Patent classifications
G06F2221/2147
Apparatus and method for unlocking a locking mode of portable terminal
A method of unlocking a locking mode of a portable terminal, which includes sensing a user's gesture input which is set in a locking mode of the portable terminal. The locking mode is unlocked in response to the user's gesture input, and a function mapped to the user's gesture can be executed when unlocking the locking mode. A portable terminal compares gestures among predefined sets of gesture information in order to check whether there is a gesture that coincides with the analyzed gesture.
Block or page lock features in serial interface memory
Embodiments are provided for protecting boot block space in a memory device. Such a memory device may include a memory array having a protected portion and a serial interface controller. The memory device may have a register that enables or disables access to the portion when data indicating whether to enable or disable access to the portion is written into the register via a serial data in (SI) input.
Mutable Encrypted System
Security of network traffic may be increased by utilizing a mutable password to encrypt and decrypt content stored inside an executable utilizing a mutable password (e.g., where a password changes based on an equation when the executable is run). For example, the present password may be associated with a variable, the variable may be modified when the executable is run using the present password, and a subsequent password may be generated based on the modified variable.
Biometric Interface System and Method
A system includes a wearable device having at least one sensor configured to determine a user's fingerprint data, at least one data storage device containing authentication data, and at least one processor configured to compare the user's fingerprint data with the authentication data in order to authenticate a user. A method of authenticating a wearable device includes producing a fingerprint, determining fingerprint data derived from the fingerprint with one or more sensors, comparing the fingerprint data with authentication data on one or more data storage devices, and authenticating the user if the fingerprint data and the authentication data match.
Methods and systems for securing sensitive information using a hypervisor-trusted client
The methods and systems described herein provide for securing sensitive information using a hypervisor-trusted client, in a computing device executing a hypervisor hosting a control virtual machine and a non-trusted virtual machine. A user of a non-trusted virtual machine requests to establish a connection to a remote computing device. Responsive to the request, a control virtual machine launches a client agent. A graphics manager executed by the processor of the computing device assigns a secure section of a memory of a graphics processing unit of the computing device to the client agent. The graphics manager renders graphical data generated by the client agent to the secure section of the graphics processing unit memory.
VEHICLE MULTIMEDIA DEVICE
The invention relates to the transmission of multimedia data, which is to be output, from a computer device to a vehicle multimedia device. The vehicle multimedia device has a control device which is designed to determine a piece of vehicle status information in order to transmit said information to the computer device. On the basis of the vehicle status information, the computer device generates release data which determines to what extent the multimedia data is to be output. The computer device transmits the multimedia data and the release data to the vehicle multimedia device, which multimedia device outputs, by means of an output device, the maximum multimedia data to the extent defined by the release data.
MALICIOUS COMMUNICATION PATTERN EXTRACTION APPARATUS, MALICIOUS COMMUNICATION PATTERN EXTRACTION METHOD, AND MALICIOUS COMMUNICATION PATTERN EXTRACTION PROGRAM
A malicious communication pattern extraction apparatus extracts communication patterns of traffic group of malwares, and replaces the values of predetermined field with variation in a traffic group with a wild card. Further, the malicious communication pattern extraction apparatus classifies pieces of malware having similar communication patterns in the traffic group into the same cluster, and for each cluster, extracts, as a malicious communication pattern, a communication pattern group having an appearance rate in a traffic group of respective pieces of malware in the cluster, the appearance rate being equal to or larger than a predetermined value. Thereafter, the malicious communication pattern extraction apparatus eliminates, from the extracted malicious communication patterns, any malicious communication pattern having a conformance rate to a traffic group not infected with malware, the conformance rate being equal to or larger than a predetermined value.
METHODS, APPARATUSES AND COMPUTER PROGRAM PRODUCTS FOR MANAGING ORGANIZATION CONNECTIONS IN A GROUP-BASED COMMUNICATION SYSTEM
Managing organization disconnections from a shared resource of a communication platform is described. In a sharing approval repository of a communication platform, a shared resource can be associated with a host organization identifier and a non-host organization identifier. In an example, in response to receiving, from a user computing device associated with the host organization identifier or the non-host organization identifier, a resource disconnection request comprising a disconnecting organization identifier and a resource identifier associated with the shared resource, the sharing approval repository can be updated to add a disconnection indication for the resource identifier in association with the disconnecting organization identifier. The disconnection indication can restrict access, of users of a disconnected organization, to data associated with the shared resource that is stored in a live shared resource repository and can cause a static shared resource to be presented based on a selection input corresponding to the shared resource.
Using an Action Registry to Edit Data Across Users and Devices
Using an action registry to edit data across users and devices is described. In one or more implementations, a user editing data in an application requests to share the data with another user or another device for further editing. Responsive simply to the request or based on an exchange of content transfer information, the data is communicated to the selected user or device. Using information maintained by an action registry, a list of applications capable of editing the data is presented to the selected user or via the selected device. Upon selection of an application from the list, the selected application is launched. Once changes are made to the data by the selected user or device, those changes can be saved and the changed data automatically returned to the original user and/or device. The changed data can then be automatically presented to the original user or on the original device.
DETECTION OF AN UNAUTHORIZED MODIFICATION TO STORAGE AND RESTORATION OF THE STORAGE
An aspect includes monitoring storage of a computer system. Upon detecting an unauthorized modification to an original storage component in response to the monitoring, an aspect includes retrieving a backup component corresponding to the original storage component and repairing the original storage component using the backup component. In embodiments, the repair occurs in real-time without interruption to computer operation.