G06F2221/2123

Auto-recording of media data
11734417 · 2023-08-22 · ·

An image capture system and methods for auto-recording media data are herein disclosed. A method includes selecting an activity-specific monitor based on an activity type. The activity-specific monitor defines one or more auto-recording conditions that, when satisfied, cause the image capture system to record data. The auto-recording conditions are based on an audio profile, a video profile, a motion profile, or any combination thereof. The auto-recording conditions include one or more scene descriptions that correspond to the activity type.

Oblivious access with differential privacy
11727124 · 2023-08-15 · ·

A method executing an instruction (300) to execute a query (q) for a data block (102) and determining whether the data block is stored in a block stash (370). When the data block is stored in the block stash during a download phase, the method includes removing the data block from the block stash, sending a fake query (304) to a distributed system (140) to retrieve a random data block stored in memory (114) of a distributed system (140), and discarding the random data block. When a current version of the data block is stored in the block stash during an overwrite phase, the method includes sending a fake query to the distributed system to retrieve another random data block stored in the memory of the distributed system, decrypting and re-encrypting the random data block with fresh randomness, and re-uploading the re-encrypted random data block onto the distributed system.

Method and system for detection of post compilation modification of binary images
11321451 · 2022-05-03 · ·

A method at a computing device for identification post compilation manipulation of a binary image, the method including assessing the binary image for at least one junk instruction set; determining that the at least one junk instruction set is found within the binary image; and flagging the binary image as being manipulated based on the determining.

System & Method for Adjusting Privacy Policies

An automated system tracks digital service providers (DSP) data management agreements, and user behavior, individually and in aggregate, to determine potential changes for a personal/corporate privacy charter. The personal/corporate privacy charter is thus dynamically adaptable to permit users to continue to engage seamlessly in accordance with user/corporate target goals with digital service providers (DSPs) and similar entities.

CONTROL DEVICE AND CONTROL METHOD
20210365553 · 2021-11-25 ·

To provide a control device capable of minimizing side-channel leaks that can be generated before completion of an analog-to-digital conversion by a PUF implemented as a physical parameter and making attacks difficult. The control device provided includes a device unit that has regularly arranged analog devices such as pixel array, and a readout control unit that executes readouts that are a mixture of a real PUF readout (first readout) that generates unique information for the device unit and a dummy PUF readout (second readout) that does not generate unique information for the device.

DYNAMIC RANDOMIZATION OF PASSWORD CHALLENGE

A method of operating an electronic device includes generating scramble control codes. The scramble codes are generated by generating a random number, shifting the random number to produce a shifted random number, generating control signals by selecting different subsets of the shifted random number, and generating scramble control words by selecting different subsets of the random number based upon the control signals. The method further includes receiving a password comprised of sub-words and scrambling those sub-words according to the scramble control codes, retrieving a verification word comprised of sub-words and scrambling those sub-words according to the scramble control codes, and comparing the scrambled sub-words of the password to the scrambled sub-words of the verification word to thereby authenticate an external device that provided the password.

Dynamic randomization of password challenge

Disclosed herein is a method of performing a password challenge in an embedded system. The method includes receiving a password, scrambling the sub-words of the password pursuant to scramble control codes, retrieving a verification word, scrambling the sub-words of the verification word pursuant to the scramble control codes, and comparing the scrambled sub-words of the password to the scrambled sub-words of the verification word. Access to a secure resource is granted if the scrambled sub-words of the password match the scrambled sub-words of the verification word. The scramble control codes cause random reordering of the sub-words of the password and sub-words of the verification word in a same fashion, and insertion of random delays between the comparison of different sub-words of the password to corresponding sub-words of the verification word.

SECURE CIRCUIT INTEGRATED WITH MEMORY LAYER
20210342488 · 2021-11-04 ·

A secure integrated circuit comprises a lower logic layer, and one or more memory layers disposed above the lower logic layer. A security key is provided in one or more of the memory layers for unlocking the logic layer.

Integrity, theft protection and cyber deception using a deception-based filesystem

A decoy filesystem that curtails data theft and ensures file integrity protection through deception is described. To protect a base filesystem, the approach herein involves transparently creating multiple levels of stacking to enable various protection features, namely, monitoring file accesses, hiding and redacting sensitive files with baits, and injecting decoys onto fake system views that are purveyed to untrusted subjects, all while maintaining a pristine state to legitimate processes. In one implementation, a kernel hot-patch is used to seamlessly integrate the new filesystem module into live and existing environments.

Secure access control framework using dynamic resource replication

Systems, computer program products, and methods are described herein for secure access control using dynamic resource replication. The present invention is configured to electronically receive, from a computing device of a user, a request to generate a resource access path to access a resource; determine one or more resource requirements associated with the resource; determine an authentication level associated with the user; initiate a resource replication engine on the one or more resource requirements and the authentication level associated with the user; determine, using the resource replication engine, that the one or more requirements and the authentication level associated with the user meets one or more conditions for a replication process; and generate, using the resource replication engine, the resource access path and a plurality of replicate resource access paths.