Patent classifications
G06F2221/031
SECURE COMPARTMENTED ACCESS INFRASTRUCTURE FOR SENSITIVE DATABASES
A system for providing compartmented access to secure data assets includes a mobile device, a secure access platform, and a secure data storage platform. The mobile device may be configured to generate a user interface configured to allow a user to input credentials and a request for a secure data asset on the secure data storage platform. The mobile device may transmit the credentials and the request to a secure access platform. The secure access platform may transmit the credentials to the secure data storage platform. The secure data storage platform may transfer a copy of the secure data assets to a data access module on the secure data access platform. The secure access platform may be configured to create an appling instance, receive the copy of the secure data assets, and transmit a response package based on the copy of the secure data access to the mobile device.
Challenge-response method for biometric authentication
A biometric authentication method is provided. In the method, identification information is collected from a user. A biometric scanner is used to scan a particular biometric characteristic of the user. If the user identification corresponds to the scanned biometric characteristic, then the scanner requests the user perform a predetermined action of a portion of the user's body. The predetermined action may be, for example, a hand gesture. The biometric characteristic is monitored while the predetermined action is being scanned. The scanner determines that the predetermined action is performed with the same portion of the user's body that was scanned for the biometric characteristic. The scanner determines if the portion of the user's body leaves the scanning area and monitors the scanning area for extraneous objects. The method provides more resistance against a replay attack.
METHOD OF PASSCODE UNLOCK USING FORCE DETECTION
A system and method unlock a passcode-secured device using force detection and haptic feedback. When prompted for a passcode, a user applies a press and hold gesture, applying continuous pressure force, to a surface of the device while receiving tactile feedback at the surface in the form of vibratory pulses. The vibratory pulses continue until the pressure force is released from the surface. The user counts the number of pulses sensed by tactile feedback at the surface until the desired number is obtained, then releases the pressure force from the surface, signaling that the pulse count should be entered as a passcode digit value. The process is repeated for each sequential passcode digit until a passcode is entered in the device. The device unlocks if the entered passcode matches a reference passcode in the device.
METHOD FOR ALLOWING DATA CLASSIFICATION IN INFLEXIBLE SOFTWARE DEVELOPMENT ENVIRONMENTS
System and method for enabling data modification, classification and enforcement of IRM capabilities in standard isolated software applications is disclosed, according to which an add-on code is installed on the terminal device of a user that runs the standard application. The add-on code is adapted to interact with the virtual keyboard used by the standard application, to form a custom virtual keyboard to which the features of classifying data item(s) and/or of modifying the content of the data item are added, without changing the natural environment, the user is normally used to. Then a custom virtual keyboard that includes a designed UI interfacing objects is created, for adding inputs that are associated with classification and modification in the data item in the form of a hidden tag to the content of the data item.
Protecting user input against focus change
In an embodiment, a system includes a processor having at least one core and a security engine, the security engine having a focus change logic to inform a trusted application to be executed in a trusted execution environment of a request for a focus change during execution of the trusted application, enable the focus change to occur during execution of the trusted application when allowed by the trusted application, and otherwise to prevent the focus change. Other embodiments are described and claimed.
Systems and methods for security data analysis and display
Systems and methods are provided for improved security services. In one aspect, a method is provided for controlling an autonomous data machine situated near a monitored environment. The method comprises: obtaining security data from a plurality of data sources; analyzing the security data to generate an analysis result; determining, based on the analysis result, an action to be performed by the autonomous data machine; and transmitting a command to the autonomous data machine causing it to perform the action.
Security for private data inputs to artificial intelligence models
Methods, systems, and devices for supporting security for private data inputs to artificial intelligence models are described. A device (e.g., an application server) may receive a request to run an artificial intelligence model. The device may run the artificial intelligence model on a public data set and an extended set of data that includes both the public data set and a private data set. The device may determine a first set of outcomes based on running the artificial intelligence model on the public data set and a second set of outcomes based on rerunning the model on the extended set of data. The device may then compare the two sets of outcomes to determine whether a private data value is identifiable based on the second set of outcomes. If a private data value is identifiable, the device may obfuscate the results prior to transmitting the results to the requestor.
Security method and apparatus for locking of mediators between console peripheral devices and hosts
A mediator and a method for securing a mediator for coupling between one or more hosts and one or more consoles comprising one or more peripheral devices. The mediator is having at least three stages: (i) a security setup stage; (ii) a neutralization stage; and (iii) a normal operation stage. In the normal operation stage, the mediator couples between at least one of the one or more peripheral devices and at least one of the one or more peripheral devices. In the neutralization stage the mediator disable coupling between at least one of the one or more peripheral devices and at least one of the one or more peripheral devices. The securing method starts with the security setup stage after at least one of (a) a power-up; (b) a reset; (c) a device connection; and (d) an unlock command. Upon entering the security setup stage, the method performs the following: (1) reading the device information of the one or more peripheral devices; (2) if the mediator is in Unlock state, waiting for a locking command and upon locking command arrival, register the information of the one or more peripheral devices to non-volatile memory, and proceed to normal operation stage, (3) if the mediator is in Lock state, compare the registered information of the one or more peripheral devices with the information read previously, and upon a match proceed to normal operation stage and upon a miss-match proceed to neutralization stage. The lock and unlock commands are provided from an authorized user or an administrator.
Authentication of a secure electronic device from a non-secure electronic device
The application relates in particular to a method for authentication of a secure electronic device (BNK_SRV) from a non-secured electronic device (PC, SP) comprising an input peripheral (KBD, MS, TS, CAM), an output peripheral (SCR, SPK, PRN) and a secure electronic circuit (TPM). The application also relates to a secure electronic circuit (TPM), a computer program and a storage medium arranged to implement such a method.
Method and system for securing the entry of data to a device
Crypto-glasses include systems that implement a method of authentication of users by blinking, the crypto-glasses including a frame configured so as to be worn by a user, a processor, a display device communicating with the processor so as to dynamically display data, and a communication unit, as executed by the processor, to execute the method of authentication by transmitting data to the display device for performing the authentication of the user to interact with the display device. The communication unit is configured to display in an optical unit of the crypto-glasses a key map which correlates data input into the display device with keys of the display device, the key map indicating data different from that of the keys of the display device.