MULTI-CLUSTER BOOT-STRAPPING
    1.
    发明申请

    公开(公告)号:WO2023059337A1

    公开(公告)日:2023-04-13

    申请号:PCT/US2021/054163

    申请日:2021-10-08

    Applicant: KASTEN, INC.

    Abstract: Disclosed herein are system, method, and computer program product embodiments for multi-cluster boot-strapping. In some embodiments, a server residing on a primary computing cluster receives a first request to establish a temporary connection between the primary computing cluster and a secondary computing cluster. The server establishes the temporary connection between the primary computing cluster and the secondary computing cluster using the first set of credentials. Furthermore, the server receives a second request to establish a persistent connection between the primary computing cluster and the secondary computing cluster. The server establishes the persistent connection by transmitting a third request comprising the configuration settings to the secondary computing cluster thereby causing the secondary computing cluster to generate a second set of credentials corresponding to the primary computing cluster. The server receives and stores the second set of credentials.

    PROGRESSIVELY VALIDATING ACCESS TOKENS
    2.
    发明申请

    公开(公告)号:WO2023040953A1

    公开(公告)日:2023-03-23

    申请号:PCT/CN2022/119007

    申请日:2022-09-15

    Abstract: Methods, systems and computer program products relate to progressively validating access token are provided. In response to intercepting an initial call for a transaction for a service from a client, a token is validated for the initial call of the transaction for the service, the validating including contacting an authentication sever and locally storing a time to live received for the token. In response to intercepting at least one successive call for the transaction for the service from the client, it is determined that the token for the at least one successive call is valid based on the time to live locally saved. The at least one successive call for the transaction for the service is permitted to pass without contacting the authentication sever.

    SYSTEMS AND METHODS FOR MANAGING ACCESS CREDENTIAL REQUESTS

    公开(公告)号:WO2023027595A1

    公开(公告)日:2023-03-02

    申请号:PCT/NZ2021/050150

    申请日:2021-08-25

    Applicant: XERO LIMITED

    Inventor: THIRKELL, Justin

    Abstract: Described embodiments relate to a computer-implemented method comprising: receiving, from an authorization server, an access credentials read request associated with a user. The access credentials read request comprises one or more access credential identifiers and one or more parameter values, wherein the one or more parameter values are derived from a current state of a set of requirements for authorizing modifications to access credentials. The method further comprises traversing a first event log associated with the user to determine one or more access credential values associated with the respective one or more access credential identifiers based on the one or more parameter values and transmitting, to the authorization server, the one or more access credential values.

    전자 장치 및 전자 장치에서 점멸 광원을 검출하는 방법

    公开(公告)号:WO2023003301A2

    公开(公告)日:2023-01-26

    申请号:PCT/KR2022/010453

    申请日:2022-07-18

    Abstract: 실시 예에 따른 전자 장치는, 제1 통합 시간 동안 제1 조도 값들을 위한 제1 신호를 획득하는 제1 모듈레이터와 제2 통합 시간 동안 제2 조도 값들을 위한 제2 신호를 획득하는 제2 모듈레이터를 포함하는 조도 센서, 및 프로세서를 포함하고, 상기 프로세서는, 상기 제1 신호와 상기 제2 신호르 기반으로 상기 제1 조도 값들과 상기 제2 조도 값들을 계산하고, 상기 제2 조도 값들을 기반으로 주변 광원을 점멸광원으로 판단하고, 상기 디스플레이를 통해 출력되는 이미지와 연관된 디스플레이 파라미터 정보를 획득하면, 상기 디스플레이 파라미터 정보를 기반으로 제1 조도 값들을 보상하고, 상기 보상한 제1 조도 값들을 기반으로 디스플레이의 밝기 값을 조정하고, 상기 디스플레이 파라미터 정보를 획득하지 못하면 상기 제2 조도 값들을 기반으로,상기 디스플레이의 밝기 값을 조정하도록 설정될 수 있다.

    ENHANCED ASSET MANAGEMENT USING AN ELECTRONIC LEDGER

    公开(公告)号:WO2022216625A1

    公开(公告)日:2022-10-13

    申请号:PCT/US2022/023348

    申请日:2022-04-04

    Abstract: Described herein are techniques for managing authentication of asset rights via an electronic ledger. In some embodiments, the techniques comprise maintaining, on an electronic ledger, information associated with an asset, the information comprising an eMEID and one or more permissions for the asset that are modifiable only upon authentication of the eMEID, receiving, from a user device, a request to perform an action in relation to the asset, the request comprising at least an identifier for the user device, retrieving, from the electronic ledger, a current state of the asset, determining, based on the identifier for the user device and the one or more permissions for the asset in the current state, that the user device is authorized to perform the action, and causing the action to be executed in relation to the asset.

    ENROLLING BIOMETRICS WITH MUTUAL TRUST THROUGH 3RD PARTY

    公开(公告)号:WO2022182276A1

    公开(公告)日:2022-09-01

    申请号:PCT/SE2022/050155

    申请日:2022-02-14

    Inventor: TUNELD, Mats

    Abstract: The present disclosure relates to a method of an access point (11) of enrolling biometric data of an individual (10) and an access point (11) performing the method. In an aspect, a method of an access point (11) is provided of enrolling biometric data of an individual (10). The method comprises establishing (S101) a trusted communication channel with a user device (13) of the individual (10), the trust being ensured by a trusted 3rd party (14) and capturing (S102) the biometric data of the individual (10), wherein the biometric data is enrolled with the access point (11).

    APPARATUS, SYSTEM AND METHOD FOR AUTHENTICATING A USER

    公开(公告)号:WO2022098374A1

    公开(公告)日:2022-05-12

    申请号:PCT/US2020/060068

    申请日:2020-11-11

    Applicant: HIRES, Richard

    Inventor: HIRES, Richard

    Abstract: A system for authenticating a user is provided. The system stores first data associated with the user. The first data includes first user data and first behavioral data. The system receives, from a remote authentication engine, an authentication response for authenticating the user and determines second data based on the authentication response. The second data includes second user data and second behavioral data. The system further determines a first plurality of confidence scores, based on a first comparison of the second data and the first data. Furthermore, the system determines a second confidence score based on the first plurality of confidence scores and authenticates the user based on the second confidence score.

Patent Agency Ranking