Abstract:
A system, apparatus, method, and machine readable medium are described for implementing a composite authenticator. For example, an apparatus in accordance with one embodiment comprises: an authenticator for authenticating a user of the apparatus with a relying party, the authenticator comprising a plurality of authentication components; and component authentication logic to attest to the model and/or integrity of at least one authentication component to one or more of the other authentication components prior to allowing the authentication components to form the authenticator.
Abstract:
A system, apparatus, method, and machine readable medium are described for performing advanced authentication techniques and associated applications. For example, one embodiment of a method comprises: receiving a policy identifying a set of acceptable authentication capabilities; determining a set of client authentication capabilities; and filtering the set of acceptable authentication capabilities based on the determined set of client authentication capabilities to arrive at a filtered set of one or more authentication capabilities for authenticating a user of the client.
Abstract:
A system, apparatus, method, and machine readable medium are described for adaptive authentication. For example, one embodiment of an apparatus comprises: an adaptive authentication module to receive a client request to perform a transaction which requires authentication; a risk engine to analyze first data related to a client to determine a risk value associated with the client; an assurance level gain analysis module to determine an assurance level required for allowing the client to complete the transaction and to determine an assurance level gain required to arrive at the assurance level based on the risk value; the adaptive authentication module to select one or more authentication techniques based at least in part on the indication of the assurance level gain.
Abstract:
The distributor of a cigarette rod making machine employs a zig-zag sifter which receives a mixture of tobacco ribs and shreds from a reservoir by way of a duct or an elevator conveyor. The shreds leave the uppermost stage of the sifter and are conveyed, by a Coanda separator, into an upright gathering duct which discharges shreds for delivery onto the concave surface(s) of one or more guides serving to direct one or more streams of shreds against the underside(s) of one or more foraminous belt conveyors which advance the stream(s) past one or more trimming devices serving to remove the surplus and to thus convert each stream into a rod-like filler which is ready to be draped into a web of cigarette paper. The removed surplus is returned into the reservoir or directly into the zig-zag sifter.
Abstract:
The diameters of successive rod-shaped articles of the tobacco processing industry are ascertained while the articles advance in the flutes of a conveyor, first along a rolling unit which turns successive articles at random through different angles and thereupon past a photoelectronic detector wherein a radiation source emits a narrow beam of radiation which impinges upon successive articles for intervals of time which are dependent upon the diameters of the articles. The transducer of the detector generates signals which are indicative of the monitored diameters, and such signals are transmitted to an evaluating circuit which controls an ejector for unsatisfactory articles and/or displays the monitored diameters on a screen. The articles are partially lifted off the conveyor by cushions of compressed air during transport past the rolling unit.
Abstract:
A system, apparatus, method, and machine readable medium are described for implementing privacy classes within an authentication framework. For example, one embodiment of a method comprises: transmitting a query for client information from a server to a client, the client information including information related to authentication devices coupled to the client; analyzing the query to determine an appropriate privacy class to be used for providing client information to the server; providing a subset of client information selected based on the determined privacy class, the subset of client information including the information related to the authentication devices coupled to the client; and using the subset of client information within an authentication framework to provide user authentication services over a network.
Abstract:
A system, apparatus, method, and machine readable medium are described for non-intrusive privacy-preserving authentication. For example, one embodiment of a method comprises: entering into a legitimate user state on a client device for a time period following an explicit authentication by an end user; recording reference data related to user behavior while in the legitimate user state; measuring user behavior when outside of the legitimate user state and arriving at an authentication assurance level based on a distance between the measured user behavior and the recorded reference data; in response to an authentication request within the legitimate user state, providing an authentication assurance level at or above a defined threshold, the authentication assurance level being sufficient to authenticate the user to a relying party; and in response to an authentication request while outside of the legitimate user state, providing the authentication assurance level based on a distance between the measured user behavior and the recorded reference data.
Abstract:
A system, apparatus, method, and machine readable medium are described for determining the authentication capabilities. For example, one embodiment of a method comprises: receiving a policy identifying a set of acceptable authentication capabilities; determining a set of client authentication capabilities; and filtering the set of acceptable authentication capabilities based on the determined set of client authentication capabilities to arrive at a filtered set of one or more authentication capabilities for authenticating a user of the client.
Abstract:
A system and method for generating and storing a large number of public key certificates that enables a revocation status to be determined while providing a smaller amount of storage than is typically required.
Abstract:
The diameters of rod-shaped articles of the tobacco processing industry are ascertained while the articles are transported past a measuring station in the flutes of a drum-shaped conveyor moving along a range finder which measures the distance of each article of a series of articles from a reference point and transmits appropriate signals to an evaluating circuit wherein the diameters of successive articles are determined on the basis of comparison with a fixed reference distance of the bottoms of the flutes from the reference point. The beam of radiation which is emitted by the radiation source of the range finder is reflected by successive articles, and the intensity of reflected radiation is used to generate second signals which are processed into signals denoting a second diameter of each article. A third diameter of each article can be ascertained downstream of the range finder by an optoelectronic detector.