G06F2221/2147

Electronic apparatus and unlocking method thereof

An electronic apparatus and an unlocking method thereof are provided. The electronic apparatus receives an input password. When the input password matches a valid password, the electronic apparatus is unlocked. When the input password does not match the valid password, a protection system is activated. The protection system collects usage information and posts a warning message to a social networking site based on the usage information.

CONTROLLING ACCESS TO APPLICATION DATA

A method, system and computer-readable storage medium for controlling access to application data associated with an application configured on a computing device. The method comprises: storing data comprising, for each of a plurality of access levels associated with the application, first data indicative of a combination of one or more credentials associated with the respective access level and an access level key corresponding to the respective access level, the access level key being encrypted by the combination of one or more credentials associated with the respective access level; determining, based on the first data, an access level in the plurality of access levels corresponding to a combination of one or more credentials available to the application; decrypting the access level key in the stored data corresponding to the determined access level using the combination of one or more credentials available to the application; and providing access to encrypted application data associated with the application and corresponding to the determined access level using, at least in part, the decrypted access level key corresponding to the determined access level.

BILATERAL ASSERTION MODEL AND LEDGER IMPLEMENTATION THEREOF
20170295023 · 2017-10-12 ·

A computer implemented method for implementing a real time reconciling shared data structure is disclosed. The shared data structure may be stored in a memory, and a portion of the shared data structure may be coupled with a processor. The computer implemented method may be used for interacting with the shared data structure. The method may comprise the exchange of messages, requesting to change data in the shared data structure, between selected participants, wherein some of the participants must validate requested changes to the shared data. If all participants validate the requests to change data the changes to the data are made, and if less than all participants validate the requests then the changes are not made.

Electronic briefcases for inmate documents

Some implementations disclosed herein provide systems and methods that use an inmate-accessible electronic briefcase to facilitate an inmate's organization of significant content. Electronic documents are created and stored in an organized document storage area that may be accessed while the inmates are incarcerated and after the inmates are released.

LARGE FOLDER OPERATIONS IN A COLLABORATIVE CLOUD-BASED ENVIRONMENT
20170286229 · 2017-10-05 · ·

Systems for managing operating on folders that comprise a large number of objects in a cloud-based collaboration platform. A cloud-based environment includes storage devices that store content objects accessible by collaborating users. The content objects are identified by one or more hierarchical path identifiers comprising a folder identifier corresponding to a logical grouping. The hierarchical path identifiers are stored in a relational database. Methods receive an operation command from a user to operate on the content objects associated with the logical grouping, after which a relational database search query is generated. Processing of the query returns a plurality of result sets corresponding to respective portions of the content objects associated with the logical grouping. The operation command is applied iteratively over the plurality of result sets, and the command is finalized after the last iteration. Collaborators can perform certain operations on content objects even while the iterations are in progress.

DISTRIBUTED CLOUD STORAGE

One embodiment provides a storage management system. During operation, the system identifies a data file of a user. The system obtains an encrypted client registry from a primary cloud provider in a plurality of cloud providers that provide cloud storage to the user and retrieves a key associated with a device of the user by decrypting the encrypted client registry using a hash of a password associated with the user. The system obtains credentials of the plurality of cloud providers by decrypting a locally stored cloud configuration using the key and generates a plurality of coded fragments from the data file based on a generator matrix of erasure encoding. The number of coded fragments is determined based on a number of the cloud providers associated with the user. The system selects a respective coded fragment for uploading to a corresponding cloud provider in the plurality of cloud providers.

Working method of dynamic token
09781104 · 2017-10-03 · ·

Disclosed is a working method of a dynamic token. The present invention relates to the field of communications. The method comprises: when a token is awakened, the awakening identification type at a flag bit is determined; if the type is a key awakening identification, the key value is detected, and a corresponding operation is performed according to the key pressed; if the type is a Bluetooth data awakening identification, Bluetooth data is received, and when the Bluetooth data has been received, the Bluetooth data is stored in a received data temporary storage region, and the Bluetooth data awakening identification is reset; if the type is Bluetooth connection awakening identification, that Bluetooth has been connected is displayed, and after fourth preset period has passed, the screen is cleared, and the Bluetooth connection awakening identification is reset; if the type is Bluetooth disconnection awakening identification, that Bluetooth has been disconnected is displayed, the received data temporary storage region is cleared, and the Bluetooth disconnection awakening identification is reset; and if the type is an awakening identification of other types, a corresponding operation according to the awakening identification is performed.

Electronic apparatus and port control method for locking downstream USB ports
09779046 · 2017-10-03 · ·

A method of an embodiment enables locking of downstream ports of a USB hub controller in an electronic apparatus. The method includes the determination step, the assertion step and the lock step. The determination step determines, with a BIOS, whether a lock setting has been made on each of the downstream ports. The assertion step performs, with the BIOS, assertion control for resetting the USB hub controller. The lock step performs, with the BIOS, lock control during the assertion control based on whether the lock setting has been made.

SEMICONDUCTOR DEVICE MANAGING POWER BUDGET AND OPERATING METHOD THEREOF

A semiconductor device may comprise a plurality of chips coupled in a ring structure, and the plurality of chips includes a first chip. Each of the plurality of chips may include a key port receiving or outputting a key to circulate the key through the ring structure. The first chip is configured to be in a standby state until an amount of available token becomes equal to or greater than an amount of required token to perform a specific operation in the first chip, when the first chip has the key.

VALIDATING PARAMETERS ON DISCRETE COMPUTING APPLICATIONS TO GRANT ACCESS CONTROL TO CONTENT OR COMMANDS
20170251276 · 2017-08-31 ·

A system for validating an authorization request to facilitate controlling access to content or computer commands, in which the access is requested by multiple entities operated on discrete computing environments. The techniques make use of a system including a switchboard and a rule engine that collect parameter sets required for validation from the entities and dynamically generate a lock and key combination based on the collected parameter sets. The key of the lock and key combination allows the system to validate each entity independently regardless of the required parameters specified in the lock and key combination.