G06F21/57

SYSTEM SECURITY
20230050007 · 2023-02-16 ·

In accordance with embodiments of this disclosure, a method of securing a processing unit according to some embodiments includes receiving a request for access from a user; detecting a device; determining whether the device is a trusted device; and providing the user access to the processing unit only if the device is a trusted device. In some embodiments, the trusted device may be a Bluetooth device.

Security tool for n-tier platforms

An apparatus includes a memory and a hardware processor. The memory stores a plurality of logging rules. Each logging rule assigned to a tier of a multi-tier platform. The processor receives source code for an application configured to execute on a plurality of tiers of the multi-tier platform and detects, within the source code, an entry point and an exit point for a tier of the plurality of tiers. The processor determines, based on the plurality of logging rules, a first attribute that is to be logged during execution in the tier and a second attribute that is not to be logged during execution in the tier and inserts, between the entry point and the exit point in the source code, logging code that, when executed, logs the first attribute and hides the second attribute.

Security tool for n-tier platforms

An apparatus includes a memory and a hardware processor. The memory stores a plurality of logging rules. Each logging rule assigned to a tier of a multi-tier platform. The processor receives source code for an application configured to execute on a plurality of tiers of the multi-tier platform and detects, within the source code, an entry point and an exit point for a tier of the plurality of tiers. The processor determines, based on the plurality of logging rules, a first attribute that is to be logged during execution in the tier and a second attribute that is not to be logged during execution in the tier and inserts, between the entry point and the exit point in the source code, logging code that, when executed, logs the first attribute and hides the second attribute.

Setup procedures for an electronic device
11582517 · 2023-02-14 · ·

In some embodiments, an electronic device can guide the user in setting up the device for the first time or after a factory reset. In some embodiments, an electronic device facilitates suggesting and installing applications on the electronic device during device setup. In some embodiments, an electronic device facilitates transferring settings and information from another electronic device during device setup.

Setup procedures for an electronic device
11582517 · 2023-02-14 · ·

In some embodiments, an electronic device can guide the user in setting up the device for the first time or after a factory reset. In some embodiments, an electronic device facilitates suggesting and installing applications on the electronic device during device setup. In some embodiments, an electronic device facilitates transferring settings and information from another electronic device during device setup.

Determine whether to perform action on computing device based on analysis of endorsement information of a security co-processor

Examples disclosed herein relate to a computing device that includes a central processing unit, a management controller separate from the central processing unit, and a security co-processor. The management controller is powered using an auxiliary power rail that provides power to the management controller while the computing device is in an auxiliary power state. The security co-processor includes device unique data. The management controller receives the device unique data and stores a representation at a secure location. At a later time, the management controller receives endorsement information from an expected location of the security co-processor. The management controller determines whether to perform an action on the computing device based on an analysis of the endorsement information and the stored representation of the device unique data.

Determine whether to perform action on computing device based on analysis of endorsement information of a security co-processor

Examples disclosed herein relate to a computing device that includes a central processing unit, a management controller separate from the central processing unit, and a security co-processor. The management controller is powered using an auxiliary power rail that provides power to the management controller while the computing device is in an auxiliary power state. The security co-processor includes device unique data. The management controller receives the device unique data and stores a representation at a secure location. At a later time, the management controller receives endorsement information from an expected location of the security co-processor. The management controller determines whether to perform an action on the computing device based on an analysis of the endorsement information and the stored representation of the device unique data.

Network security tool

A system includes a memory, a survey engine, and a reporting engine. The memory stores identifying information of a plurality of users. The survey engine determines a question to present to each user of the plurality of users and determines an interval for each user of the plurality of users. The determined interval for a first user of the plurality of users is different from the determined interval for a second user of the plurality of users. For each user, the survey engine communicates to that user, based on the stored identifying information, the determined question for that user according to the determined interval for that user and receives a response from each user of the plurality of users. The reporting engine generates a report based on the received response from the plurality of users.

Data collecting in issue tracking systems
11579954 · 2023-02-14 · ·

A system and method for allowing an assignee to rapidly collect data about a bug/error that is associated with the execution of a software application on a computing device. The method includes including receiving, from a client device, a request to resolve an error associated with an execution of an application on a remote server. The request includes configuration information for connecting to the remote server and an identifier to a component of the application. The method includes determining one or more files associated with the component of the application. The method includes establishing a connection to the remote server using the configuration information. The method includes retrieving the one or more files from the remote server via the connection. The method includes granting, to an assignee device, access to the one or more files that were retrieved from the remote server.

Authenticating software images
11580215 · 2023-02-14 · ·

Methods, systems, and devices for authenticating software images are described. A system may include one or more control units that use software images for managing different functions of the system. The system may also include a secure storage device configured to validate or authenticate the software images used by the different control units of the system. A software image of a control unit may be authenticated by generating a first hash associated with a portion of its underlying source code and generating a second hash associated with a corresponding portion of the source code of the copy of the software image stored to the secure storage device. Different patterns of the source code of the software images may be used to generate the hashes. The first hash and second hash may be compared, and the software image may be authenticated based on the hashes matching.