G06F2221/031

Integrated robotics and access management for target systems

An access management robot facilitation system facilitates a robot to execute access management tasks on a target system.

DIGITAL AUTHENTICATION USING AUGMENTED REALITY
20170324726 · 2017-11-09 ·

An augmented reality (AR) interactive system and method is provided. In one embodiment the systems comprises a user interface configured to receive user input, a processor configured to manage user input data, and a display in processing communication with one another and said user interface via said processor. The processor is operative to perform the following functions: initiate communication with at least one third party computer to start a user session; and display graphical images and textual information in overlying registration using the display so that the images and textual information appear as part of a plurality of computer keys of a computer keyboard, wherein the processor is configured to display computer keys in random order each time the keys are displayed.

Computer security system and method to protect against keystroke logging

Static security credentials are replaced by pseudonyms and session-specific passwords to increase security associated with user login attempts, and specifically to defeat keylogging attacks. For each login event, the system generates unique, session-specific credentials by randomly replacing characters within a given username and password. The random character generation ensures that system login attempts use different combinations of characters, thereby producing a new username and password for every user session. The client side of the system requires only the capability to display an image file, with specialized software/hardware limited to the server side, thereby facilitating the use of the system by a wide range of client devices.

Hacking-Resistant Computer Design
20220043905 · 2022-02-10 ·

A computer architecture is disclosed for implementing a hacking-resistant computing device. The computing device, which could be a mainframe computer, personal computer, smartphone, or any other computing device suitable for network communication, comprises a first partition and a second partition. The second partition can communicate over a network such as the Internet. In contrast, the first partition cannot connect to the Internet, and can directly communicate only with the second partition or with input/output devices directly connected to the first partition. Further, the first partition segments its memory addressing for program code and hardware-protects it from alteration. The second partition is hardware-limited from reading or writing to the memory addressing of the first partition. As a result, the critical data files and program code stored on the first partition are protected from malicious code affecting the second partition.

Information processing device

A non-secure display area and a secure display area are set on a screen of a display section of a touch panel TP. A non-secure input area and a secure input area are set on a detection surface of a touch input detector of the touch panel TP. In settlement processing, in a display area where the non-secure display area and the secure display area are overlapped, amount information is displayed. A message for urging authentication information input and a PIN pad are displayed in the secure display area. An operator can safely input PIN information to secure the input area through the PIN pad displayed in the secure display area. Even when the secure portion and the non-secure portion are present together, the settlement terminal device can secure the security of input authentication information or the like to suppress the operator's mistake or incorrect operation.

SECURITY METHOD AND APPARATUS FOR LOCKING OF MEDIATORS BETWEEN CONSOLE PERIPHERAL DEVICES AND HOSTS
20220229940 · 2022-07-21 ·

A mediator and a method for securing a mediator for coupling between one or more hosts and one or more consoles comprising one or more peripheral devices. The mediator is having at least three stages: (i) a security setup stage; (ii) a neutralization stage; and (iii) a normal operation stage. In the normal operation stage, the mediator couples between at least one of the one or more peripheral devices and at least one of the one or more peripheral devices. In the neutralization stage the mediator disable coupling between at least one of the one or more peripheral devices and at least one of the one or more peripheral devices. The securing method starts with the security setup stage after at least one of (a) a power-up; (b) a reset; (c) a device connection; and (d) an unlock command. Upon entering the security setup stage, the method performs the following: (1) reading the device information of the one or more peripheral devices; (2) if the mediator is in Unlock state, waiting for a locking command and upon locking command arrival, register the information of the one or more peripheral devices to non-volatile memory, and proceed to normal operation stage, (3) if the mediator is in Lock state, compare the registered information of the one or more peripheral devices with the information read previously, and upon a match proceed to normal operation stage and upon a miss-match proceed to neutralization stage. The lock and unlock commands are provided from an authorized user or an administrator.

Context data control
11210393 · 2021-12-28 · ·

A technology for mutually isolating accessors of a shared electronic device from leakage of context data after a context switch comprises: on making the shared electronic device available to the plurality of accessors, establishing a portion of storage as an indicator location for the shared electronic device; when a first accessor requests use of the shared electronic device, writing at least one device-reset-required indicator to the indicator location; on switching context to a new context, after context save, when a second accessor requests use of the shared electronic device, resetting context data of the shared electronic device to a known state and reconciling the first device-reset-required indicator and a second device-reset-required indicator for the new context.

Systems and methods for input interfaces promoting obfuscation of user navigation and selections

Techniques for obfuscating selection of an option during user-input of sensitive information, involving displaying several targets, such as via a virtual keyboard, on a device display, where each target corresponds to one of multiple options. When a first visual indication of a current user target moves to a first target in response to a first user navigation input, an obfuscation system can concurrently or soon thereafter move a second visual indication of a first distractor target to another target. The current user target is thus obfuscated as two different visual indicators move through the targets.

Hardware Device for entering a PIN via Tapping on a Touch Screen Display
20210383386 · 2021-12-09 · ·

A device and associated methods for entering a PIN via tapping are disclosed. The device can be configured to determine a number of taps provided by a PIN holder on a touch sensor in representation of a PIN digit and to store the number of taps as a digit in a sequence that represents the PIN. Indications for interaction with the device can be provided to PIN holders in the form of auditory cues. A visually impaired PIN holder may be able to complete a PIN entry process by following the indications for interaction, tapping on a touch sensor a number of times equal to the value of the digit of the PIN to be entered, and performing gestures mapped to commands for the device.

UTILIZING DATA PROVENANCE TO DEFEND AGAINST DATA POISONING ATTACKS

The present invention discloses a secure ML pipeline to improve the robustness of ML models against poisoning attacks and utilizing data provenance as a tool. Two components are added to the ML pipeline, a data quality pre-processor, which filters out untrusted training data based on provenance derived features and an audit post-processor, which localizes the malicious source based on training dataset analysis using data provenance.