Patent classifications
G06F2221/032
Controlling content visibility on a computing device based on computing device location
Content visibility on a computing device is controlled based at least in part on the current location of the computing device. When the current location is a safe location for making user-selectable content visible on a display screen of the computing device and the computing device is unlocked, the computing device operates in a full content visibility mode. In the full content visibility mode all user-selectable content on the computing device is accessible to a user of the computing device. When the current location is not a safe location for making user-selectable content visible on the display screen, the computing device operates in a reduced content visibility mode. In the reduced content visibility mode content visibility on the display screen is reduced, such as by limiting which applications (e.g., application icons or widgets) are displayed or otherwise accessible to the user.
Command authentication
The description relates to a shared digital workspace. One example includes a display device and sensors. The sensors are configured to detect users proximate the display device and to detect that an individual user is performing an individual user command relative to the display device. The system also includes a graphical user interface configured to be presented on the display device that allows multiple detected users to simultaneously interact with the graphical user interface via user commands.
OPERATING METHOD FOR HANDHELD DEVICE
An operating method for handheld device is provided. The method includes following steps: detecting whether a user is holding a handheld device; control the handheld device to execute a privacy non-preserving procedure when detecting that the user is holding the handheld device; detecting whether the user stops holding the handheld device; control the handheld device to execute a privacy-preserving procedure when detecting that the user stops holding the handheld device.
System and method for revealing an item on a multi-touch interface
A method and system for using a touch interface to detect a lateral edge of a human hand of a user to selectively reveal an item to the user. The method includes providing a general purpose computer having a main board with program memory, software, a processor and RAM connected in operative communication, providing an interface in operative communication with the processor, the interface being accessible by the user. The interface includes a touch screen that detects multiple points of contact indicative of the lateral edge of the human hand and reveals the item to the user in response to the step of detecting. The interface detects movement of the multiple points of contact and reveals the item at a position on the touch screen determined by the position of the multiple points of contact. Detecting movement further causes the item to track the movement.
SYSTEMS AND METHODS FOR IDENTIFYING INTERNET ATTACKS
The present disclosure relates to a system (1) and a method that employs such system (1) to detect and counteract Internet attacks of Man-in-the-Browser and/or Man-in-the-Middle type. The system (1) comprises a Traffic Inspector (2) in signal communication with a client computer (3) having a Web browser (4) residing therein for Internet browsing and with a Web server (5) having a Web application (6) residing therein. The Traffic Inspector (2) is configured to receive a request associated with the Web application (6) from the Web browser (4) and to send it to the Web browser (5), the Traffic Inspector (2) is configured to receive a DOM server code associated with the request from the Web server (5). The system is characterized in that it comprises a Traffic Analyzer (7) in signal communication with the Traffic Inspector (2) and having an algorithm application (8) residing therein, the Traffic Inspector (2) is configured to add a default code portion to the DOM server code to thereby generate a DOM client code to be sent to the Web browser (4) to receive a DOM rendered code associated with the DOM client code, the Traffic Inspector (2) is configured to send the DOM client code and the DOM rendered code to the Traffic Analyzer (7), the algorithm application (8) is configured to process the DOM rendered code to compare it with the DOM client code, to thereby identify at least one code difference.
Message Processing Method and Apparatus
Embodiments relate to a message processing method and apparatus. A first message is received that is sent by a first device to a second device. A determination is made as to whether the first message is a privacy message. When the first message is a privacy message, a second message is generated according to the first message, where the second message carries a first privacy label. The second message is sent to the second device, so that the second device displays a notification of the second message on a notification screen according to the first privacy label after receiving the second message. After receiving the second message, the second device displays the second message according to whether the second message carries the first privacy label.
RECOVERY AGENTS AND RECOVERY PLANS OVER NETWORKS
Examples include sending and receiving recovery agents and recovery plans over networks. Some examples include receiving a recovery request over a network from a requestor, sending a response to the requestor over the network, sending an executable copy of a recovery agent with a validation measure to the requestor, establishing an encrypted connection with the requestor, receiving a second request from the requester over the encrypted connection, determining a recovery plan that includes a command executable by the recovery agent, and sending the recovery plan to the requester over the encrypted connection. In some examples, the recovery request includes data that identifies the requester and the response and the recovery plan are based on the data identifying the requester.
Systems and methods for analyzing process chains to detect malicious behavior
Disclosed herein are systems and method for malicious behavior detection in processing chains comprising identifying a chain of related processes executing on a computing device; for each respective process in the chain of related processes: monitoring events generated by the respective process; storing snapshots of data modified by any of the events; determining a level of suspicion for the respective process by applying an artificial intelligence (AI) model to the snapshots of data; determining whether the chain of related processes is trusted based on the determined levels of suspicion; and in response to determining that the chain of related processes is not trusted, restoring objects affected by the chain from the snapshots.
Method for dynamic generation and modification of an electronic entity architecture
The subject matter discloses a method for generating a new dynamic function embedded within a chip, wherein the chip comprises a plurality of a building blocks, a first function, and a specification defining the new dynamic function; the method comprising the steps of: within the chip, performing the first function in accordance with the specification and/or analysis; and within the chip, generating the new dynamic function upon the performing the first function.
SOFTWARE HANDLING DEVICE, SERVER SYSTEM AND METHODS THEREOF
The present invention relates to a software handling device and a server system. The software handling device comprises a processor and a transceiver, wherein the transceiver is configured to transmit varies requests and to receive varies verifications and encryption keys to and from a server system. The server system comprises an authentication server, a licensing server and a software application server, wherein the server system is configured to receive varies requests and to transmit varies verifications and encryption keys from and to a software handling device. Furthermore, the present invention also relates to corresponding methods, a computer program, and a computer program product.