-
公开(公告)号:US12113803B2
公开(公告)日:2024-10-08
申请号:US17167912
申请日:2021-02-04
Applicant: PerimeterX, Inc.
Inventor: Barak Mordechai Amar , Ben Diamant , Ido Safruti , Pablo Ariel Sirota
CPC classification number: H04L63/108 , G06F21/00 , G06F21/335 , G06F21/6218 , H04L63/068 , H04L63/0807 , H04L63/083 , H04L63/0876
Abstract: Ordered access to resources is controlled by restricting access to additional resources that are accessible when a client device provides an authentication provided when accessing an initial resource. When the client device accesses the initial resources, a set of access parameters are identified describing the request and the client device providing the request, and included with an expiration time in generating a token. The token and expiration date are provided in an authorization for the additional resources. When requesting the additional resources, the authorization is provided and verified by comparing the token in the authorization with a test token generated with reference to access parameters of the request for additional resources. When the tokens match, the additional resource is provided to the client device.
-
公开(公告)号:US20240323167A1
公开(公告)日:2024-09-26
申请号:US18732312
申请日:2024-06-03
Applicant: Musarubra US LLC
Inventor: Christopher Smith , Don R. Hanson, II
CPC classification number: H04L63/0281 , G06F16/285 , G06F21/00 , G06F21/57 , H04L63/1425 , H04L63/20
Abstract: In an example, there is disclosed a monolithic reputation update on a data exchange layer (DXL). According to one embodiment, designating a set of objects as good or bad can be achieved via a single administrative action by leveraging persistent client initiated connections to the DXL framework. This may enable communication of the reputation updates across a heterogeneous infrastructure, including systems potentially unreachable by the server, such as those behind a firewall or NAT.
-
公开(公告)号:US20240321416A1
公开(公告)日:2024-09-26
申请号:US18677737
申请日:2024-05-29
Applicant: Nant Holdings IP, LLC
Inventor: Nicholas J. Witchey
CPC classification number: G16H10/60 , G06F21/00 , G06F21/645 , G06Q10/10 , G06Q30/018 , H04W12/02 , G06Q2250/30
Abstract: Healthcare transaction validation systems and methods are presented. Healthcare transactions associated with a stakeholder are compiled into a chain of healthcare transaction blocks. The chain can be considered a chronicle of person's healthcare path through life. When a transaction is conducted, the corresponding healthcare parameters (e.g., inputs, outputs, clinical evidence, outcomes, etc.) are sent to one or more validation devices. The devices establish a validity of the transaction and generate a new block via a proof-of-work principle. Once the new block has been calculated it can be appended to the stakeholder's health care blockchain.
-
公开(公告)号:US20240273018A1
公开(公告)日:2024-08-15
申请号:US18644694
申请日:2024-04-24
Applicant: Open Text Inc.
Inventor: John R. Shaw
CPC classification number: G06F12/0653 , G06F12/0615 , G06F12/1491 , G06F16/00 , G06F21/00 , G06F2212/1016 , G06F2212/1052
Abstract: Examples of the present disclosure describe systems and methods for sharing memory using a multi-ring shared, traversable and dynamic database. In aspects, the database may be synchronized and shared between multiple processes and/or operation mode protection rings of a system. The database may also be persisted to enable the management of information between hardware reboots and application sessions. The information stored in the database may be view independent, traversable, and resizable from various component views of the database. In some aspects, an event processor is additionally described. The event processor may use the database to allocate memory chunks of a shared heap to components/processes in one or more protection modes of the operating system.
-
公开(公告)号:US12058140B2
公开(公告)日:2024-08-06
申请号:US17592209
申请日:2022-02-03
Applicant: RavenWhite Security, Inc.
Inventor: Bjorn Markus Jakobsson
CPC classification number: H04L63/102 , G06F21/00 , G06F21/31 , G06F21/552 , H04L9/0891 , H04L63/083 , H04L63/107 , H04L63/1483 , H04L63/18 , G06F2221/2131 , H04L2209/56 , H04L2209/605 , H04L2209/805
Abstract: Preference data is received. The received preference data is compared to stored preference data associated with a user with which the received preference data is associated. A determination is made whether to authorize an action based at least on the comparison. The preference data is received as a selection.
-
公开(公告)号:US20240210441A1
公开(公告)日:2024-06-27
申请号:US18085890
申请日:2022-12-21
Applicant: ABL IP Holding LLC
Inventor: Richard L. Westrick, JR. , John R. Johnson , Dylan A. D'Cruz
CPC classification number: G01P15/003 , G01P1/06 , G06F21/00 , G08B29/046
Abstract: A method of operating a controller includes: obtaining calibration data for a mounting orientation of the controller operating in a calibration mode based on obtaining first acceleration samples from an acceleration sensor; obtaining second acceleration samples from the acceleration sensor when a control switch is activated with the controller operating in a normal operating mode; performing a comparison of the second acceleration samples to the calibration data; based on the comparison, determining whether more than one of the second acceleration samples is not within a specified range; and in response to determining that more than one of the second acceleration samples is not within the specified range, causing the controller to operate in an anti-tamper mode.
