G06F2221/032

Wearable display and method of controlling the wearable display generating a user interface according to that of an external device
09804686 · 2017-10-31 · ·

A Head Mount Display (HMD) and a method for controlling the HMD are disclosed. The method includes detecting an external device in an image captured by the HMD, recognizing at least one component from a first User Interface (UI) of the external device, the at least one component including a keypad or a window for outputting data corresponding to an input signal to the keypad, generating a second UI including the recognized at least one component, displaying the second UI in the HMD, wherein the at least one component of the first UI being displayed on the external device is overlaid with the displayed second UI using the image from which the external device is detected, and displaying data corresponding to an input signal currently received at the external device on the second UI in the HMD.

Securely booting a computer from a user trusted device

A method for allowing a computer to boot from a user trusted device is provided. The computer includes a long-term data storage device storing operating system (OS) services. The user trusted device is connectable to the computer and stores a boot loader detectable and executable by a firmware of the computer, an OS loader designed to load an OS of the computer, and one or more crypto drivers designed for allowing access to the OS and data stored encrypted on the data storage device. The method comprises letting the boot loader be executed to cause to transfer the OS loader from the user trusted device to the computer and executing the transferred OS loader to cause to execute the one or more crypto drivers for the OS and the data stored encrypted on the data storage device to start the OS services and complete booting of the computer.

DATA CLEAN ROOMS USING DEFINED ACCESS WITH HOMOMORPHIC ENCRYPTION

A data platform creates an application in a data-provider account, where the application includes one or more application programming interfaces (APIs) corresponding to one or more underlying code blocks. The data platform shares homomorphically encrypted provider data with the application in the data-provider account. The data platform installs, in a data-consumer account, an application instance of the application. The data platform shares homomorphically encrypted consumer data with the application instance in the data-consumer account. The data platform invokes one or more of the APIs of the application instance to execute respective associated underlying code blocks, which are not visible to the data-consumer account, and which operate on the shared homomorphically encrypted provider data and the shared homomorphically encrypted consumer data. The data platform saves homomorphically encrypted output of the one or more respective associated underlying code blocks locally within the data-consumer account.

METHODS AND SYSTEMS FOR COUNSELING A USER WITH RESPECT TO SUPERVISED CONTENT
20220368986 · 2022-11-17 ·

The present disclosure is directed to counseling a user with respect to supervised content. In particular, the methods and systems of the present disclosure may: determine, based at least in part on one or more machine learning (ML) models, that one or more interfaces displayed to a user include content of a content type designated by a content supervisor of the user for identification; and, responsive to determining that the interface(s) include content of the content type, generate data representing a graphical user interface (GUI) for presentation to the user, the GUI indicating detection of the content of the content type and comprising educational material counseling the user with respect to the content type.

Obscuring displayed information

A method can include rendering pixel representations of information to a rectangular display; and rendering pixel representations of perspectival text to the rectangular display where the pixel representations of perspectival text overlay a portion of the pixel representations of information. Various other methods, apparatuses, systems, etc., are also disclosed.

Hardware-assisted virtualization for implementing secure video output path

Systems and methods for employing hardware-assisted virtualization for implementing a secure video output path. An example processing system comprises: a memory; a shared interconnect; and a processing core communicatively coupled to the memory via the shared interconnect, the processing core to: initialize a first virtual machine and a second virtual machine; responsive to receiving a memory access transaction initiated by the first virtual machine to access a memory buffer, tag the memory access transaction with an identifier of the first virtual machine; and responsive to receiving a digital content decoder access transaction initiated by the second virtual machine, tag the digital decoder access transaction with an identifier of the second virtual machine.

Security method and apparatus for locking of mediators between console peripheral devices and hosts
11669646 · 2023-06-06 · ·

A mediator and a method for securing a mediator for coupling between one or more hosts and one or more consoles comprising one or more peripheral devices. The mediator is having at least three stages: (i) a security setup stage; (ii) a neutralization stage; and (iii) a normal operation stage. In the normal operation stage, the mediator couples between at least one of the one or more peripheral devices and at least one of the one or more peripheral devices. In the neutralization stage the mediator disable coupling between at least one of the one or more peripheral devices and at least one of the one or more peripheral devices. The securing method starts with the security setup stage after at least one of (a) a power-up; (b) a reset; (c) a device connection; and (d) an unlock command. Upon entering the security setup stage, the method performs the following: (1) reading the device information of the one or more peripheral devices; (2) if the mediator is in Unlock state, waiting for a locking command and upon locking command arrival, register the information of the one or more peripheral devices to non-volatile memory, and proceed to normal operation stage, (3) if the mediator is in Lock state, compare the registered information of the one or more peripheral devices with the information read previously, and upon a match proceed to normal operation stage and upon a miss-match proceed to neutralization stage. The lock and unlock commands are provided from an authorized user or an administrator.

PREVENTION OF SHOULDER SURFING

In accordance with the teachings of the present disclosure, a method is provided for reducing the chances of shoulder surfing. The method may include determining an approximate angle of orientation of a mobile device and selecting one of first or second input key layouts, based upon the approximate angle of orientation. The first input key layout may be a standard layout of alphanumeric characters and the second input key layout may be a disordered layout of the alphanumeric characters. The method may also include displaying the selected one of the first or second input key layouts at a graphical user interface of the mobile device and receiving an input of sensitive information at the graphical user interface.

Contextual device locking/unlocking
09781119 · 2017-10-03 · ·

Particular embodiments of a computing device associated with a user may detect an event using a sensor of the computing device. The event may be a lock-triggering event or an unlock-triggering event. The computing device may assess a state of the device. The computing device may also access further information associated with the user. The computing device may also monitor activity on the computing device to detect further events if such further monitoring is warranted. Based on the gathered information, the computing device may update a lock status of the device to lock or unlock access interfaces of the computing device, functionality of the computing device, or content accessible from the computing device. If the event comprised the computing device detecting an attempt by a third party to use the device, the device may attempt to identify the third party to determine if they are authorized to use the device.

Authentication of a secure electronic device from a non-secure electronic device
09781093 · 2017-10-03 · ·

The application relates in particular to a method for authentication of a secure electronic device (BNK_SRV) from a non-secured electronic device (PC, SP) comprising an input peripheral (KBD, MS, TS, CAM), an output peripheral (SCR, SPK, PRN) and a secure electronic circuit (TPM). The application also relates to a secure electronic circuit (TPM), a computer program and a storage medium arranged to implement such a method.