Abstract:
Examples disclosed herein relate to receiving a request from an entity to be granted a new permission, identifying, within a hierarchy of entities, a lowest level manager with approval authority for the new permission, determining whether the lowest level manager with approval authority for the new permission has approved the entity to be granted the new permission, and, in response to determining that the lowest level manager with approval authority for the new permission has approved the entity to be granted the new permission, applying a policy statement associated with the new permission to the entity.
Abstract:
A roaming device obtains an identifier for a network-enabled resource as a result of interacting with the network-enabled resource. The roaming device uses the identifier to obtain a link for the network-enabled device through a cloud service. The address is used to access and use the network-enabled resource using the cloud service.
Abstract:
Methods and apparatus to identify regions including unauthorized products are disclosed. A processor is to access a request for verification of authenticity of a product transmitted from a remote computing device. The request includes verification data and location data. The location data is based on global positioning satellite information generated by the remote computing device at a time when the remote computing device generates the verification data based on a verification code printed on the product. The processor is to determine whether a particular region including the physical location has at least a threshold likelihood of being a region in which unauthorized products are available. The processor is to construct boundaries of the particular region to 1) have less than a first area and 2) include at least a threshold number of invalid requests for verification within the boundaries.
Abstract:
In one example, a method for registering a printing device with a network-based service is described. The method may include a printing device receiving a print request, where the print request comprises an image, determining that the image includes a command to connect to a server of a network-based service to register the printing device with the network-based service. The method may further include the printing device connecting to the server in response to the command and receiving a verification from the server that the printing device is registered with the network-based service.
Abstract:
Methods and systems are described to determine authenticity of a consumable product. The determining of authenticity may include communicating with a listing engine that contains a list of identifiers for consumable products classified as non-authentic, installing a consumable product in the host device where the consumable product stores an identifier in memory, and determining whether the consumable product matches one of the identifiers.
Abstract:
An example print supply includes a non-transitory computer-readable medium. The non-transitory computer-readable medium includes data. The data includes an indication of a schema for the data. The data also includes an indication of an identifier. The data includes an indication of a digital signature. The digital signature is usable to authenticate a type of the data, the schema, and the identifier. The print supply also includes a communication interface. The communication interface is to output the data from the non-transitory computer-readable medium.
Abstract:
An example print supply includes a non-transitory computer-readable medium. The non-transitory computer-readable medium includes data. The data includes an indication of a schema for the data. The data also includes an indication of an identifier. The data includes an indication of a digital signature. The digital signature is usable to authenticate a type of the data, the schema, and the identifier. The print supply also includes a communication interface. The communication interface is to output the data from the non-transitory computer-readable medium.
Abstract:
In some examples, a device authenticates a first consumable product installed in the device, sends a first identifier of the authenticated first consumable product over a network to an engine, receives, over the network from the engine, a list of identifiers for consumable products classified as non-authentic, and in response to installation of a second consumable product in the device that stores an identifier in memory, determines whether the identifier of the second consumable product matches one of the identifiers in the received list of identifiers.
Abstract:
In one example, a method for registering a printing device with a network-based service is described. The method may include a printing device receiving a print request, where the print request comprises an image, determining that the image includes a command to connect to a server of a network-based service to register the printing device with the network-based service. The method may further include the printing device connecting to the server in response to the command and receiving a verification from the server that the printing device is registered with the network-based service.
Abstract:
A system for associating a data collector with a network account includes a first computing device to collect data associated with the use of a number of object devices on a network. The first computing device creates a network account associated with a second computing device, and the first computing device assigns a filename to a data collector data packet. The filename includes information related to the network account associated with the second computing device. The information related to the network account is embedded within binary code of the data collector data packet.