G06F2221/2117

MANAGED DATA ASSETS FOR ELECTRONIC DEVICES
20220327233 · 2022-10-13 ·

The disclosed technology provides for secure storage and usage of data at an electronic device. A device may include a hardened data manager that securely stores data associated with users of the device and/or another device. An application that does not have access to the securely stored data can still use the securely stored data by requesting that another system process at the device perform operations on the securely stored data and/or one or more updates to the securely stored data. For example, an application can request rendering of an avatar of a user. A rendering engine, separate from the application, can obtain securely stored base data from the hardened data manager, obtain updates to the securely stored base data, and render the avatar using the updates to the securely stored base data, without exposing the securely stored base data to the application.

Secure information storage and retrieval apparatus and method
11663304 · 2023-05-30 ·

A user using a client computer registers with a server computer over a computer network by submitting a biometric scan of a body part of the user. The user commands the client computer to encrypt an electronic file. The client computer generates a private key, encrypts the electronic file and transmits the key to the server computer. The client computer saves the encrypted file. The encrypted file and the key are saved at different physical locations. The owner of the file is able to grant permission to other registered users to unlock the encrypted file.

PRIVACY ENFORCER
20230161902 · 2023-05-25 ·

A data protection broker node and methods are provided. In one embodiment, the data protection broker node is configured to perform a bootstrap operation between a user and the data protection broker node, to initialize a blockchain; as a result of the bootstrap operation, obtain a trusted temporary public identifier identifying the user; receive a request for a new transaction associated with the user and join the new transaction to the blockchain; and authorize the user to use the trusted temporary public identifier to perform a user transaction to protect a privacy of the user's data.

Systems and methods for efficient and secure temporary anonymous access to media content
11658979 · 2023-05-23 · ·

A method for providing access to media content from a media content provider is performed at an electronic device. The method includes receiving, from a client device, a request for access to a media item. The request for access includes a self-describing user-identifier. The method includes, in response to the request for access to the media item, initiating an analysis to determine whether the client device is authorized to access the media item, the analysis including an examination of a media consumption log associated with the client device. The media consumption log stores data representing self-describing user-identifiers. The analysis includes, based on the examination of the media consumption log, detecting multiple requests from different self-describing user identifiers corresponding to the client device to determine whether the client device has reached an access limit and, when the client device has reached the access limit, terminating access to the media item.

ANALYTIC IMAGE FORMAT FOR VISUAL COMPUTING

In one embodiment, an apparatus comprises a storage device and a processor. The storage device stores a plurality of images captured by a camera. The processor: accesses visual data associated with an image captured by the camera; determines a tile size parameter for partitioning the visual data into a plurality of tiles; partitions the visual data into the plurality of tiles based on the tile size parameter, wherein the plurality of tiles corresponds to a plurality of regions within the image; compresses the plurality of tiles into a plurality of compressed tiles, wherein each tile is compressed independently; generates a tile-based representation of the image, wherein the tile-based representation comprises an array of the plurality of compressed tiles; and stores the tile-based representation of the image on the storage device.

Artificial intelligence apparatus for performing voice control using voice extraction filter and method for the same
11468886 · 2022-10-11 · ·

According to an embodiment of the present invention, an artificial intelligence (AI) apparatus for performing voice control, includes a memory configured to store a voice extraction filter for extracting a voice of a registered user, and a processor to receive identification information of a user and a first voice signal of the user, to register the user using the received identification information, to extract a voice of the registered user from the received second voice signal by using the voice extraction filter corresponding to the registered user, when a second voice signal is received, and to proceed a control operation corresponding to intention information of the extracted voice of the registered user. The voice extraction filter is generated by using the received first voice signal of the registered user.

Information provision method

An information provision method includes accumulating, in a first database, a first identifier identifying each of one or more service providers, and first device information indicating an electrical device to be designated by each of the one or more service providers in association with each other; accumulating, in a second database, a second identifier identifying each of one or more users, and second device information indicating an electrical device to be used by the one or more users in association with each other; extracting a service provider associated with the first device information when the second device information is updated by addition of a new electrical device to be used by one of the one or more users, and when the new electrical device is included in the electrical devices indicated by the first device information.

Emotion-based authentication service

An emotion-based authentication service can obtain data associated with a user device, identify an emotion associated with the data, detect an authentication request that requests authentication of the user device using an emotion-based authentication service, generate, based on the emotion and the data, a challenge for the user device and an expected response to the challenge, receive, from the user device, a response to the challenge, and determine if the user device is to be authenticated based on the response to the challenge and the expected response to the challenge.

VOICE SHORTCUT DETECTION WITH SPEAKER VERIFICATION
20220335953 · 2022-10-20 ·

Techniques disclosed herein are directed towards streaming keyphrase detection which can be customized to detect one or more particular keyphrases, without requiring retraining of any model(s) for those particular keyphrase(s). Many implementations include processing audio data using a speaker separation model to generate separated audio data which isolates an utterance spoken by a human speaker from one or more additional sounds not spoken by the human speaker, and processing the separated audio data using a text independent speaker identification model to determine whether a verified and/or registered user spoke a spoken utterance captured in the audio data. Various implementations include processing the audio data and/or the separated audio data using an automatic speech recognition model to generate a text representation of the utterance. Additionally or alternatively, the text representation of the utterance can be processed to determine whether at least a portion of the text representation of the utterance captures a particular keyphrase. When the system determines the registered and/or verified user spoke the utterance and the system determines the text representation of the utterance captures the particular keyphrase, the system can cause a computing device to perform one or more actions corresponding to the particular keyphrase.

PHOTOGRAPHING CONTROL DEVICE, SYSTEM, METHOD, AND NON-TRANSITORY COMPUTER-READABLE MEDIUM STORING PROGRAM

A photographing control device includes: a first acquiring unit that acquires a first photographed image obtained by a first photographing device; a first authentication controlling unit that causes an authentication device to perform first facial authentication of the first photographed image; a calculating unit that calculates, in the first photographed image, a proportion of an area of a facial region; a second acquiring unit that acquires a second photographed image capturing the person and obtained by a second photographing device installed within a predetermined range from the first photographing device and having a wider angle than the first photographing device, if the proportion is no smaller than a predetermined value; a second authentication controlling unit that causes the authentication device 200 to perform second facial authentication of the second photographed image; and an output unit that outputs the second photographed image to the outside.