Patent classifications
G06F2221/2139
Interactive electronic content delivery in coordination with rapid decoding of brain activity
A method and system for providing a user with virtual objects within an environment, characterizing interactions with the virtual objects using a brain computer interface, and modulating features of the virtual objects based upon improved classifiers associated with the interactions. The method and system can be used to rapidly customize virtual objects to a specific user in applications related to increasing engagement with traditional and new media content, virtual and augmented reality products, streamlining interactions with input devices in digital and physical environments, providing user authentication tools, providing more secure cybersecurity features, and delivering tailored content to users.
Application-specific security
Embodiments for enabling or disabling application features according to application-specific security settings are described. The application-specific security settings can control when particular security levels, corresponding to authentication procedures, are required. The security levels can correspond to authentication procedures such as requiring no password, only requiring a PIN, allowing authentication by biometrics, or requiring a password. The application-specific security settings can control security levels based on a variety of circumstances such as setting particular security levels for particular locations, setting different security levels based on time since last device use, etc. In various implementations, the security levels can be mapped to application features to enable or disable.
Identity verification system and method for gathering, identifying, authenticating, registering, monitoring, tracking, analyzing, storing, and commercially distributing dynamic biometric markers and personal data via electronic means
An interactive identity verification system for gathering, identifying, authenticating and registering biometric data of a consumer verified through government agencies while monitoring, tracking, analyzing, storing and distributing dynamic biometric data to ensure access to the secured system remains authorized via monitoring of consumer data and to control authorized access to participating computer systems and programs. Consumer identity is verified with markers gathered from biometric detection and collection devices provided within the system, correlated with unique personal information and geo-location coordinates allowing authorized access to a secure computer system. Dynamic monitoring of consumer biometric data is required to guarantee online identity verification while operating under an alias or avatar to maintain public anonymity, participate in marketing incentive programs and increase security. The system provides for a registered consumer to use multiple registered computer devices while the central repository interfaces dynamically with specific markets to distribute stored data within the system.
Methods and apparatus for dynamic data access provisioning
According to one aspect of this disclosure, dynamic access provisioning provides a centralized, flexible and consistent mechanism to grant access rights to data in real-time by dynamically evaluating access policies that involve user, data and environmental attributes. The mechanism handles complex authorization policies involving numerous different user types with differing access needs and rights, as well as numerous different data sources with differing access requirements. The mechanism also simplifies data usage by providing a single-context experience in a user session, giving access to data from multiple diverse data sources in one access context. Data could be in different domains or project spaces. Users (or the data access apps they create in the session) are not required to switch access contexts to access all the data they are entitled to. The system is also scalable, in that additional data users and data producers may be easily added to the dynamic access provisioning environment.
Information content viewing method and terminal
An information content viewing method includes displaying, by a terminal, a first lock screen or keeps in a screen-off state, and displaying, by the terminal, a second lock screen after receiving first information, where the second lock screen displays a first control, and the first control prompts that content of the first information is hidden, receiving, by the terminal, a first operation of a user on a touchscreen, and collecting and verifying, by the terminal, fingerprint information of the user based on the first operation and displaying, by the terminal, a third lock screen after the verification on the fingerprint information succeeds, where the third lock screen displays the first control, and the first control displays the content of the first information.
Access control system for controlling access of a user to one or more operating functions of a technical installation
An access control system controls access of a user to one or more operating functions of a technical installation. The access control system includes a receiving device configured to read access authorization data from a mobile data medium and an access control device configured to receive and validate the access authorization data from the receiving device. The receiving device continuously adds a dynamic portion to the access authorization data to create dynamic access authorization data and sends the dynamic access authorization data to the access control device. The access control device, in response to the dynamic access authorization data corresponding to a defined expectation, generates a release signal for those operating functions for which the access authorization data is valid.
DIGITAL KEY DEVICE AND METHOD FOR ACTIVATING DIGITAL KEY SERVICE
A digital key service device includes a casing, an input device, a data storage unit and a controlling unit. The input device is disposed near the casing or mounted on the casing, and configured to receive a user operation input. The data storage unit is disposed in the casing, and configured to store digital data and a digital key. The controlling unit is disposed in the casing, and configured to use the digital key to perform a digital key service or output the digital data to a host when authentication is complete. The authentication includes an operation verification procedure for verifying the user operation input. The authentication is complete when the controlling unit determines that the user operation input conforms to a preset timing-based input set.
Data processing systems for identifying and modifying processes that are subject to data subject access requests
In particular embodiments, in response a data subject submitting a request to delete their personal data from an organization's systems, the system may: (1) automatically determine where the data subject's personal data is stored; (2) in response to determining the location of the data (which may be on multiple computing systems), automatically facilitate the deletion of the data subject's personal data from the various systems; and (3) determine a cause of the request to identify one or more processing activities or other sources that result in a high number of such requests.
Digital signature using phonometry and compiled biometric data system and method
A system, method and one or more wireless earpieces for authenticating utilization of one or more wireless earpieces. A request is received through the one or more wireless earpieces. Biometric readings are performed for a user utilizing sensors of the one or more wireless earpieces. The biometric readings are analyzed to determine whether a biometric profile authorizes the one or more wireless earpieces to fulfill the request. The request is authenticated in response to determining the biometric profile authorizes fulfillment of the request.
ADDITIONAL SECURITY WITH WRAPPED PROGRAM INCLUDING PAYLOAD AND ADMINISTRATIVE CREDENTIAL
A predetermined credential system for remote administrative operating system (OS) authorization and policy control is disclosed. Administrative activities are packaged in single-use downloaded software. When executed, the administrative access to the OS is activated before completing the administrative activities. The admin credential is encrypted in a wrapped program. A payload program and administrative credentials are extracted from a wrapped program. The payload program adds functionality or affects policies and/or change update settings and configuration selected for an end user computer or a group of end user computers.