H04L21/00

System and methods for reverse vishing and point of failure remedial training
10701106 · 2020-06-30 · ·

Embodiments of the disclosure describe a simulated phishing campaign manager that communicates a simulated phishing communication that includes at least the telephone number and reference identifier, to a device of a user. The content of the simulated phishing communication may prompt the user to call the telephone number identified in the simulated phishing communication. The security awareness system may select a telephone number and a reference identifier to use for the simulated phishing communication, the combination of which may be later used to identify a specific user if they respond to the message. Each of a plurality of users may have a unique combination of telephone number and reference identifier. The telephone number may be selected based on the geographic location of the user, or the telephone number may be selected to correspond to content in a simulated phishing communication.

Methods, apparatuses and systems for providing user authentication

The methods, apparatuses and systems described herein provide a system for authenticating users, authorization or information during secure transactions. The system may include a transaction device requiring user authentication, a personal communication device, and a wearable authentication device that communicates with both of the other devices. In one aspect, the wearable authentication device may be configured to communicate with the transaction device requiring authentication and the personal communication device through one or more wireless communication technologies, wherein the wearable authentication device may be configured to act as an intermediary between the transaction device and the personal communication device to facilitate the exchange of at least one authentication information or transaction completion information between the personal communication device and the transaction device.

Malicious encrypted network traffic identification

A malicious encrypted traffic detector connected to a computer network, the detector comprising: a Shannon entropy estimator; an entropy comparator; a store storing a reference measure of Shannon entropy of a portion of network traffic of a malicious encrypted network connection, wherein the estimator is adapted to estimate a measure of entropy for a corresponding portion of network traffic communicated over the computer network, and the entropy comparator is adapted to compare the estimated measure of entropy with the reference measure so as to determine if malicious encrypted network traffic is communicated over the network connection.

Service channel authentication token

A computer system receives an authentication request from a user device and determines a determined device identification from a set of received device attributes. When the device is properly authenticated, the computer system generates an authentication token that is signed by the determined device identification and returns the authentication token to the user device. When the computer system subsequently receives a service request with an authentication token and a plurality of device attributes for a protected resource from a user device, the computer system determines a derived device identification from some or all of the received device attributes. When a signed device identification of the authentication token and the derived device identification are equal, the apparatus continues processing the service request. Otherwise, the service request is rejected.

Determining user engagement with media content based on separate device usage
10321173 · 2019-06-11 · ·

The various embodiments described herein include methods and systems for determining user engagement with media content. In one aspect, a method includes: (1) identifying media content presented by a first electronic device during a particular time period; (2) obtaining device usage information for a second device in proximity to the first electronic device, the second device associated with a particular user and the device usage information corresponding to device usage of the particular user during the particular time period; (3) based on the device usage information and the media content identification, determining a level of engagement of the particular user with the presented media content; and (4) in accordance with a determination that the level of engagement of the particular user meets one or more predefined criterion, recommending additional media content to the user based on the presented media content.

Determining user engagement with media content based on separate device usage
10321173 · 2019-06-11 · ·

The various embodiments described herein include methods and systems for determining user engagement with media content. In one aspect, a method includes: (1) identifying media content presented by a first electronic device during a particular time period; (2) obtaining device usage information for a second device in proximity to the first electronic device, the second device associated with a particular user and the device usage information corresponding to device usage of the particular user during the particular time period; (3) based on the device usage information and the media content identification, determining a level of engagement of the particular user with the presented media content; and (4) in accordance with a determination that the level of engagement of the particular user meets one or more predefined criterion, recommending additional media content to the user based on the presented media content.

Server and/or client device authentication

Embodiments of systems and methods for client and/or server authentication are provided. In one embodiment, a method includes sending information from a mobile network device to a server, wherein the information comprises a seed that is used by both the mobile network device and the server to compute a series of one time passwords. The method also includes receiving, by the mobile network device, a succession of one time passwords generated by the server throughout a session. And the method further includes comparing the received one time passwords generated by the server throughout the session to corresponding one time passwords generated at the mobile network device. In this manner, the server can be authenticated. In various embodiments, the process may be reversed to facilitate client, e.g., mobile network device, authentication.

Wireless power transfer with improved device identification and signaling link security
10298065 · 2019-05-21 · ·

Generally, this disclosure provides systems, devices, methods and computer readable media for wireless power transfer with improved device identification and signaling security. A Power Receiving Unit (PRU) may include a receive resonator module to receive power from a Power Transmitting Unit (PTU) over an inductive resonant coupling link. The power may be modulated to provide signaling between the PRU and the PTU over the resonant coupling link. The PRU may also include a signaling link communication module to provide a second type of signaling between the PRU and the PTU over a wireless communication link. The PRU may further include a controller module to receive a random number, generated by the PTU, over the resonant coupling link; calculate an encoded response based on the random number and on an identifier of the PRU; and transmit the encoded response to the PTU over the wireless communication link, for verification by the PTU.

Processing apparatus, storage medium, and control method

An information processing apparatus configured to detect an object from which an individual is identifiable from captured image data, store information from which the object is restorable in memory and transmit image data generated by omitting the information regarding the object to a server. The information processing apparatus also detects the existence of a wireless terminal and controls deletion of the information regarding the object based on a privacy level associated with the wireless terminal.

Methods and apparatus for sharing and searching encrypted data
10275611 · 2019-04-30 · ·

In some embodiments, a method includes receiving, at an encrypted sharing server and from a source compute device, a share request to share first encrypted index data with a destination compute device. The method includes defining a data record including (1) information identifying the destination compute device and (2) a first set of logical block identifiers. The first set of logical block identifiers is generated based on unencrypted index data associated with the first encrypted index data and associated with a first set of storage locations. Each storage location from the first set of storage locations stores at least one index entry from a first set of index entries of the first encrypted index data. The method further includes receiving a search request associated with a search string and sending a signal to cause a subset of index entries to be sent to a destination compute device.