Abstract:
A method, system, and/or computer program product securely manages smart card transactions. A processing entity receives a smart card identifier from a smart card. The smart card identifier is a transaction-specific identifier for a transaction, and contains no financial data about a holder of the smart card. The smart card identifier is hidden from a second party to the transaction. The processing entity receives transaction data for the transaction from the second party, where the transaction data is blocked from the smart card. In response to determining that the transaction is valid, the processing entity issues a transaction confirmation to the smart card and a transaction approval to the second party to the transaction.
Abstract:
A processor-implemented method, system, and/or computer program product defines multiple context-based conformed dimensional data gravity wells on a context-based conformed dimensional data gravity wells membrane. Conformed dimensional objects and synthetic context-based objects are parsed into n-tuples. A virtual mass of each parsed object is calculated, in order to define a shape of the multiple context-based conformed dimensional data gravity wells that are created when data objects that are pulled into each of the context-based conformed dimensional data gravity well frameworks on a context-based conformed dimensional gravity wells membrane.
Abstract:
A processor-implemented method, system, and/or computer program product defines multiple context-based conformed dimensional data gravity wells on a context-based conformed dimensional data gravity wells membrane. Conformed dimensional objects and synthetic context-based objects are parsed into n-tuples. A virtual mass of each parsed object is calculated, in order to define a shape of the multiple context-based conformed dimensional data gravity wells that are created when data objects that are pulled into each of the context-based conformed dimensional data gravity well frameworks on a context-based conformed dimensional gravity wells membrane.
Abstract:
A method securely manages smart card transactions. A processing entity receives a smart card identifier from a smart card, where the smart card is a virtual card on a mobile computing device that comprises a processor, where the smart card identifier is a transaction-specific identifier for a transaction. A protected application is received at the mobile computing device, where a received protected application initially cannot be utilized by an operating system for execution by the processor. A security object is received at the mobile computing device, where the security object is used to convert the received protected application into an executable application that can be utilized by the operating system for execution by the processor. The processor executes the executable application to act as the virtual card, where the virtual card provides a functionality of a predefined physical electronic card.
Abstract:
A computer-implemented method validates Internet of Things (IoT) device firmware levels for peer-to-peer communication in a network. Communication rules between a first device and a second device are utilized to establish a session to validate IoT device firmware levels between the first device and the second device on a network. The first device utilizes a first zero knowledge communication authentication with the second device to get a first assessment and a first proof. The second device utilizes a second zero knowledge communication authentication with the first device to get a second assessment and a second proof. Communication between the first device and the second device via the network is disabled until all assessments are a pass.
Abstract:
A computer-implemented method validates Internet of Things (IoT) device firmware levels for peer-to-peer communication in a network using a peer-to-peer registry. Each device in an IoT is registered anonymously by utilizing a unique device identifier and a firmware level in a peer-to-peer registry. Communication rules are provided by the peer-to-peer registry based on the device type and firmware level of each of the devices, in order to validate IoT firmware device levels between the first device and the second device on a network. The first device utilizes a first zero knowledge communication authentication with the second device to get a first assessment and a first proof. The second device utilizes a second zero knowledge communication authentication with the first device to get a second assessment and a second proof. Communication between the first device and the second device via the network is disabled until all assessments are a pass.
Abstract:
A processor-implemented method, system, and/or computer program product measures and displays facets in context-based conformed dimensional data gravity wells. Conformed dimensional objects and synthetic context-based objects are parsed into n-tuples. A virtual mass of each parsed object is calculated, in order to define a shape of multiple context-based conformed dimensional data gravity wells that are created when data objects that are pulled into each of the context-based conformed dimensional data gravity well frameworks on a context-based conformed dimensional gravity wells membrane. Data from the multiple context-based conformed dimensional data gravity wells then populates nodes in a data model. A displayed appearance of the particular context-based conformed dimensional data gravity well is dynamically adjusted according to how many parsed synthetic context-based objects are pulled into the particular context-based conformed dimensional data gravity well.
Abstract:
A computer-implemented method, system, and/or computer program product protects access to resources through use of a secure processor. A resource server receives an encrypted request from a requesting computer for access to a requested resource within the resource server. The requested resource is physically within an isolation area in the resource server that is initially communicatively protected from a network that connects the requesting computer to the resource server. The resource server establishes a communication session between a first secure processor in the resource server and a second processor in the requesting computer to provide secure communication between the requesting computer and the requested resource.
Abstract:
A processor-implemented method, system, and/or computer program product derives and utilizes a context object to generate a synthetic context-based object. A context object for a non-contextual data object is derived by contextually searching a document, which contains multiple instances of the non-contextual data object, according to a profile of a particular user. The non-contextual data object is associated with the derived context object to define a synthetic context-based object, where the non-contextual data object ambiguously relates to multiple subject-matters, and where the context object provides a context that identifies a specific subject-matter, from the multiple subject-matters, of the non-contextual data object. The synthetic context-based object is then associated with a data store in a data structure that contains heterogeneous data stores having different formats. A dimensionally constrained hierarchical synthetic context-based object library for multiple synthetic context-based objects is then constructed for handling requests for data stores from the particular user.
Abstract:
A processor-implemented method, system, and/or computer program product measures and displays facets in context-based conformed dimensional data gravity wells. Conformed dimensional objects and synthetic context-based objects are parsed into n-tuples. A virtual mass of each parsed object is calculated, in order to define a shape of multiple context-based conformed dimensional data gravity wells that are created when data objects that are pulled into each of the context-based conformed dimensional data gravity well frameworks on a context-based conformed dimensional gravity wells membrane. Data from the multiple context-based conformed dimensional data gravity wells then populates nodes in a data model. A displayed appearance of the particular context-based conformed dimensional data gravity well is dynamically adjusted according to the how closely each of the multiple parsed synthetic context-based objects matches said at least one context object and/or at least one dimension object.