G06F21/1064

Method and system for operating an extension on a measuring transducer of process automation technology
10990662 · 2021-04-27 · ·

The present disclosure discloses a method for operating an expansion of a measuring transducer of process automation technology, comprising at least the steps: Starting the measuring transducer by starting its operating software; connecting the extension to the measuring transducer; establishing data communication between extension and measuring transducer, wherein the extension and the measuring transducer form an asymmetric cryptosystem; and the extension interacts with the measuring transducer.

Age-based app lock
10990654 · 2021-04-27 · ·

An entity runs in background mode on a computing device and automatically determines when the current user is attempting to open an age-restricted app. The age of the user is automatically determined, e.g., by passively capturing a biometric image and estimating the user's age. A camera on the computing device can be used to take a picture of the user, and a facial image can be recognized in the picture by applying a facial recognition algorithm. The age of the user can be estimated based on the facial image, by applying an age estimation algorithm. The app is locked responsive to determining that the user's age does not meet a corresponding requirement. A communication can be transmitted to the primary user of the computing device, indicating that the current user of the device unsuccessfully attempted to open the app, optionally including a picture of the user.

SYSTEMS AND METHODS FOR INTRUSION DETECTION AND PREVENTION USING SOFTWARE PATCHING AND HONEYPOTS
20210011985 · 2021-01-14 ·

A variety of methods are provided for an application or operating system (OS) kernel intrusion detection and prevention, based on usage of existing vulnerability fixes and their transformation into honeypot detectors. A honeypot patch may be generated for a computing system associated with a software vulnerability in software installed on the computing system. The honeypot patch, when used to modify the installed software, can convert the computing system into a honeypot system configured to detect attempts to exploit the software vulnerability of the software, and in response, generate a security event associated with the software vulnerability.

SECURE FINGERPRINT IMAGE SYSTEM
20200401699 · 2020-12-24 · ·

Herein disclosed are approaches for protecting sensitive information within a fingerprint authentication system that can be snooped and utilized to access the device, secured information, or a secured application. The approaches can utilize encryption keys and hash functions that are unique to the device in which the fingerprint authentication is being performed to protect the sensitive information that can be snooped.

Electronic apparatus and control method thereof

An electronic apparatus operated based on an OS is provided. The electronic apparatus includes a storage to store the OS, a virtual device program capable of generating a virtual device executed based on the OS, and at least one program; and at least one processor to execute the virtual device program to generate the virtual device, and to execute the OS to determine whether a first program having an administration authority assigned by the OS from among the at least one program has access authority to data about the virtual device in response to an attempt to access the data from the first program and to selectively permit the access to the data based on the determined access authority. With this, the electronic apparatus may restrain the access to the virtual device or the data thereabout according to a presence of the access authority, thereby safely protecting the virtual device or the data.

Media processing method and device

A media processing system and device with improved power usage characteristics, improved audio functionality and improved media security is provided. Embodiments of the media processing system include an audio processing subsystem that operates independently of the host processor for long periods of time, allowing the host processor to enter a low power state while the audio data is being processed. Other aspects of the media processing system provide for enhanced audio effects such as mixing stored audio samples into real-time telephone audio. Still other aspects of the media processing system provide for improved media security due to the isolation of decrypted audio data from the host processor.

Digital asset association with search query data
10846328 · 2020-11-24 · ·

Digital asset association techniques with search query data are described. In one example, A first digital asset is displayed at a location within digital content in a user interface. The location is specified using placeholder data of the digital content. An input is received via selection of an option as part of the user interface to initiate a search. Search query data associated with the placeholder data is obtained in response to the input. A search is initiated for a second digital asset using the search query data. The second digital asset is displayed at the location within the digital content in the user interface as specified by the placeholder data.

CONTROLLED ENVIRONMENT SECURE MEDIA STREAMING SYSTEM
20200344232 · 2020-10-29 · ·

A Controlled Environment Secure Media Streaming System manages the delivery of content to Secured Devices. Cloud Services provide content to Integration Hub. The Integration Hub interfaces with various cloud services providers and prepares content for consumption by a resident of a secured facility. Integration Hub utilizes Content Filter to inspect content received from cloud service providers for suitability for use in a secured environment. Once content is retrieved, filtered, formatted, and packaged by Integration Hub, the content is stored in Data Warehouse. Secured Devices request content from the Distribution Hub, the Distribution Hub retrieves the content from the Data Warehouse, and then Distribution Hub manages the transfer of content to the Secured Devices. In some embodiments, Distribution Hub utilizes Content Filter to determine whether or not a particular Secured Device can access particular content.

LOCKING EXECUTION OF CORES TO LICENSED PROGRAMMABLE DEVICES IN A DATA CENTER

An example hardware accelerator for a computer system includes a programmable device and further includes kernel logic configured in a programmable fabric of the programmable device, and an intellectual property (IP) checker circuit in the kernel logic. The IP checker circuit is configured to obtain a device identifier (ID) of the programmable device and a signed whitelist, the signed whitelist including a list of device IDs and a signature, verify the signature of the signed whitelist, compare the device ID against the list of device IDs, and selectively assert or deassert an enable of the kernel logic in response to presence or absence, respectively, of the device ID in the list of device IDs and verification of the signature.

LOCKING EXECUTION OF CORES TO LICENSED PROGRAMMABLE DEVICES IN A DATA CENTER

An example hardware accelerator for a computer system includes a programmable device and further includes kernel logic configured in a first programmable fabric of the programmable device, a shell circuit configured in a second programmable fabric of the programmable device, the shell circuit configured to provide an interface between a computer system and the kernel logic, and an intellectual property (IP) checker circuit in the kernel logic The IP checker circuit is configured to obtain a device identifier (ID) from the first programmable fabric and a signed whitelist, the signed whitelist including a list of device IDs and a signature, verify the signature of the signed whitelist, compare the device ID against the list of device IDs, and selectively assert or deassert an enable of the kernel logic in response to presence or absence, respectively, of the device ID in the list of device IDs and verification of the signature.