-
公开(公告)号:US11994250B2
公开(公告)日:2024-05-28
申请号:US17591303
申请日:2022-02-02
Applicant: InVue Security Products Inc.
Inventor: Jonathon D. Phillips , Antonios L Karagiannis , Mark D. Reeves , Matthew Thomas Kerley , John A. Buchanan , Daniel C. Symons , Darin J. Shaw , Joshua Abdollahzadeh , Scott M. Speck , Erik L. van Bergen , Larry T. McKinney
IPC: F16M11/04 , E05B47/00 , E05B65/00 , E05B73/00 , F16M11/10 , F16M11/20 , G06F1/16 , G06F21/00 , G06F21/84 , G06F21/87 , G06F21/88 , G08B13/14 , H02B1/01 , H02J7/00 , H05K5/02 , H05K5/03 , H05K7/18
CPC classification number: F16M11/04 , E05B47/00 , E05B65/00 , E05B73/0082 , F16M11/041 , F16M11/10 , F16M11/2014 , G06F1/16 , G06F1/1607 , G06F1/1635 , G06F21/00 , G06F21/84 , G06F21/87 , G06F21/88 , G08B13/14 , G08B13/149 , H02B1/01 , H02J7/0044 , H05K5/02 , H05K5/03 , H05K7/18 , H02J7/0045
Abstract: An anti-theft device for protecting a portable electronic device from theft or unauthorized removal in a retail environment is provided. The anti-theft device includes a shroud configured to at least partially receive and engage a portable electronic device. The anti-theft device also includes a dock configured to releasably engage the shroud. The dock is configured to engage the shroud in a locked configuration so as to prevent removal of the shroud and the portable electronic device from the dock and to disengage the shroud in an unlocked configuration so as to allow the shroud and the portable electronic device to be removed from the dock.
-
公开(公告)号:US11956278B2
公开(公告)日:2024-04-09
申请号:US18159038
申请日:2023-01-24
Applicant: Tekion Corp
Inventor: Satyavrat Mudgil , Anant Sitaram , Ved Surtani
Abstract: A document management system manages documents of an entity. The document management system monitors for entries in a document that are suspicious. Entries in the document are classified by the document management system as a “suspicious entry” or a “non-suspicious entry.” In one embodiment, a suspicious entry is indicative of potentially suspicious activity at the entity.
-
公开(公告)号:US11921828B2
公开(公告)日:2024-03-05
申请号:US16139450
申请日:2018-09-24
Applicant: MALIKIE INNOVATIONS LIMITED
Inventor: Steven Henry Fyke , Hans Mathias Lewin , David Ryan Walker
IPC: G06F21/30 , G06F21/10 , G06F21/62 , H04W4/18 , H04W8/24 , H04W12/084 , H04W76/10 , G06F21/00 , H04W4/00 , H04W88/02
CPC classification number: G06F21/305 , G06F21/10 , G06F21/6218 , H04W4/18 , H04W8/24 , H04W12/084 , H04W76/10 , G06F21/00 , H04W4/00 , H04W88/02
Abstract: Methods and devices for distributing and receiving content are provided. In one example aspect, a method comprises: receiving a command on a first electronic device to output content at an output device associated with a second electronic device; and in response to receiving the command to output content at the output device associated with the second electronic device: providing content access information from the first electronic device to the second electronic device, and adjusting a security state on the second electronic device.
-
公开(公告)号:US11914373B2
公开(公告)日:2024-02-27
申请号:US17953266
申请日:2022-09-26
Applicant: Micron Technology, Inc.
Inventor: Alberto Troia , Antonino Mondello , Michelangelo Pisasale
CPC classification number: G05D1/0088 , G06F11/1012 , G06F17/16 , G06F21/00 , G06N3/063 , H04L9/3239 , H04L9/3242
Abstract: An example method comprises receiving a number of inputs to a system employing an artificial neural network (ANN), wherein the ANN comprises a number of ANN partitions each having respective weight matrix data and bias data corresponding thereto stored in a memory. The method includes: determining an ANN partition to which the number of inputs correspond, reading, from the memory the weight matrix data and bias data corresponding to the determined ANN partition, and a first cryptographic code corresponding to the determined ANN partition; generating, using the weight matrix data and bias data read from the memory, a second cryptographic code corresponding to the determined ANN partition; determining whether the first cryptographic code and the second cryptographic code match; and responsive to determining a mismatch between the first cryptographic code and the second cryptographic code, issuing an indication of the mismatch to a controller of the system.
-
-
-
-
-
-
-
-
-