Abstract:
A user apparatus (1) sends, via a network (7), a request to access a computer system (3) comprising a plurality of services and a plurality of authentication levels. The system (3) negotiates with a distributed authentication provider (5) to determine a risk associated with the user request and a multi-level authentication scheme for the user. The system then redirects the user to the authentication provider for authentication according to the multi-level scheme, which may involve input by the user of one or more passwords and other identifiers including biometric identification The user is provided with access to the requested service if authentication is successful, which may be notified from the authentication provider to the system using a pre-agreed shared secret associated with the respective authentication level.
Abstract:
Disclosed is a method and system for providing a user access to a computer system (400) comprising a plurality of services (10) and a plurality of authentication levels (20), the method comprises dynamically monitoring (212, 214) a user authenticated on said computer system to calculate a risk profile of the user, and dynamically selecting (216) an authentication level for each of said services based on said monitored risk profile. If said authentication level for a service is higher than an actual authentication level for said user (i.e. initial authentication level), a further authentication request (224) is sent to the user requesting the user to provide authentication information corresponding to the dynamically selected authentication level upon said authenticated user requesting access to said service. The services may be financial services and the monitored user data may be biometric data, location data, environmental data or user device data.
Abstract:
Ein Verfahren wird offenbart zum Bereitstellen eines Benutzerzugriffs auf ein Computersystem (400), das eine Mehrzahl von Diensten (10) und eine Mehrzahl von Identitätsprüfungs-Ebenen (20) aufweist, wobei das Verfahren aufweist: dynamisches Überwachen (212, 214) eines Risikoprofils eines Benutzers, dessen Identität in dem Computersystem festgestellt wurde; dynamisches Auswählen einer Identitätsprüfungs-Ebene für jeden der Dienste auf der Grundlage des überwachten Risikoprofils; und wenn die Identitätsprüfungs-Ebene für einen Dienst höher ist als eine aktuelle Identitätsprüfungs-Ebene für den Benutzer, Senden einer Aufforderung (224) nach weiteren Identitätsprüfungen an den Benutzer, die den Benutzer auffordert, Identitätsprüfungs-Informationen bereitzustellen, die der dynamisch ausgewählten Identitätsprüfungs-Ebene entsprechen, wenn der Benutzer, dessen Identität festgestellt wurde, Zugang zu dem Dienst fordert.
Abstract:
An apparatus for managing changes to one or more files, wherein a link is associated with changes that result in an updated version of the one or more files, the apparatus comprising: a changed section determiner operable to determine which sections associated with the one or more files have changed and operable to determine metadata regarding the nature of the changes to the sections; a metrics generator operable to use the metadata to generate a first weight associated with each of the changed sections; and a mapping record generator operable to generate a mapping record for each of the changed sections, wherein a first mapping record comprises data associated with the first weight; is associated with a particular version of the one or more files; and is linked to mapping records associated with other changed sections using the link.
Abstract:
Determining loading of web application pages at user interfaces, by: loading a web page comprising a set of scripting codes at a client; providing a wrapper function for an existing function in a browser including: providing a counter; monitoring for a scripting code waiting to run and incrementing the counter value for each scripting code waiting to run; monitoring for a scripting code which has executed or has started executing and decrementing the counter value for each monitored; executed scripting code; and, determining when the counter value returns to a zero count. The scripting code waiting to run may be monitored by the wrapper function around the original functions, and the execution of the scripting code may be monitored by the wrapper function around the code that the original caller wanted run.
Abstract:
Disclosed is a method for providing a user access to a computer system (400) comprising a plurality of services (10) and a plurality of authentication levels (20), the method comprising dynamically monitoring (212, 214) a risk profile of a user authenticated on said computer system; dynamically selecting (216) an authentication level for each of said services based on said monitored risk profile; and if said authentication level for a service is higher than an actual authentication level for said user, sending a further authentication request (224) to the user requesting the user to provide authentication information corresponding to the dynamically selected authentication level upon said authenticated user requesting access to said service.
Abstract:
A system 200 for remote control of electrical appliances includes a socket 201 for attachment to a mains power supply and for receiving a plug 211 for attachment to an appliance. Either the socket 201 or the plug 211 includes a transceiver 202 powered by the mains supply. The other of the plug 211 or the socket 201 includes a tag 212 stimulated by the transceiver 202 when in close proximity to the transceiver 202. When stimulated the 212 tag allows current to flow to the appliance by inducing a current in a coil 213 to close a relay switch 214. The tag 212 has a unique identifier which is interrogated by the transceiver 202. The system 200 also includes a control 240 system for receiving a unique identifier of the tag 212 and for controlling the power to the transceiver 202 via switch 204 in order to control the activation or deactivation of the plug 211 at the socket 201.