electronic display device can control whether the ultrasound scanner is permitted to generate ultrasound image data for display based on whether a digital certificate provided by a server is successfully validated.
Method of operating memory system with replay attack countermeasure and memory system performing the same
In a method of operating a memory system, first security data and a first timestamp for preventing a replay attack are written by a host device to a first memory area which is an external memory area. A second timestamp is updated by the host device based on the first timestamp. The second timestamp corresponding to the first timestamp is stored in a second memory area distinguished from the first memory area. A first notification signal representing a result of updating the second timestamp is received by the host device. A writing operation for the first security data is completed when it is determined, by the host device, based on the first notification signal that the second timestamp is successfully updated.
METHOD AND TOKEN FOR DOCUMENT AUTHENTICATION
A method and token (3) for corroborating a document (25) includes having a registered token (3) with a token identity. The token (3) is able to print visual markings. A document identifier is obtained (18) based on at least the token identity and a timestamp. The document identifier is encoded (19) into a visual marking (24), and the visual marking (24) is applied to the document (25). A copy of the document (25) is obtained (27) with or without the visual marking (24), and copy is stored in association with the document identifier. The token (3) includes storage holding a token identity and a printing unit. The token (3) is configured to receive the visual marking (24) encoding a document identifier associated with the token identity and to print the received visual marking (24). A method also verifies a document (41) having a corresponding visual marking (42).