Abstract: An electronic authorization system is typically configured for: receiving electronic activity requests from a plurality of source nodes; analyzing each of the electronic activity requests using a decisioning algorithm, wherein a decision boundary of the decisioning algorithm is dynamically altered while analyzing the electronic activity requests; for each of the electronic activity requests, determining an activity exposure level of the decision boundary based on (i) a distance to the decision boundary and (ii) an amount of information exposed regarding the decision boundary; for each of the plurality of source nodes, determining a source exposure level of the decision boundary based on the activity exposure levels of the decision boundary of the electronic activity requests; and in response to determining that a likelihood of decision boundary profiling by one or more first source nodes exceeds a defined threshold, performing an exposure remediation action.
Abstract: Techniques for authenticating the identity of shippers and receivers of goods at each point along a supply chain. A central hub repository issues shippers and receivers a pair of public and private keys for encrypting communications between the shippers and receivers and the hub repository and for authenticating the identity of shippers and receivers. The hub repository may also maintain a log of all transactions between shippers and receivers to provide an audit trail that may be used to track the progress of goods along a supply chain.
Abstract: Systems, methods, and other embodiments associated with using an audio link for authentication services are described. According to one embodiment, an apparatus includes The apparatus includes a processor configured to monitor an audio channel for an authentication signal. The authentication signal is an analog signal provided from a host device over the audio channel to the processor when authenticating the apparatus. The apparatus includes an authentication module configured to generate an authentication response after the authentication signal is detected by the processor. The processor is configured to provide the authentication response as an audio signal on the audio channel to a speaker.