Patent classifications
G06F21/31
System for securing a cyber-physical method
The invention relates to an industrial system comprising machines, systems for controlling machines connected by a first communication network, and a gateway intended to connect the first communication network to a second communication network. The gateway comprises a memory and comprises a processor configured to copy to the memory first data transmitted over the second communication network and relating to the operation of the machines.
System for securing a cyber-physical method
The invention relates to an industrial system comprising machines, systems for controlling machines connected by a first communication network, and a gateway intended to connect the first communication network to a second communication network. The gateway comprises a memory and comprises a processor configured to copy to the memory first data transmitted over the second communication network and relating to the operation of the machines.
ANALOGS OF PROXISOME PROLIFERATOR ACTIVATED RECEPTOR (PPAR) AGONISTS AND METHODS OF USING THE SAME
Peroxisome proliferator activated receptor (PPAR) compounds, and methods of using the same for treating bone fractures, treating osteoporosis and/or metabolic bone diseases, and inducing osteogenesis and/or chondrogenesis, are disclosed.
ANALOGS OF PROXISOME PROLIFERATOR ACTIVATED RECEPTOR (PPAR) AGONISTS AND METHODS OF USING THE SAME
Peroxisome proliferator activated receptor (PPAR) compounds, and methods of using the same for treating bone fractures, treating osteoporosis and/or metabolic bone diseases, and inducing osteogenesis and/or chondrogenesis, are disclosed.
Hardware device for entering a pin via tapping on a touch screen display
A device and associated methods for entering a PIN via tapping are disclosed. The device can be configured to determine a number of taps provided by a PIN holder on a touch sensor in representation of a PIN digit and to store the number of taps as a digit in a sequence that represents the PIN. Indications for interaction with the device can be provided to PIN holders in the form of auditory cues. A visually impaired PIN holder may be able to complete a PIN entry process by following the indications for interaction, tapping on a touch sensor a number of times equal to the value of the digit of the PIN to be entered, and performing gestures mapped to commands for the device.
BANNER NOTIFICATION IN LOCKED HOST MONITOR
Aspects of the disclosure relates to systems and methods for locking a display device of a host computer remotely using a management controller, and providing a banner notification on the locked display device. The system includes a computing device as the host computer, which has a display device, and a management controller. When the management controller receives a locking command, the management controller, in response to the locking command, performs the following operations: generating a locking instruction, and sending the locking instruction to the computing device to lock the display device; and generating a message display instruction including a message to be displayed, and sending the message display instruction to the display device of the computing device, in order to display the message on the display device. Thus, a local user at the computing device may be notified by the message that the display device is locked.
MOBILE DEVICE SECURITY SYSTEMS AND METHODS
A system and method for securing a mobile device may include providing software for installation on the mobile device where the software is configured for disabling at least some functionality of the device, storing a mobile device identifier identifying the mobile device, and determining an unlock code for unlocking the mobile device, receiving a notification of sale of the mobile device, and providing the unlock code. Systems and methods for receiving and verifying the unlock code are also described.
MOBILE DEVICE SECURITY SYSTEMS AND METHODS
A system and method for securing a mobile device may include providing software for installation on the mobile device where the software is configured for disabling at least some functionality of the device, storing a mobile device identifier identifying the mobile device, and determining an unlock code for unlocking the mobile device, receiving a notification of sale of the mobile device, and providing the unlock code. Systems and methods for receiving and verifying the unlock code are also described.
POINTING DEVICE BIOMETRICS CONTINUOUS USER AUTHENTICATION
There is provided, in accordance with some embodiments, a method comprising using one or more hardware processors for receiving a behavioral biometric model that characterizes a human user according to pointing device data of the human user, where the pointing device data comprises screen coordinate and time stamp pairs. The method comprises an action of monitoring an input data stream from a pointing device in real time, wherein the input data stream covers two or more spatial regions of a display screen, and an action of segregating the input data stream into one or more subset streams that is restricted to one of the plurality of spatial regions. The method comprises an action of computing a similarity score based on one or more comparisons of the behavioral biometric model and the one or more subset streams, and an action of sending the similarity score to a user authorization system.
Confidential information identification based upon communication recipient
One embodiment provides a method, including: receiving an indication of an addition of a new participant in a textual communication between at least two existing participants; identifying at least one confidential topic contained within the textual communication by (i) parsing the textual communication and (ii) identifying at least one topic contained within the textual communication; the identifying comprising (i) accessing a confidentiality graph comprising (a) nodes representing participants and (b) edges representing confidential concepts that are acceptable discussion topics between participants connected by a corresponding edge and (ii) determining that an edge corresponding to the at least one confidential topic does not connect the new participant with both of the existing participants; and alerting one of the existing participants that the at least one confidential topic is included in the textual communication to be sent to the new participant.