Patent classifications
G06F2221/2153
Systems and Methods for Temporary Digital Content Sharing
Systems and methods are provided herein for temporary digital content sharing. The systems and methods may involve receiving, from a first device, a selection of a first element associated with a first URL. The systems and methods may also involve determining first content associated with the first URL. The systems and methods may also involve receiving, from the first device, a selection of a second device at which to display the first content associated with the first URL. The systems and methods may also involve providing the first URL to the second device, wherein the URL allows access to the content by the second device.
Program execution device
A program execution device capable of protecting a program against unauthorized analysis and alteration is provided. The program execution device includes an execution unit, a first protection unit, and a second protection unit. The execution unit executes a first program and a second program, and is connected with an external device that is capable of controlling the execution. The first protection unit disconnects the execution unit from the external device while the execution unit is executing the first program. The second protection unit protects the first program while the execution unit is executing the second program.
METHODS, WIRELESS MODULES, ELECTRONIC DEVICES AND SERVER DEVICES
The present disclosure provides a method, performed in a wireless module. The method for securing a software update operation of an electronic device. The wireless module comprises a first interface to a server device and a second interface to the electronic device, a memory module and a processor module. The method comprises receiving a software update request, via the first interface; authenticating the software update request; and in accordance with authentication of the software update request succeeds, providing, via the second interface, software data corresponding to the software update request.
Method, system and device for managing an execution of a program relating to part or all of a first application
A method for managing a first application program comprises: executing, by a first processor, a first control flow; executing, by a second processor, in synchronization with the first control flow execution, a second application, comprising a variable and an expected value that the variable has to have or a condition that the variable has to satisfy to authorize an execution of the correct first control flow; verifying, by the second processor, by executing each of the at least one second application, whether the variable has the expected value or the variable satisfies the condition; and inferring, by the second processor, if, for the second application, the variable has (not) the expected value or does (not) satisfy the condition, that the first processor is (not) executing the correct first control flow.
SECURE COMMUNICATION BETWEEN A CONTACT LENS AND AN ACCESSORY DEVICE
Described herein are systems and methods that allow for secure wireless communication between a contact lens system and an accessory device to protect sensitive data and prevent unauthorized access to confidential information. In certain embodiments, tampering attempts by potential attackers are thwarted by using a Physically Unclonable Functions (PUF) circuit that is immune to reverse engineering. In addition, sensors monitor a to-be-protected electronic device to detect tampering attempts and physical attacks to ensure the physical integrity of the communication system.
Trusted computing attestation of system validation state
A trusted computing environment may be dynamically certified by providing a selectable boot option that controls running a loadable boot image in one of a test mode and a production mode. The test mode may automate running a processing standard validation test to obtain a processing standard validation test result. Responsive to running the processing standard validation test with a successful test result, a record indicating the successful test result and the loadable boot image is stored within the trusted computing environment, utilizing a certification process. Responsive to running the production mode, the trusted computing environment and the loadable boot image may be loaded.
Method and system for preventing unauthorized processor mode switches
Disclosed embodiments relate to a system having a processor adapted to activate multiple security levels for the system and a monitoring device coupled to the processor and employing security rules pertaining to the multiple security levels. The monitoring device restricts usage of the system if the processor activates the security levels in a sequence contrary to the security rules.
SYSTEM AND METHODS FOR SECURE FIRMWARE VALIDATION
An electronic device, such as a dynamic transaction card having a chip, an applet, and a cryptographic coprocessor performs secure firmware and/or software updates, and performs firmware and/or software validation for firmware and/or software that is stored on the electronic device. Validation may compare a calculated checksum with a checksum stored in the device. If a checksum calculated for a firmware and/or a software application matches a stored checksum, the transaction card may operate normally. If a checksum calculated for a firmware and/or a software application does not match the stored checksum, the transaction card may freeze all capabilities, erase the memory of the transaction card, display data indicative of fraud, and/or the like.
ADD-ON MODEM FOR WIRELESS DEVICES AND METHODS USEFUL IN CONJUNCTION THEREWITH
System for ex post facto upgrading of at least one Legacy personal communication device including a legacy modem and lacking at least one desired wireless communication feature, the system comprising an upgraded communication device including an auxiliary modem physically connected via an ex post facto physical connection to a Legacy personal communication device having at least one legacy wireless output channel which has been neutralized or disabled.
Authentication Techniques in Response to Attempts to Access Sensitive Information
The present disclosure describes techniques for changing a required authentication type based on a request for a particular type of information. For example, consider a situation where a user has asked a virtual assistant who owns this device? By default, the device may allow biometric authentication to unlock. In response to identification of the owner by the virtual assistant, however, the device may require one or more other types of authentication (e.g., manual entry of a passcode) to unlock the device. In various embodiments, the disclosed techniques may increase the security of the device by making it more difficult for malicious entities to obtain the sensitive information or to access device functionality once the sensitive information has been disclosed. In various embodiments, this may prevent or reduce unauthorized access to the device.