Patent classifications
G06F21/305
Increasing security of a computing device based on determining a user's state of consciousness
In some examples, a security application may monitor data received from one or more of sensors of a computing device, one or more input devices of the computing device, or one or more biometric sensors of a smartwatch that is connected to the computing device. If the user is not logged in and the user that is carrying the computing device has an uneven gait or is stumbling, the security app may, when the user initiates a login process, gather additional data, such as, from the sensors, the smartwatch, or both. If the user makes too many errors, based on data from the input devices, when attempting to login or after logging in, the security application may gather additional data. If the additional data indicates that the user may be under the influence of prescription or recreational drugs or alcohol, the user may be prevented from logging in.
Center device
Methods and apparatus provide for: facilitating communication between one or more controller devices operated by one or more users, respectively, and a data processing apparatus running an application program, wherein each controller device includes a plurality of actuation elements that are operable to be manipulated by a respective one of the one or more users to input desired operations to the data processing apparatus for use by the application program; obtaining a respective controller identifier from each of the one or more controller devices; and storing in a memory the controller identifiers in response to the control section in a sequential table, such that each entry in the sequential table includes at least a sequential table entry number and a respective one of the controller identifiers.
Secure remote troubleshooting of private cloud
Techniques for secure remote troubleshooting of a private cloud are disclosed herein. One example technique includes identifying that a received command is received via an established servicing connection between the private cloud and the public cloud. The example technique can then include determining, based on a list of access authorizations corresponding to the servicing connection, whether access to the computing service or computing resource to which the command is directed is allowed from the public cloud via the servicing connection. In response to determining that access to the computing service or computing resource is not allowed, the command is prevented from being executed in the private cloud, and thus avoiding unauthorized access to the computing service or computing resource in the private cloud.
Method and System for Remote Data Access
A system and method for securely storing, retrieving and sharing data using PCs and mobile devices and for controlling and tracking the movement of data to and from a variety of computing and storage devices.
MULTI-MODAL APPROACH TO A SECURE AND CLOSED SOLUTION MONITORING AND CONTROL OF USER DATA
A multi-modal portal system provides an authorization prior to establishing a visual interface connection between a support user or caller and a client user or receiving party. Once the caller is authorized, the caller is permitted to drop-in such that a visual interface connection is established with the receiving party. The authorization can be based on a profile configuration that indicates whether the caller has the credentials required for the visual interface. The authorization can require that a notification be sent to a trusted user or primary contact or the caller can be associated with a profile configuration that allows for a pre-authorization without requiring the notification. By providing such an authorization, a secure and private visual interface with the client user can be accomplished without requiring an express action or consent by the client user.
Mobile device management broker
Techniques to manage mobile devices are disclosed. In various embodiments, a request to perform a management action with respect to a mobile device is received from a mobile device management (MDM) authority. A scope of authority of the MDM authority with respect to the mobile device is determined. The management action is caused to be performed with respect to the mobile device based at least in part on the determined scope of authority of the MDM authority with respect to the mobile device.
Device authentication system and method
There is a system for controlling access to an electronic device. This system can comprise at least one server having at least one microprocessor. There can be at least one remote device having at least one microprocessor, and at least one GPS location device, wherein the one remote device is configured to communicate a location of the at least one remote device. This remote device further comprises any one of at least one transceiver configured to communicate wirelessly, at least one biometric reader configured to read a biometric of a user and/or at least one hardware reader configured to read an identification piece. Thus, the electronic device is selectively unlocked via either an internal lock or via the server authenticating a location of the remote device, a Wifi signal of the remote device, a biometric reading of the remote device and a reading of the hardware reader of the remote device.
FLASH DRIVE LOCKED IN WIRELESS COMMUNICATION MANNER
A flash drive locked by using wireless communication that is applicable to a mobile device is provided. The mobile device includes a mobile communication component and a mobile control component. The flash drive includes a connection port, an information storing component, a communication component, an identification certificate component and a control component. The information storing component stores information. The identification certificate component stores identification information of the flash drive. When the communication component communicates with the mobile communication component, the communication component transmits a locking command generated by the mobile control component from the mobile communication component to the control component. The control component, according to the locking command, locks the identification certificate component and the data storing component, thereby prohibiting the flash drive from being identified and accessed by an electronic device having a slot into which the connection port of the flash drive is inserted into.
AUTHORISING COMPONENT UPDATES
The present disclosure relates to methods, devices, and computer-readable media. In an example there is disclosed a method comprising detecting a state of a computing device, the computing device comprising at least one component. The method may further comprise comparing the detected state with a certified state of the device, the certified state indicating an expected state of the device as certified by a trusted authority. The method may further comprise, in response to the detected state and the certified state being different, identifying a component as a source of the difference and checking, by the trusted authority, whether the component is legitimate or not. The method may further still comprise, in response to the component being legitimate, certifying the difference and updating the certified state.
IDENTITY PROVIDER SELECTION FOR IDENTITY ATTRIBUTE SHARING PROCESS
Methods of selecting an identity provider using an identity attribute sharing system may include accessing, by a user device, a page of a relying party. The methods may include receiving, by the user device, a selection to utilize an identity network to share a number of identity attributes with the relying party. The methods may include displaying, by the user device, a plurality of identity providers enrolled for use with the identity attribute sharing system. The methods may include receiving, by the user device, a selection of one of the plurality of identity providers. The methods may include providing access to a page of a selected identity provider.