Patent classifications
G06F2221/2125
INTRUDER DETECTION USING QUANTUM KEY DISTRIBUTION
Intruder detection using quantum key distribution is disclosed. A request for a first key for use with a first application configured to execute on a computing device is received by a quantum computing system. The request includes information that identifies the application. In response to the request, a quantum key distribution (QKD) process to generate a key is initiated. It is determined that an intruder attempted to eavesdrop on the QKD process. A message is sent to the computing device that instructs the computing device to cause the first application to implement a reduced functionality mode of the first application.
System and method to safeguarding sensitive information in cobrowsing session
Co-browsing sessions allow an agent to see inputs of a user and assist the user in completing a task associated with the inputs, such as completing a form on an application or website. Agents may see the information provided by the user, unless that information is sensitive (e.g., social security number, account number, password, etc.), in which case the information is blocked. However, humans will make mistakes for any number of reasons. When that mistake is the providing of sensitive information in a non-sensitive field, systems and methods are provided to block such information, even when provided into a field not designated for sensitive information (e.g., city of residence). As a result, sensitive information may be entered during a co-browsing session, into a field by mistake, and not expose the information to the agent.
Encryption filter
The invention relates to a method and an apparatus for encrypted communication between a client and a server, wherein the communication comprises request messages, each with request elements, and response messages, each with response elements. Request elements and response elements can comprise data. It is an object of the invention to hamper or prevent unauthorized access to the data during communication and also during storage and processing on the server. In this case, it is assumed that the communication channel and also the server itself are not trustworthy and neither client nor server provide measures or are adaptable in order to counter said risks of unauthorized access, for example by means of cryptographic methods. The invention achieves this object by virtue of a first request message being received from a client, being broken down into request elements, and at least one request element being encrypted on the basis of a predetermined configuration, encrypted request elements being combined with unencrypted request elements to form a second response message, and being finally transmitted to the server; a first response message is then received from the server, broken down into response elements, and at least one request element is encrypted on the basis of a predetermined configuration, the encrypted request element is combined with unencrypted request elements to form a second request message, and is finally transmitted to the server; a first response message is received from the server, broken down into response elements, response elements that need to be decrypted are determined and decrypted, decrypted response elements are combined with unaltered, unencrypted response elements to form a second response message, and are finally transmitted to the client. The invention also presents an apparatus for encrypting communication between the client and the server, wherein the apparatus is arranged between the client and the server and wherein the apparatus is set up to perform the steps of said method for encrypted communication between the client and the server.
METHOD AND SYSTEM FOR TELETRANSMITTING TO A PROCESSING SITE A VIDEO STREAM CAPTURED ON A REMOTE INTERVENTION SITE
A method for teletransmitting to a processing site a captured video stream of a remote intervention scene comprises modifying the captured video stream so as to erase defined zones, then transmitting this stream thus modified to the processing site. The teletransmitting method is employed to remotely assist a field operator with an intervention on a site that is sensitive in terms of confidentiality. The video stream may be captured directly by the operator or from a drone, for example.
METHODOLOGY TO PREVENT SCREEN CAPTURE OF SENSITIVE DATA IN MOBILE APPS
Described herein are a system and methods for obfuscating sensitive data during a data capture event in order to prevent unauthorized reproduction of that sensitive data. In some embodiments, an event listener detects an event likely to result in a data capture and notifies an obfuscation module. The obfuscation module then identifies sensitive data fields, determines an appropriate obfuscation technique for each data field, and obfuscates the identified data fields for the duration of the event. In some embodiments, any active data input actions may be canceled. In some embodiments, the data values within the obfuscated data fields may be revealed upon completion of the event.
ONLINE GAMING PLATFORM VOICE COMMUNICATION SYSTEM
A method and system is disclosed that permits users of an online gaming platform to communicate via voice with other user in the online gaming platform.
SECURE RUNTIME FOR VIRTUAL MACHINES
A computer-implemented method at a data management system comprises: generating, with one or more processors, a containerized runtime in a memory in communication with the one or more processors; instantiating, with the one or more processors, an app in the runtime; receiving, with the one or more processors, a request from the app for data; retrieving, with the one or more processors, a copy of the requested data from a data source; and transmitting, with the one or more processors, the data to the containerized runtime for the app to operate on.
DYNAMIC RANDOMIZATION OF PASSWORD CHALLENGE
Disclosed herein is a method of performing a password challenge in an embedded system. The method includes receiving a password, scrambling the sub-words of the password pursuant to scramble control codes, retrieving a verification word, scrambling the sub-words of the verification word pursuant to the scramble control codes, and comparing the scrambled sub-words of the password to the scrambled sub-words of the verification word. Access to a secure resource is granted if the scrambled sub-words of the password match the scrambled sub-words of the verification word. The scramble control codes cause random reordering of the sub-words of the password and sub-words of the verification word in a same fashion, and insertion of random delays between the comparison of different sub-words of the password to corresponding sub-words of the verification word.
SECURE RUNTIME FOR VIRTUAL MACHINES
A computer-implemented method at a data management system comprises: generating, with one or more processors, a containerized runtime in a memory in communication with the one or more processors; instantiating, with the one or more processors, an app in the runtime; receiving, with the one or more processors, a request from the app for data; retrieving, with the one or more processors, a copy of the requested data from a data source; and transmitting, with the one or more processors, the data to the containerized runtime for the app to operate on.
SYSTEM AND METHOD FOR AUTOMATIC GENERATION OF MALWARE DETECTION TRAPS
A system and method of deployment of malware detection traps by at least one processor may include performing a first interrogation of a first Network Asset (NA) of a specific NA family; determining, based on the interrogation, a value of one or more first NA property data elements of the first NA; obtaining one or more second NA property data elements corresponding to the specific NA family; integrating the one or more first NA property data elements and the one or more second NA property data elements to generate a template data element, corresponding to the specific NA family; producing, from the template data element, a malware detection trap module; and deploying, on one or more computing devices of a computer network, one or more instantiations of the malware detection trap module as decoys of the first NA.