-
公开(公告)号:US11379576B2
公开(公告)日:2022-07-05
申请号:US16910794
申请日:2020-06-24
Applicant: Capital One Services, LLC
Inventor: Austin Walters , Jeremy Goodsitt , Vincent Pham
Abstract: Aspects described herein may allow for the application of an artificial neural network architecture to identify intrusion in a database. Changes to components of a data table of the database may be tracked as a snapshot of the changes over a period of time. Any change in the data table may be associated with a user. Utilizing multiple snapshots, a background substitution technique may be utilized to generate a matrix of the changes to the data table over a period of time. A model having an artificial neural network architecture may utilize the matrix as an input set to identify the user as an unauthorized user accessing the database.
-
公开(公告)号:US20220179936A1
公开(公告)日:2022-06-09
申请号:US17111056
申请日:2020-12-03
Applicant: Lenovo (Singapore) Pte. Ltd.
Inventor: Arnold S. Weksler , Sandy Scott Collins , Neal Robert Caliendo, JR.
Abstract: One embodiment provides a method, including: receiving, at an information handling device positioned within a vehicle, a command from a vehicle occupant to initiate a function; transmitting, responsive to the receiving and prior to initiation of the function, an authorization request to a secondary device designated as an authorization authority; determining, using a processor, whether confirmation of the authorization request is received from the secondary device; and initiating, responsive to determining that confirmation of the authorization request is received from the secondary device, the function. Other aspects are described and claimed.
-
公开(公告)号:US11341279B2
公开(公告)日:2022-05-24
申请号:US16524751
申请日:2019-07-29
Applicant: International Business Machines Corporation
Inventor: Andrew C. M. Hicks , Ryan Thomas Rawlins , Christopher V. DeRobertis , Khaalid Persaud Juggan McMillan
Abstract: A system is provided and includes a securable resource, a locking element configured to assume a locked condition in which the securable resource is locked and an unlocked condition in which the securable resource is unlocked, a first controller, which is receptive of an instruction to authorize users to unlock the securable resource, and a common interface to which the first controller and additional controllers, which are independent from the first controller and one another, are tied. The first controller is configured to authenticate the users and to perform operating system (OS) level control of the locking element in accordance with the instruction to authorize users and an authentication of the users by the common interface.
-
公开(公告)号:US11341223B1
公开(公告)日:2022-05-24
申请号:US16704872
申请日:2019-12-05
Applicant: Wells Fargo Bank, N.A.
Inventor: Kourtney Eidam , Andrew J. Garner, IV , Dennis Montenegro
Abstract: Techniques are described for enabling a user to access a secure system based on vital signs of the user that are collected by a wearable device worn by the user. The vital signs of the user may be used as an extra level of security when accessing the secure system. For example, a computing device may automatically validate that a user requesting access to a secure system is a person and not a robot based on receipt of vital signs of the user. As another example, a computing device may operate as a secure access badge that first analyzes vital signs of a user to confirm that the user is not in distress before sending an access signal to gain access to a secure system. In either example, the computing device may be a wearable device, or be paired to a wearable device to receive the vital signs.
-
">
公开(公告)号:US20220141010A1
公开(公告)日:2022-05-05
申请号:US17647812
申请日:2022-01-12
Applicant: Network-1 Technologies, Inc.
Inventor: John A. Nix
IPC: H04L9/08 , H04W12/04 , H04L9/40 , H04L9/32 , H04L12/28 , H04L9/30 , H04L9/00 , H04J11/00 , G06F21/44 , H04W4/70 , H04W52/02 , H04L67/04 , H04L9/14 , H04W12/02 , H04W40/00 , H04W76/27 , H04W12/033 , H04W8/08 , H04W12/40 , G06F21/35 , H04W12/06 , H04W80/04 , H04W88/12 , H04W84/12
Abstract: Methods and systems are provided for supporting efficient and secure “Machine-to-Machine” (M2M) communications using a module, a server, and an application. A module can communicate with the server by accessing the Internet, and the module can include a sensor and/or an actuator. The module, server, and application can utilize public key infrastructure (PKI) such as public keys and private keys. The module can internally derive pairs of private/public keys using cryptographic algorithms and a first set of parameters. A server can authenticate the submission of derived public keys and an associated module identity. The server can use a first server private key and a second set of parameters to (i) send module data to the application and (ii) receive module instructions from the application. The server can use a second server private key and the first set of parameters to communicate with the module.
