G06F2221/031

Context-aware obfuscation and unobfuscation of sensitive content
11544415 · 2023-01-03 · ·

Techniques are disclosed for context-aware obfuscation and unobfuscation of sensitive content in the display of the sensitive content. An example methodology implementing the techniques includes receiving content for display, the content including metadata indicative of a location of at least one item of sensitive content within the received content, and determining at least one contextual factor. The method also includes, responsive to a determination to obfuscate the item of sensitive content based on the at least one contextual factor, displaying the item of sensitive content in obfuscated form. The method may also include, responsive to a determination to not obfuscate the item of sensitive content based on at least one contextual factor, displaying a non-obfuscated version of the item of sensitive content.

Web application execution with secure elements
11537760 · 2022-12-27 · ·

Various examples are directed to systems and methods for executing a web application with client-side encryption. A web application may execute in a web browser at a client computing device. The web browser may generate a document comprising a secure display element. The web browser may request to render the document at the client computing device. A cryptographic tool of the web browser may decrypt the first encrypted value to generate a first clear value. The web browser may render the document at an output device of the client computing device using the clear value. The web browser may also be programmed to prevent the web application from accessing the first clear value.

BLOCKCHAIN-BASED METHOD AND SYSTEM FOR SECURING A NETWORK OF VIRTUAL WIRELESS BASE STATIONS
20220405384 · 2022-12-22 ·

Disclosed is a system for securing a wireless telecommunications network that is capable of distributing licensed capacity (in the form of connection licenses) to respond to localized fluctuations in demand. The system includes a master license server and a plurality of local license servers. The local license servers are coupled to a plurality of virtual wireless base stations over a bus. Each of the local license servers has a blockchain implementation that secures the virtual wireless base stations. For example, the blockchain implementation logs each transaction in which connection licenses change ownership among the virtual wireless base stations.

Apparatus for directing presentation attack detection in biometric scanners

An apparatus for biometric security having a biometric scanner for capturing over a first field of view image data representative of one or more biometric objects associated with a subject, and a presentation attack detection system for capturing over a second field at one or more locations along the subject information indicative of presence of the one or more biometric objects. One or more processers utilizes the image data received from the biometric scanner to select such one or more locations, and to direct the second field of view of the presentation attack detection system to obtain the information along one or more of the selected one or more locations, and to determine in accordance with the information when the first field of view contains a true or fake presentation to the biometric scanner.

Keylogger detection systems and methods

A method may include detecting a keylogger based at least in part on an increase in power drawn by an input device, detecting the keylogger based at least in part on a driver of the input device, detecting the keylogger based at least in part on a duration of time that a signal generated by the input device takes to transmit to a computing device, or any combination thereof. The method may also include, in response to detecting the keylogger, generating an alert to indicate a presence of the keylogger.

MECHANISMS FOR SECURE USER INPUT
20220398336 · 2022-12-15 ·

Methods, apparatuses, and systems for secure data input mechanisms are described herein. An example method comprises monitoring a user interface presented on a display of a mobile device, identifying an input field of the application shown within the display, and adjusting operation of the mobile device in response to entry of data within the input field, the adjusting operation occurring via an input method, the input method changing at least one characteristic of the mobile device indicative of entry of data with use of the mobile device, so as to prevent acquisition of the data by a malicious application installed on the mobile device.

Systems and methods of selection acknowledgement for interfaces promoting obfuscation of user operations

User-input obfuscating techniques involving displaying multiple targets on a display device. A visual indication of the current user target moves to a first target at a first time in response to user input, and a first presentation of a visual or audio feedback signal confirming actuation of a target occurs at a second time, without a user input for actuation of a target received while the current user target has remained at the first target from the first time to the second time. The visual indication moves to a second target at a third time in response to user input. The second target is actuated in response to receiving user input for actuation of the current user target after the third time. Then, with the current user target having remained at the second target since the third time, a second presentation of the visual or audio feedback signal is provided.

SHARING CONTAINER DATA INSIDE A TENANT'S POD UNDER DIFFERENT TRUSTED EXECUTION ENVIRONMENTS (TEES)
20220391494 · 2022-12-08 ·

In a multitenant environment, confidential containers for the tenant having a trusted execution environment (TEE) which have security attested, can share data within the pod or between pods. The ability to share data for confidential containers of the same tenant eliminates the need to have multiple copies for different confidential containers. Thus, a storage device can store shared data specific to a tenant of the multitenant environment, and a caching service backed by protected hardware can manage access to the shared data. Management of the shared data can include attesting a key for a confidential container to verify that the confidential container is part of the TEE for a pod for the tenant, and access the shared data from the storage device for the confidential container based on the attested key.

PERMISSION CONTROL METHOD AND DEVICE AND ELECTRONIC EQUIPMENT
20220374538 · 2022-11-24 ·

A right control method, a right control apparatus and an electronic device are provided according to embodiments of the present disclosure. when at least one reader of the document has the first user right on the target subdocument, the first prompt information may be displayed to remind a user who is currently browsing the document, that at least one reader of the document does not yet have access to the target subdocument. At this time, the user may determine the target reader among the at least one reader of the document by triggering the first prompt information, and authorize the target reader to have the second right on the target subdocument, so that the target reader among the at least one reader has access to the target subdocument.

SECURITY-TRAINING SUPPORT APPARATUS, SECURITY-TRAINING SUPPORT METHOD, AND COMPUTER READABLE RECORDING MEDIUM
20220366041 · 2022-11-17 · ·

A security-training support apparatus is an apparatus for generating a scenario of a targeted attack by a virtual attacker which is formed from a plurality of chronological steps and in which processing to be executed in each of the plurality of steps is defined. The security-training support apparatus includes: an information acquisition unit that at least acquires information specifying a set number of the plurality of steps; and a scenario generation unit that generates the scenario of the targeted attack by, until the set number is reached, selecting, for each of the plurality of steps, processing to be executed in the step from a database in which processing elements that can be executed in the step are registered.