-
公开(公告)号:WO2023059337A1
公开(公告)日:2023-04-13
申请号:PCT/US2021/054163
申请日:2021-10-08
Applicant: KASTEN, INC.
Inventor: MANVILLE, Thomas , KAMRA, Vaibhav , DIXIT, Deepika , TOLIA, Niraj , SEVERSON, Mark , BHAT, Onkar , VORBAU, Alex
Abstract: Disclosed herein are system, method, and computer program product embodiments for multi-cluster boot-strapping. In some embodiments, a server residing on a primary computing cluster receives a first request to establish a temporary connection between the primary computing cluster and a secondary computing cluster. The server establishes the temporary connection between the primary computing cluster and the secondary computing cluster using the first set of credentials. Furthermore, the server receives a second request to establish a persistent connection between the primary computing cluster and the secondary computing cluster. The server establishes the persistent connection by transmitting a third request comprising the configuration settings to the secondary computing cluster thereby causing the secondary computing cluster to generate a second set of credentials corresponding to the primary computing cluster. The server receives and stores the second set of credentials.
-
公开(公告)号:WO2023040953A1
公开(公告)日:2023-03-23
申请号:PCT/CN2022/119007
申请日:2022-09-15
Inventor: JIANG, Penghui , LIU, Xinpeng , WU, Wei , CHEN, Xiaoling
IPC: G06F21/30
Abstract: Methods, systems and computer program products relate to progressively validating access token are provided. In response to intercepting an initial call for a transaction for a service from a client, a token is validated for the initial call of the transaction for the service, the validating including contacting an authentication sever and locally storing a time to live received for the token. In response to intercepting at least one successive call for the transaction for the service from the client, it is determined that the token for the at least one successive call is valid based on the time to live locally saved. The at least one successive call for the transaction for the service is permitted to pass without contacting the authentication sever.
-
公开(公告)号:WO2023027595A1
公开(公告)日:2023-03-02
申请号:PCT/NZ2021/050150
申请日:2021-08-25
Applicant: XERO LIMITED
Inventor: THIRKELL, Justin
Abstract: Described embodiments relate to a computer-implemented method comprising: receiving, from an authorization server, an access credentials read request associated with a user. The access credentials read request comprises one or more access credential identifiers and one or more parameter values, wherein the one or more parameter values are derived from a current state of a set of requirements for authorizing modifications to access credentials. The method further comprises traversing a first event log associated with the user to determine one or more access credential values associated with the respective one or more access credential identifiers based on the one or more parameter values and transmitting, to the authorization server, the one or more access credential values.
-
公开(公告)号:WO2023003301A2
公开(公告)日:2023-01-26
申请号:PCT/KR2022/010453
申请日:2022-07-18
Applicant: 삼성전자 주식회사
IPC: G06F1/16 , G06F1/3218 , H05B47/11 , G06F21/30 , G06F1/1684
Abstract: 실시 예에 따른 전자 장치는, 제1 통합 시간 동안 제1 조도 값들을 위한 제1 신호를 획득하는 제1 모듈레이터와 제2 통합 시간 동안 제2 조도 값들을 위한 제2 신호를 획득하는 제2 모듈레이터를 포함하는 조도 센서, 및 프로세서를 포함하고, 상기 프로세서는, 상기 제1 신호와 상기 제2 신호르 기반으로 상기 제1 조도 값들과 상기 제2 조도 값들을 계산하고, 상기 제2 조도 값들을 기반으로 주변 광원을 점멸광원으로 판단하고, 상기 디스플레이를 통해 출력되는 이미지와 연관된 디스플레이 파라미터 정보를 획득하면, 상기 디스플레이 파라미터 정보를 기반으로 제1 조도 값들을 보상하고, 상기 보상한 제1 조도 값들을 기반으로 디스플레이의 밝기 값을 조정하고, 상기 디스플레이 파라미터 정보를 획득하지 못하면 상기 제2 조도 값들을 기반으로,상기 디스플레이의 밝기 값을 조정하도록 설정될 수 있다.
-
公开(公告)号:WO2023287438A2
公开(公告)日:2023-01-19
申请号:PCT/US2021/042096
申请日:2021-07-16
Applicant: HEWLETT-PACKARD DEVELOPMENT COMPANY, L.P.
