Patent classifications
G06F21/32
Data protection systems
Corporate information technology (IT) networks can protect sensitive data sent to computers located outside of the corporate IT network. For example, a computer located outside of the corporate IT network may receive a message that instructs the computer to operate in a data protection mode in which the computer reduces a frame rate of a monitor of the computer from a first frame rate to a lower second frame rate. In this example, the computer receives sensitive information that includes sensitive visual content to be displayed on the monitor and displays the sensitive visual content on the monitor configured to operate at the second frame rate.
User interface for managing access to credentials for use in an operation
The present disclosure generally relates to managing access to credentials. In some examples, an electronic device authorizes release of credentials for use in an operation for which authorization is required. In some examples, an electronic device causes display of one or more steps to be taken to enable an input device for user input. In some examples, an electronic device disambiguates between commands to change the account that is actively logged-in on the device and commands to cause credentials to be released from the secure element.
User interface for managing access to credentials for use in an operation
The present disclosure generally relates to managing access to credentials. In some examples, an electronic device authorizes release of credentials for use in an operation for which authorization is required. In some examples, an electronic device causes display of one or more steps to be taken to enable an input device for user input. In some examples, an electronic device disambiguates between commands to change the account that is actively logged-in on the device and commands to cause credentials to be released from the secure element.
Method and device with data recognition
A processor-implemented method with data recognition includes: extracting input feature data from input data; calculating a matching score between the extracted input feature data and enrolled feature data of an enrolled user, based on the extracted input feature data, common component data of a plurality of enrolled feature data corresponding to the enrolled user, and distribution component data of the plurality of enrolled feature data corresponding to the enrolled user; and recognizing the input data based on the matching score.
Onboarding platform for performing dynamic mitigation analysis
Aspects of the disclosure relate to computing platforms that utilize improved mitigation analysis and policy management techniques to improve onboarding security. A computing platform may determine that a predetermined period of time has elapsed since finalizing an onboarding process. The computing platform may receive spot check verification inputs indicative of a user identity and may direct a mitigation analysis and output generation platform to analyze the spot check verification inputs. The computing platform may receive an indication of a correlation between the spot check verification inputs and expected spot check verification inputs. In response to determining that the correlation exceeds a predetermined threshold, the computing platform may determine that an additional verification test should be conducted, and may direct the mobile device to display an interface that prompts for additional onboarding verification inputs.
Onboarding platform for performing dynamic mitigation analysis
Aspects of the disclosure relate to computing platforms that utilize improved mitigation analysis and policy management techniques to improve onboarding security. A computing platform may determine that a predetermined period of time has elapsed since finalizing an onboarding process. The computing platform may receive spot check verification inputs indicative of a user identity and may direct a mitigation analysis and output generation platform to analyze the spot check verification inputs. The computing platform may receive an indication of a correlation between the spot check verification inputs and expected spot check verification inputs. In response to determining that the correlation exceeds a predetermined threshold, the computing platform may determine that an additional verification test should be conducted, and may direct the mobile device to display an interface that prompts for additional onboarding verification inputs.
Methods and apparatus to monitor haptic vibrations of touchscreens
Methods and apparatus to identify haptic vibrations of touchscreens are disclosed. Example apparatus disclosed herein obtain a haptic control signal that is to cause vibrations of a touchscreen to simulate a texture corresponding to visual subject matter to be displayed on the touchscreen, the vibrations of the touchscreen to produce an acoustically detectable signal. Disclosed example apparatus also encode a watermark into the haptic control signal to generate a watermarked haptic control signal, the watermark including identification information to identify at least one of the subject matter or the texture, the watermark to modify the acoustically detectable signal.
Method, system, and computer program product for identifying a malicious user
A method, system, and computer program product for identifying a malicious user obtain a plurality of service requests for a service provided by a processing system, each service request of the plurality of service requests being associated with a requesting user and a requesting system, and a plurality of service responses associated with the plurality of service requests, each service response of the plurality of service responses being associated with the processing system; and identify the requesting user as malicious based on the plurality of service requests and the plurality of service responses.
Method, system, and computer program product for identifying a malicious user
A method, system, and computer program product for identifying a malicious user obtain a plurality of service requests for a service provided by a processing system, each service request of the plurality of service requests being associated with a requesting user and a requesting system, and a plurality of service responses associated with the plurality of service requests, each service response of the plurality of service responses being associated with the processing system; and identify the requesting user as malicious based on the plurality of service requests and the plurality of service responses.
Creating a secure digital identity
Methods and systems for creating a verifiable digital identity are provided. The method includes obtaining a first user-generated item comprising an identifiable feature. The method also includes digitally signing the first user-generated item to generate a secure digital artifact. The method also includes uploading the secure digital artifact and the first user-generated item to an auditable chain of a public ledger. The method also includes verifying a digital identity of the user by auditing the auditable chain. The method also includes obtaining a second user-generated item generated comprising the identifiable feature. The method also includes comparing the first and second user-generated items. The method also includes uploading the second user-generated item to the public ledger when the comparing is within a threshold.