Patent classifications
G06F2221/03
Fraud prevention via distinctive URL display
In some embodiments, techniques for displaying a URL comprise receiving a URL; normalizing the URL, wherein normalizing the URL includes standardizing an encoding of a character contained in the URL; determining a first element of the URL, wherein the first element of the URL includes a domain; determining a second element of the URL; displaying the URL, wherein displaying the URL includes emphasizing the first element of the URL, and wherein emphasizing the first element of the URL includes displaying the first element of the URL using a first font attribute; and wherein displaying the URL includes displaying a first portion of the second element of the URL using a second font attribute and eliding a second portion of the second element of the URL; and responsive to an interaction with a user interface element, providing a view of the URL in its entirety.
In-system provisioning of firmware for a hardware platform
A hardware platform includes a nonvolatile storage device that can store system firmware as well as code for the primary operating system for the hardware platform. The hardware platform includes a controller that determines the hardware platform lacks functional firmware to boot the primary operating system from the storage device. The controller accesses a firmware image from an external interface that interfaces a device external to the hardware platform, where the external device is a firmware image source. The controller provisions the firmware from the external device to the storage device and initiates a boot sequence from the provisioned firmware.
Registering received email documents in a blockchain
A permissioned blockchain uses off-chain storage to establish integrity and no-later-than date-of-existence for documents, leveraging blockchain records that include hash values representing documents. After registration, if a document's integrity or date is challenged, the document is hashed again, and the new hash value is compared with the record. A provable date-of-existence for the block establishes a no-later-than date-of-existence for the document. Integrity verification codes (IVCs) can include multiple hash values, increasing preimage resistance against quantum computing. Off-chain storage preserves document confidentiality and efficient records ease storage burdens for distributed blockchain copies. Permissioning monetizes operations and enforces record content rules to avoid problematic material (e.g., GDPR violations, obscenities) for long-term viability. The priority parent application preceded Bitcoin; earlier terms for block and blockchain are edition and edition chain. Receiving an email at an inbox triggers generation of a blockchain record for the email (or attachment) and submission to the blockchain.
PEDDaL blockchaining for document integrity verification preparation
Systems and methods are disclosed which use a block chain (blockchain) to enable the establishment of file dates and the absence of tampering, even for documents held in secrecy and those stored in uncontrolled environments, but which does not require trusting a timestamping authority or document archival service. A trusted timestamping authority (TTSA) may be used, but even if the TTSA loses credibility or a challenger refuses to acknowledge the validity of a timestamp, a date for an electronic document may still be established. Systems and methods are disclosed which enable detection of file duplication in large collections of documents, which can improve searching for documents within the large collection.
FRAUD PREVENTION VIA DISTINCTIVE URL DISPLAY
In some embodiments, techniques for displaying a URL comprise receiving a URL; normalizing the URL, wherein normalizing the URL includes standardizing an encoding of a character contained in the URL; determining a first element of the URL, wherein the first element of the URL includes a domain; determining a second element of the URL; displaying the URL, wherein displaying the URL includes emphasizing the first element of the URL, and wherein emphasizing the first element of the URL includes displaying the first element of the URL using a first font attribute; and wherein displaying the URL includes displaying a first portion of the second element of the URL using a second font attribute and eliding a second portion of the second element of the URL; and responsive to an interaction with a user interface element, providing a view of the URL in its entirety.
Method for computer security based on message and message sender
In some embodiments, techniques for computer security comprise receiving an email message that is associated with HyperText Markup Language (HTML); determining a sender of the email message; determining whether the sender of the email message is trusted; retrieving domain-related information by performing a DNS query on a domain associated with the sender of the email message; based on at least in part on the domain-related information, determining whether the sender of the email message is verified; when the sender is both trusted and verified, treating the email message as trustworthy; in response to treating the email message as trustworthy, rendering the HTML when displaying the email message; when the sender is not trusted and verified, treating the email message as not trustworthy; in response to treating the email message as not trustworthy, displaying a restricted version of the email message.
CLASSIFIER BYPASS BASED ON MESSAGE SENDER TRUST AND VERIFICATION
In some embodiments, techniques for computer security comprise receiving an email message; determining a sender of the email message; determining whether the sender of the email message is trusted, wherein determining whether the sender of the email message is trusted includes determining whether the sender of the email message is associated with a whitelist; retrieving domain-related information by performing a DNS query on a domain associated with the sender; based at least in part on the domain-related information, determining whether the sender of the email message is verified; determining whether the sender is both trusted and verified; and when it is determined that the sender is both trusted and verified, treating the email message as trustworthy, wherein treating the email message as trustworthy includes bypassing a classifier.
Fraud prevention via distinctive URL display
In some embodiments, techniques for displaying a URL comprise receiving a URL; normalizing the URL, wherein normalizing the URL includes standardizing an encoding of a character contained in the URL; determining a first element of the URL, wherein the first element of the URL includes a domain; determining a second element of the URL; displaying the URL, wherein displaying the URL includes emphasizing the first element of the URL, and wherein emphasizing the first element of the URL includes displaying the first element of the URL using a first font attribute; and wherein displaying the URL includes displaying a first portion of the second element of the URL using a second font attribute and eliding a second portion of the second element of the URL; and responsive to an interaction with a user interface element, providing a view of the URL in its entirety.
Methods for restricting resources used by an application based on a base profile and an application specific profile
In response to a request for launching an application within an operating system of a data processing system, one or more extended entitlements are extracted from the application, where the one or more extended entitlements specify one or more resources the application is entitled to access. One or more security profile extensions corresponding to the one or more extended entitlements are dynamically generated. A security profile specifically for the application is created based on the one or more security profile extensions and a base security profile that has been previously compiled, where the base security profile specifies a list of a plurality of base resources. The application is then launched in a sandboxed operating environment that is configured based on the security profile specifically generated for the application.
Website Integrity and Date Verification with a Blockchain
Systems and methods are disclosed which use a block chain (blockchain) to enable the establishment of file dates and the absence of tampering, even for documents held in secrecy and those stored in uncontrolled environments, but which does not require trusting a timestamping authority or document archival service. In an exemplary operation, an internet browser retrieves a website document, hashes at least a portion of the website document to produce a first hash value, retrieves blockchain registration data for the website document; compares the first hash value with a second hash value found in a blockchain; and responsive to the first and second hash values matching, displays a verification indication. Some embodiments may be used as parental controls for internet browsers.