Patent classifications
G06F2221/031
Systems and methods for secure password entry
Systems and methods for secure password entry are provided. A request to authenticate a user is received from a user device. A sequence of characters is generated. The sequence has a first subset of the characters selected from a password associated with the user. At least one of the characters appears a different number of times in the sequence than in the password. The sequence of characters is displayed on the user device in response to the request. A user selection of a second subset of the characters in the sequence is received through the user device. The user is authenticated in response to a determination that the first subset of the characters matches the second subset of the characters.
Exclusive view keyboard system and method
A secure computer keyboard system utilizes a mobile device in conjunction with a keyboard device to provide secure keyboard entry in a public place. An application on the mobile device produces a mapping of characters to character codings, and displays to the user a key such as a modified keyboard showing the mapping. The keyboard device receives input keystrokes from the user representing the codings and transmits the keystrokes back to the mobile device or to a server. The mobile device or server decodes the keystrokes using the mapping.
Adaptive remediation of multivariate risk
A method, system and computer-usable medium for adaptively remediating multivariate risk, comprising: detecting a violation of a multivariate security policy, the multivariate security policy comprising a plurality of variables; identifying a variable from the plurality of variables associated with a cause of the violation; associating an entity with the variable associated with the cause of the violation; and, adaptively remediating a risk associated with the entity.
Defense against search engine tracking
Techniques for enhancing electronic privacy utilize noise to prevent third parties from determining certain information based on search queries. Users submit search queries as part of their normal activities. For a user, the search queries submitted and information regarding search results used to generate additional search queries on different, but related topics. The generated additional search queries are submitted automatically on behalf of the user at a sufficient frequency to prevent high accuracy data analysis on search queries.
LICENSE MANAGEMENT IN PRE-BOOT ENVIRONMENTS
Systems and methods for enabling license management in pre-boot environments are described. In some embodiments, a method may include: loading, by a Basic System Input/Output (BIOS) of an Information Handling System (IHS), prior to the booting of any Operating System (OS) by the IHS, a license manager Unified Extensible Firmware Interface (UEFI) driver; and executing, by the BIOS, a command received from a component or device coupled to the IHS following a license management protocol provided by the UEFI driver, where the command is to obtain or verify license data.
Method and system for user induced password scrambling
A system, method, and computer-readable medium are provided to protect passwords for computer applications by providing a user-triggered password scrambling mechanism. Scrambling is enabled with a user configurable character within the password to be a trigger. Once triggered, a user can enter several incorrect password strings without fear of being locked out of the system. Ultimately, a user can enter a correct password string or a modified version of the correct password string to gain access to the system. Through password scrambling, an observer will have a more difficult time determining the correct version of the password. This improves system security, thereby protecting valuable information, resources, and reputation of an enterprise provider.
Evaluation method, information processing apparatus, and storage medium
A non-transitory computer-readable storage medium storing a program that cause a processor included in an information processing apparatus to execute a process, the process includes collecting a plurality of types of cyberattack information; evaluating a number of types of cyberattacks in which feature information of the cyberattack appears based on the collected cyberattack information; and when receiving specification of the feature information of a cyberattack, responding evaluation results of the number of types of cyberattacks in which the specified feature information of the cyberattack appears.
USB MEDIA STORAGE DEVICE
A USB media storage device includes a housing and USB flash drive mounted in the housing. A faceplate is mounted to the housing to indicate the content stored on the USB flash drive. The media stored on the USB flash drive is copy protected.
Operation of a dual instruction pipe virus co-processor
Circuits and methods are provided for detecting, identifying and/or removing undesired content. According to one embodiment, a content object that is to be virus processed is stored by a general purpose processor to a system memory. Virus scan parameters for the content object are set up by the general purpose processor. Instructions from a virus signature memory of a virus co-processor are read by the virus co-processor based on the virus scan parameters. The instructions contain op-codes of a first instruction type and op-codes of a second instruction type. Those of the instructions containing op-codes of the first instruction type are assigned to a first instruction pipe of multiple instruction pipes of the virus co-processor for execution. An instruction of the assigned instructions containing op-codes of the first instruction type is executed by the first instruction pipe including accessing a portion of the content object from the system memory.
USER INTERFACE AND METHOD FOR THE PROTECTED INPUT OF CHARACTERS
A simple gesture control system that permits accurate, simple, and secure input of personal identification numbers (PIN) by visually impaired or blind persons at a payment terminal or automatic teller machine is provided. By the user interface, invisible keys can be selected by simple wiping gestures. Here, any necessity for visual or spoken feedback or localization of operating elements is rendered unnecessary. As a result, blind or visually impaired users can input a secret number by touch operation automatically and without outside help. In this way, account is also taken of the statutory requirements in different countries.