Patent classifications
G06F2221/2111
Portable communication peripheral, system for protecting a portable terminal, and communication method
The portable peripheral (1001) of communication with a data storage peripheral and a data network utilizing the internet protocol, comprises: a connector to mechanically connect and establish a removable wired connection between the peripheral and a portable terminal, a first means of wired bidirectional communication with the portable terminal, a second means of bidirectional communication with a data storage peripheral or a data network and a security unit protecting the communication between the portable terminal and the data storage peripheral or the data network, this communication being established between the first and the second means of communication.
METHOD AND DEVICE FOR APPLICATION LOGIN
A method and device for application login are provided. The method includes: in response to a target user account's operation of triggering and displaying a target application login interface, acquiring a target login feature of the target user account, the target login feature including at least one of geographical location information of the target user account or parameters of a device used for login (S401); and determining, according to the target login feature, information of third-party channel logins allowed for logging in the target application (S402); and displaying, according to the information of third-party channel logins, corresponding third-party login icons on the target application login interface to allow the target user account to select a corresponding target third-party login channel to log in the target application (S403).
MANAGING DATA RESOURCES
A method comprising: storing, in a database, a list of geographical regions in which the party consents to their data being stored; receiving a request to store data of the party, wherein at least one of the data has a region-restriction that restricts the regions in which that data can be stored; determining, based on a respective region-restriction of a respective one of the data, in which of the list of regions the respective data can be stored; storing the data, wherein each respective data is stored in at least one respective storage centre associated with one of the regions according to the determination; storing, in the database, a list comprising a pointer to each respective stored data, wherein the pointer identifies the respective storage centre; receiving a request to retrieve a respective stored data; and using the pointer to route the request to the respective storage centre.
Active Locking Mechanism Using Machine Learning
Methods and systems disclosed herein describe using machine learning to lock and unlock a device. Machine learning may be trained to recognize one or more features. Once the device has been trained to recognize one or more features, a user may define an unlock condition for the device using the one or more trained features. After defining the unlock condition, the device may be locked by verifying the one or more features that the user defined as the unlock condition using machine learning. When verification is successful, the device may be unlocked and the user allowed to access the device.
RISK MITIGATION FOR A CRYPTOASSET CUSTODIAL SYSTEM USING DATA POINTS FROM MULTIPLE MOBILE DEVICES
Methods, systems, and apparatus for risk mitigation for a cryptoasset custodial system include transmitting an endorsement request for a cryptoasset transaction to a user device configured to cause the user device to prompt a user to endorse the cryptoasset transaction. Multiple data points are collected from mobile devices associated with the user. The data points indicate an identity of the user. A cryptographic endorsement of the cryptoasset transaction is received from the user device. A graphical visualization including a risk metric is generated based on the data points. The risk metric indicates a risk of accepting the cryptographic endorsement from the user device. Generating the graphical visualization includes determining whether the plurality of data points matches expected values
INFORMATION PROCESSING APPARATUS, NON-TRANSITORY COMPUTER READABLE MEDIUM STORING INFORMATION PROCESSING PROGRAM, AND INFORMATION PROCESSING METHOD
An information processing apparatus includes a processor configured to: acquire position information of a user in a case where the user is successful in authentication of a system including the information processing apparatus and requests to use the information processing apparatus; and request a management device, which manages a user who is capable of using the information processing apparatus, to allow the user to use the information processing apparatus even though a use of the information processing apparatus is not allowed in advance in a case where the user is present in a predetermined range from the information processing apparatus.
ENVIRONMENT AND LOCATION-BASED DATA ACCESS MANAGEMENT SYSTEMS AND METHODS
This disclosure relates to, among other things, secure data rights management and governance. Certain embodiments disclosed herein provide for a data access control and management architecture that enforces one or more rules, restrictions, and/or configurations in connection with managing access requests to data. In various embodiments, one or more of the enforced rules, restrictions, and/or configurations may articulate access conditions that depend, at least in part, on a source, physical location, and/or an execution environment associated with a data access request. In this manner, data access may be managed and/or governed based, at least in part, on the source, location, system and/or associated environment requesting access to the data.
Recognizing assigned passengers for autonomous vehicles
Aspects of the disclosure provide systems and methods for recognizing an assigned passenger. For instance, dispatching instructions to pick up a passenger at a pickup location are received. The instructions include authentication information for authenticating a client computing device associated with the passenger. A vehicle is maneuvered in an autonomous driving mode towards the pickup location. The client device is then authenticated. After authentication, a set of pedestrians within a predetermined distance of the vehicle are identified from sensor information generated by a sensor of the vehicle and location information is received over a period of time from the client device. The received location information is used to estimate a velocity of the passenger. This estimated velocity is used to identify a subset of set of pedestrians that is likely to be the passenger. The vehicle is stopped to allow the passenger to enter the vehicle based on the subset.
System and method of detecting hidden processes by analyzing packet flows
A method includes capturing first data associated with a first packet flow originating from a first host using a first capture agent deployed at the first host to yield first flow data, capturing second data associated with a second packet flow originating from the first host from a second capture agent deployed outside of the first host to yield second flow data and comparing the first flow data and the second flow data to yield a difference. When the difference is above a threshold value, the method includes determining that a hidden process exists and corrective action can be taken.
Securely managing digital assistants that access third-party applications
Systems herein allow a digital assistant to make requests to applications, such as third-party applications, that access data in an enterprise mobility management (“EMM”) system. The digital assistant can link to a portal application and receive a token that identifies a user. A remote application on a user device can establish a session with the portal application as part of a single sign on (“SSO”). The session can identify the same user. The portal application can then link the digital assistant to the remote application. When the digital assistant makes a request to the portal application, a notification can be pushed to the remote application. The user can confirm the request, establishing an authorized session during which time the digital assistant can make additional requests to the portal application. The portal application can service the requests by accessing third-party applications available through the portal application and authorized for access by the SSO.