Patent classifications
G06F2221/2151
SYSTEM AND METHOD FOR PROTECTING, MANAGING AND MONETIZING CREATIVE WORKS USING BLOCKCHAIN
A system and method for protecting, managing and monetizing creative works using blockchain including storing the creative works on a blockchain to timestamp the creative work and then validating the creative work. The validated creative work is then minted as a validated NFT which can then be monetized.
APPARATUS AND METHOD FOR DEVICE SECURITY
An apparatus and method for device security, wherein a fingerprint image is acquired on a touchscreen, and an authentication process is performed based on the first fingerprint image. Thereafter, a second fingerprint image is acquired and a difference between a characteristic of the first and second fingerprint images is determined, and based upon whether this difference is greater than a threshold, a second authentication process is performed.
Update management method, update management system, and non-transitory recording medium
An update management method is used in an onboard network system having a plurality of electronic control units (ECUs) that performs communication via a network and connects to an external tool. The method includes a master ECU storing a shared key and an expiration date of the shared key. When the master ECU receives an update message, verifying update authority information indicating authority of the external tool, and determining whether or not a transmission of the update message is within a range of an authority of the external tool. The method also includes acquiring external point-in-time information, determining whether or not the external point-in-time information is before the expiration date, and transmitting an alert message prompting an update of the shared key. The ECUs are prioritized according to a designated level of authority, including chassis-related functions, body-related functions, safety/comfort functions, and telematics/infotainment functions.
USER CONTROLLED EVENT RECORD SYSTEM
A user controlled mobile device for use in countering phantom billing fraud in connection with receiving health care services includes one or more components capturing and outputting biometric data and location data, and a data storage device holding an event record created without explicit user intervention indicating whether the particular user was at the particular location, the event record including a timestamp corresponding to events at or near a time of the timestamp including a time of capture of the biometric and location data, the biometric data and location data, where the stored event record serves as the personal audit trail evidencing an existence or absence of phantom billing.
Method and device for processing image, computer readable storage medium and electronic device
A method for processing an image, a non-transitory computer readable storage medium and an electronic device are provided. The method includes: in response to detecting an image capturing instruction, determining a security of an application operation corresponding to the image capturing instruction; and capturing an image corresponding to a determination result based on the determination result.
Identifying copyrighted material using embedded timestamped copyright information
Disclosed herein are methods, systems, and apparatus, including computer programs encoded on computer storage media, for identifying copyrighted material based on embedded copyright information. One of the methods includes generating, by a computing device, a timestamp indicating a time at which an update to a text segment within the textual content is performed to provide an updated text segment; generating, by the computing device, a unique identifier (ID) based on the timestamp and copyright information associated with the textual content, wherein the timestamp, the textual content, the updated text segment, and the copyright information are recorded on a blockchain of a blockchain network; and embedding, by the computing device, the unique ID in at least a portion of the updated text segment to provide an information-embedded updated text segment that enables retrieval of the copyright information associated with the updated text segment from the blockchain based on the unique ID.
Method, apparatus, and computer-readable storage medium for obtaining a target image
An image processing method, an apparatus, a non-transitory computer readable storage medium and an electronic device are disclosed. The method includes: acquiring an accuracy level of a target application in response to an image collecting instruction initiated by the target application; adjusting an accuracy of an image to be sent according to the accuracy level, and obtaining a target image; and sending the target image to the target application.
MDM-based persistent security monitoring
A method of establishing security monitoring functionality on a device on retail display includes obtaining, by a processor of a server computer, a mobile device management (MDM) startup message from the device, determining, by the processor, whether the device is enrolled for MDM supervision, and if the device is enrolled for the MDM supervision, downloading, by the processor to the device, configuration data to support the MDM supervision and implementation of the security monitoring functionality.
Login from an alternate electronic device
Systems and techniques for providing login from an alternate electronic device are presented. A system can receive hash data associated with first fingerprint data and a timestamp from a first electronic device in response to a determination that the first electronic device satisfies a defined criterion associated with a terminal computing request. The system can also form a correlation between the first electronic device and a second electronic device within a geographic area associated with the first electronic device based on the timestamp, first location data associated with the first electronic device, and second location data associated with the second electronic device. Furthermore, the system can initiate display of a graphical user interface on the second electronic device in response to a determination that second fingerprint data provided to the second electronic device within a timeframe associated with the timestamp matches the first fingerprint data associated with the hash data.
Event log tamper resistance
Embodiments are described for generating, by the processor, a first event record in response to an event being performed by the computer and generating, by the processor, a first tamper resistance record in response to the first event record being generated. The first tamper resistance record includes a first signature is created based at least in part on the first event record and a second signature is created based at least in part on the first event record. Aspects also includes validating the first event record based on the first signature and the second signature in the first tamper resistance record in response to a request to detect tampering of the first event record.