-
公开(公告)号:US20220129215A1
公开(公告)日:2022-04-28
申请号:US17500943
申请日:2021-10-14
Applicant: Naohiko KUBO , Naritake KONDOH
Inventor: Naohiko KUBO , Naritake KONDOH
Abstract: An output system includes circuitry to generate information on a character string in response to an authentication request including user identification information transmitted from an output apparatus. The circuitry further transmits the information on the character string to an information processing device. In response to receiving the information on the character string and the user identification information from the output apparatus that has received the information on the character string and the user identification information from the information processing device, the circuitry further performs authentication for a user identified by the user identification information, based on the information on the character string and the user identification information, and transmits an authentication result to the output apparatus.
-
公开(公告)号:US20220116756A1
公开(公告)日:2022-04-14
申请号:US17560648
申请日:2021-12-23
Applicant: GOOD2GO, INC.
Inventor: Frances Heller
Abstract: A system allows an end-user to locate and gain access to an access-controlled facility or resource, such as a restroom, phone charging station, or Wi-Fi hot spot. Some implementations of the system monitor the formation and concentration of individuals into crowds that may place a higher demand on facilities and resources located near the crowd. The system may distribute mobile facilities to areas that offer convenient access to potential developing crowds, and when the system determines that there is a disparity between available resources and crowd demand reaches a certain level it may deploy one or more mobile facilities to positions proximate to that crowd. A mobile facility may also be requested on demand by a user or organizer, and some implementations provide cost sharing mechanisms and other user benefits related to requesting and accessing the facility.
-
公开(公告)号:US11301555B2
公开(公告)日:2022-04-12
申请号:US16510338
申请日:2019-07-12
Applicant: Traitware, Inc.
Inventor: Herbert W. Spencer, III , Christopher M. Canfield , Harlan Hutson , Vince Conroy , Steven A. Hickerson
IPC: H04L29/06 , H04W12/06 , G06F7/04 , G06F15/16 , G06F21/31 , G06F21/34 , G06F21/35 , G06F21/62 , G06F21/73 , H04W12/77
Abstract: A system for creating authenticating a user from user information, hardware profile, and combinations thereof, where the hardware profile includes user generated data stored on an electronic device.
-
公开(公告)号:US20220083638A1
公开(公告)日:2022-03-17
申请号:US17532493
申请日:2021-11-22
Applicant: DNANudge Limited
Inventor: Christofer TOUMAZOU , Georgina TOUMAZOU
IPC: G06F21/32 , G06F1/16 , H04L29/06 , G06F21/35 , G16B20/20 , G06F16/953 , G06F16/24 , H04W4/80 , H04W4/21 , G06Q30/06 , H04W12/033
Abstract: A computer-implemented method of comparing one or more genetic traits of two users. Each user has a wearable device storing data indicative of the one or more genetic traits, the data having been obtained by an analysis of a biological sample provided by the user. The method comprises: transmitting the data indicative of the one or more genetic traits from a first of the wearable devices to a first computer device using a short-range wireless data connection; transmitting the data from the first computer device to a second computer device over a data network; transmitting the data from the second computer device to a second of the wearable devices over a short-range wireless data connection; and comparing the data from the first wearable device with the data stored on the second wearable device to determine whether there is a match between the users' one or more genetic traits.
-
公开(公告)号:US11275821B2
公开(公告)日:2022-03-15
申请号:US16575795
申请日:2019-09-19
Applicant: Visa Europe Limited
Inventor: Boris Taratine
IPC: H04L29/06 , G06F21/35 , H04W4/80 , H04W12/04 , H04W12/08 , G06F21/43 , G06F21/72 , H04L9/32 , H04L9/12 , H04W12/63
Abstract: Systems, methods and apparatus for enabling access to secure data. A first module is arranged to generate a limited use passcode and make the passcode available to a user. A second module and a third module are arranged to communicate whereby to enable detection of the third module being in proximity to the second module. A fourth module is arranged to receive a passcode via user input. The apparatus is arranged to enable access to secure data in dependence on the fourth module receiving a valid passcode generated by the first module and the third module being in proximity to the second module.
-
-
-
-
-
-
-
-
-