Inventor: WARD, Jefferson P , SUTHERLAND III, Jesse Otto , LE CHEVALLIER, Peter
Abstract: A logic circuitry package for a replaceable print apparatus component includes a logic circuit and an interface to communicate with a print apparatus logic circuit. The logic circuit is configured to include a plurality of personalities, each personality of the plurality of personalities including an ID and a cryptographic key. The logic circuit is further configured to start a cryptographic session with the print apparatus logic circuit using a selected personality of the plurality of personalities, and transmit a consumable level value to the print apparatus logic circuit in response to a request from the print apparatus logic circuit independent of which personality of the plurality of personalities is the selected personality.
-
公开(公告)号:WO2022216625A1
公开(公告)日:2022-10-13
申请号:PCT/US2022/023348
申请日:2022-04-04
Applicant: TOTAL NETWORK SERVICES CORPORATION
Inventor: JACKSON, Kevin L. , CARTER, Thomas
Abstract: Described herein are techniques for managing authentication of asset rights via an electronic ledger. In some embodiments, the techniques comprise maintaining, on an electronic ledger, information associated with an asset, the information comprising an eMEID and one or more permissions for the asset that are modifiable only upon authentication of the eMEID, receiving, from a user device, a request to perform an action in relation to the asset, the request comprising at least an identifier for the user device, retrieving, from the electronic ledger, a current state of the asset, determining, based on the identifier for the user device and the one or more permissions for the asset in the current state, that the user device is authorized to perform the action, and causing the action to be executed in relation to the asset.
-
公开(公告)号:WO2022182295A1
公开(公告)日:2022-09-01
申请号:PCT/SG2022/050089
申请日:2022-02-24
Inventor: ESINER, Ertem , TEFEK, Utku , CHEN, Binbin , MASHIMA, Daisuke , HU, Yih-Chun
Abstract: Apparatuses and methods for precomputation based message authentication by generating a plurality of predicted messages; pre-computing a data structure for generation of cryptographic evidence for future messages; determining cryptographic evidence for a true message and transmitting the true message and the cryptographic evidence to destination apparatuses.
-
公开(公告)号:WO2022182276A1
公开(公告)日:2022-09-01
申请号:PCT/SE2022/050155
申请日:2022-02-14
Applicant: FINGERPRINT CARDS ANACATUM IP AB
Inventor: TUNELD, Mats
Abstract: The present disclosure relates to a method of an access point (11) of enrolling biometric data of an individual (10) and an access point (11) performing the method. In an aspect, a method of an access point (11) is provided of enrolling biometric data of an individual (10). The method comprises establishing (S101) a trusted communication channel with a user device (13) of the individual (10), the trust being ensured by a trusted 3rd party (14) and capturing (S102) the biometric data of the individual (10), wherein the biometric data is enrolled with the access point (11).
-
公开(公告)号:WO2022125112A1
公开(公告)日:2022-06-16
申请号:PCT/US2020/064560
申请日:2020-12-11
Inventor: DALTON, Christopher, Ian , BELGARRIC, Pierre, Louis Robert , PLAQUIN, David, Julien , ZHANG, Peter, Siyuan , CHEN, Qijun
Abstract: A method of determining whether a processing unit is compliant with a security policy is provided. The method may comprise obtaining first data indicative of a power consumption profile of the processing unit for a first time period, the power consumption profile comprising a variation of power consumption with time. The method may comprise determining whether the processing unit is compliant with the security policy during the first time period depending, at least in part, on the obtained first data. It may be that the processing unit complying with the security policy gives rise to a power signature in the power consumption profile of the processing unit during a period of compliance.
-
公开(公告)号:WO2022098374A1
公开(公告)日:2022-05-12
申请号:PCT/US2020/060068
申请日:2020-11-11
Applicant: HIRES, Richard
Inventor: HIRES, Richard
Abstract: A system for authenticating a user is provided. The system stores first data associated with the user. The first data includes first user data and first behavioral data. The system receives, from a remote authentication engine, an authentication response for authenticating the user and determines second data based on the authentication response. The second data includes second user data and second behavioral data. The system further determines a first plurality of confidence scores, based on a first comparison of the second data and the first data. Furthermore, the system determines a second confidence score based on the first plurality of confidence scores and authenticates the user based on the second confidence score.
-
-
-
-
-
-
-
-
-