Patent classifications
G06F2221/2113
METHOD AND APPARATUS WITH PROVIDER INFORMATION ACCESS AUTHORIZATION
A method and apparatus with provider information access authorization are provided. The method includes receiving a single sign-on (SSO) token from a provider apparatus for a validated login request by a client device for a user account, wherein the SSO token is indicative of the provider apparatus having authorized secure protocol access with the provider apparatus to access information at the provider apparatus associated with the user account, retrieving customer information from the provider apparatus using the SSO token, receiving information from the client device, confirming whether, based on the information and the customer information that a user of the user account is eligible to complete a data exchange, and in response to a result of the confirming being that the user of the user account is confirmed eligible to compete the data exchange, cause the provider apparatus to process the data exchange corresponding to the information.
Management apparatus and non-transitory computer readable medium for setting security levels of users in group resulting from unification
A management apparatus includes a memory, a unification policy setting unit, and a security level setting unit. The memory stores, for each of a user belonging to a first group and a user belonging to a second group, an authentication level of a domain assigned to a corresponding one of the users. The unification policy setting unit sets a unification policy that specifies a relationship between the authentication level and a security level for a state after unification. The security level setting unit sets the security level in a case where the first group and the second group undergo the unification into a third group. The security level is set for each of the users belonging to the third group by using the authentication level and the unification policy.
One-Shot Challenge to Search and Access Unredacted Vaulted Electronic Communications
A tool is disclosed for searching information redacted from electronic communications. The tool receives, based on input by a user into an interface of an electronic communication repository, a request to search through vaulted information, the vaulted information redacted from the electronic communication repository. The tool transmits an identity verification challenge to a device of the user and determines whether the identity verification challenge is successful. Responsive to determining that the identity verification challenge is successful, the tool searches the vaulted information for one or more files comprising a symbol input by the user, and generates, for display within the interface, identifiers corresponding to each of the one or more files.
METHOD AND DEVICE FOR OPERATING A COMPUTING DEVICE
A method for operating a computing device for a control unit of a motor vehicle. The computing device including a processor core, and is configured to control an exchange of data between a connectivity zone and a security zone. The security zone includes at least one component which is necessary to drive the vehicle and has an elevated relevance with regard to safety. The connectivity zone including at least one component whose operation requires communication outside of the vehicle but is not required to drive the vehicle and does not have an elevated relevance with regard to safety. At least one first program executable by the computing device is assigned to a non-trustworthy zone, and at least one further program is assigned to a trustworthy zone. The component of the connectivity zone is assigned to the non-trustworthy zone, and the component of the security zone being assigned to the trustworthy zone.
SYSTEM AND METHOD FOR DYNAMIC MULTI-FACTOR AUTHENTICATION
Systems and methods for authenticating users are described herein. One or more inputs including of biometric data, physical trait data, and other data sources may be collected passively when an individual is present in a space. A confidence ratio associated with one or more of the collected inputs may be determined. One or more of the determined confidence ratios may be evaluated together to determine a final confidence ratio for a user, on which an authentication decision is based. An access level may be selected from a plurality of access levels with different access privileges based on the determined confidence ratio. Authentication may be continuous or ongoing.
Method for sharing and searching playlists
A system that provides for the accessing and playing of media files having differing associated rights such as non-DRM media files, purchased and downloaded media files, subscription download files such as tethered downloads, and subscription streamed DRM files. The system also provides a method and user interface for sharing a media collection among computing devices in communication via a network. The system allows access and playback, from each computing device on a network, of all media files in a media collection, regardless of their associated rights.
ELECTRONIC DEVICE AND OPERATING METHOD
An electronic device may include a memory and at least one processor operatively connected with the memory. The at least one processor, including processing circuitry, may run a user application in a first area operating with a first permission and run an operating system in a second area operating with a second permission higher than the first permission. The memory stores instructions configured to, when executed, cause the at least one processor to detect an operation of at least one first device included in the electronic device, in a third area operating with a third permission higher than the second permission, deliver a detection signal for the at least one first device to a fourth area, an execution environment of which is separated from the first area, the second area, and the third area, in the third area, and provide a notification that the at least one first device is operating using at least one specified second device, in the fourth area. The fourth area may be an area on a second virtual machine, an execution environment of which is separated from the first area and the second area being areas on a first virtual machine by a hypervisor executed in the third area.
Threshold-based assembly of remote automated assistant responses
Techniques are described herein for assembling/evaluating automated assistant responses for privacy concerns. In various implementations, a free-form natural language input may be received from a first user and may include a request for information pertaining to a second user. Multiple data sources may be identified that are accessible by an automated assistant to retrieve data associated with the second user. The multiple data sources may collectively include sufficient data to formulate a natural language response to the request. Respective privacy scores associated with the multiple data sources may be used to determine an aggregate privacy score associated with responding to the request. The natural language response may then be output at a client device operated by the first user in response to a determination that the aggregate privacy score associated with the natural language response satisfies a privacy criterion established for the second user with respect to the first user.
Data security classification sampling and labeling
Cybersecurity and data categorization efficiency are enhanced by providing reliable statistics about the number and location of sensitive data of different categories in a specified environment. These data sensitivity statistics are computed while iteratively sampling a collection of blobs, files, or other stored items that hold data. The items may be divided into groups, e.g., containers or directories. Efficient sampling algorithms are described. Data sensitivity statistic gathering or updating based on the sampling activity ends when a specified threshold has been reached, e.g., a certain number of items have been sampled, a certain amount of data has been sampled, sampling has used a certain amount of computational resources, or the sensitivity statistics have stabilized to a certain extent. The resulting statistics about data sensitivity can be utilized for regulatory compliance, policy formulation or enforcement, data protection, forensic investigation, risk management, evidence production, or another classification-dependent or classification-enhanced activity.