SOFTWARE CREDENTIAL TOKEN PROCESS, SOFTWARE, AND DEVICE

    公开(公告)号:US20230179420A1

    公开(公告)日:2023-06-08

    申请号:US18145841

    申请日:2022-12-22

    Abstract: Embodiments for a computer readable medium including a software module are provided. The software module causes one or more processing devices to obtain a biometric identifier from a user. Access to a resource is requested by providing a software credential token and the biometric identifier. The software credential token corresponds to a hardware credential token, and the hardware credential token is one of a set of hardware credential tokens that are used to access the resource. An indication that access to the resource has been granted is received and after receiving the indication an indication that the access to the resource has been revoked is received. After receiving the indication that access to the resource has been revoked, a biometric identifier is re-obtained from a user and access to the resource is re-requested by providing a software credential token and the re-obtained biometric identifier.

    Software credential token process, software, and device

    公开(公告)号:US11539524B1

    公开(公告)日:2022-12-27

    申请号:US16946940

    申请日:2020-07-13

    Abstract: Embodiments for a computer readable medium including a software module are provided. The software module causes one or more processing devices to obtain a biometric identifier from a user. Access to a resource is requested by providing a software credential token and the biometric identifier. The software credential token corresponds to a hardware credential token, and the hardware credential token is one of a set of hardware credential tokens that are used to access the resource. An indication that access to the resource has been granted is received and after receiving the indication an indication that the access to the resource has been revoked is received. After receiving the indication that access to the resource has been revoked, a biometric identifier is re-obtained from a user and access to the resource is re-requested by providing a software credential token and the re-obtained biometric identifier.

    Database connector using attribute-based encryption

    公开(公告)号:US10810314B1

    公开(公告)日:2020-10-20

    申请号:US15851850

    申请日:2017-12-22

    Abstract: Embodiments for a database connector are disclosed. The database connector can encrypt data from an application before storing the data in the database using attribute-based encryption (ABE). The database connector can also decrypt data retrieved from the database using an ABE private key before sending the data to the application. The database connector can generate a logical attribute statement for encryption of data from the application based on attributes, logical relations, and/or relational operators received from the application, directly from a user, or imbedded within rules governing logical attribute statement genesis.

    LOW-OVERHEAD ROUTING
    4.
    发明申请

    公开(公告)号:US20200328972A1

    公开(公告)日:2020-10-15

    申请号:US16812917

    申请日:2020-03-09

    Abstract: A method of routing an Internet Protocol (IP) packet from a routing device is provided. The method includes receiving a first IP packet having a first IP header and a first IP data field, the first IP packet having a final destination corresponding to a destination device communicatively coupled to the routing device via a network route including at least two hops between the routing device and the final destination. A second IP packet having a second IP header and a second IP data field is generated. The second IP data field is a copy of the first IP data field, and a destination IP address field in the second IP header includes an IP address of a next hop on the network route. The second IP packet does not include an IP address of the final destination in the second IP header.

    Sleep/wake based on coverage
    6.
    发明授权

    公开(公告)号:US11968621B1

    公开(公告)日:2024-04-23

    申请号:US17339658

    申请日:2021-06-04

    Inventor: Barry A. Trent

    CPC classification number: H04W52/0225 H04W4/02

    Abstract: Embodiments for a module for scheduling sleep/wake intervals for a first one or more communication devices are disclosed. The module includes a computer readable medium having instructions thereon. The instructions, when executed by one or more processing devices, cause the one or more processing devices to obtain a coverage prediction for the one or more mobile communication devices. The coverage prediction indicates a start and an end of at least one future interval during which one or more orbiting communication platforms are predicted to be within range of the one or more mobile communication devices. The instructions also cause the one or more processing devices to generate at least one future sleep interval having a start and an end and at least one future wake interval having a start and an end to control the one or more mobile communication devices based on the coverage prediction.

    Vehicle path based on coverage of nodes

    公开(公告)号:US10482773B1

    公开(公告)日:2019-11-19

    申请号:US15622142

    申请日:2017-06-14

    Abstract: A method of generating a path for a vehicle is disclosed. The method includes receiving information indicating a location of each of a plurality of communication nodes. The vehicle is configured to send wireless signals to and receive wireless signals from the plurality of communication nodes. A path of motion for the vehicle is determined based on coverage of the plurality of communication nodes along the path. Coverage corresponds to connectivity between the vehicle and the plurality of communication nodes.

    Method for network communication past encryption devices
    9.
    发明授权
    Method for network communication past encryption devices 有权
    通过加密设备进行网络通信的方法

    公开(公告)号:US09191377B2

    公开(公告)日:2015-11-17

    申请号:US14165192

    申请日:2014-01-27

    Abstract: This disclosure is directed to techniques for providing communication between devices in different networks wherein the communication must first pass through an encryption mechanism and the devices do not have the stand-alone capability to encrypt or decrypt the communication. According to these techniques, an adapter may determine certain fields in a data packet that remain unencrypted when the data packet passes through the encryption mechanism. The adapter may then process those fields in such a way that, when the data packets are received by a second adapter, the second adapter may read those fields and obtain information.

    Abstract translation: 本公开涉及用于在不同网络中的设备之间提供通信的技术,其中通信必须首先通过加密机制,并且该设备不具有加密或解密通信的独立能力。 根据这些技术,当数据分组通过加密机制时,适配器可以确定在数据分组中保持未加密的某些字段。 然后,适配器可以以这样的方式处理这些字段,即当数据分组被第二适配器接收时,第二适配器可以读取这些字段并获得信息。

    Software credential token process, software, and device

    公开(公告)号:US12058262B2

    公开(公告)日:2024-08-06

    申请号:US18145841

    申请日:2022-12-22

    Abstract: Embodiments for a computer readable medium including a software module are provided. The software module causes one or more processing devices to obtain a biometric identifier from a user. Access to a resource is requested by providing a software credential token and the biometric identifier. The software credential token corresponds to a hardware credential token, and the hardware credential token is one of a set of hardware credential tokens that are used to access the resource. An indication that access to the resource has been granted is received and after receiving the indication an indication that the access to the resource has been revoked is received. After receiving the indication that access to the resource has been revoked, a biometric identifier is re-obtained from a user and access to the resource is re-requested by providing a software credential token and the re-obtained biometric identifier.

Patent Agency Ranking