G06F21/629

SECURITY-BY-DESIGN METHODOLOGY USING EVIDENCE-BASED SECURITY APPROACH

Disclosed is a security-by-design method according to some exemplary embodiments of the present disclosure. The security-by-design method may include: mapping the security-by-design methodology and an evidence-based security methodology; and storing a mapping result in a database.

Ephemeral Artificial Reality Experiences

In one embodiment, a method includes instructing sensors on an AR headset to capture data of a real-world environment, discovering a 3D location where a native application configured to run natively on an operating system is downloadable, generating and displaying a virtual object representing the native application at the 3D location, detecting a user of the AR system interacting with the virtual object, downloading a first executable portion of the native application, executing the first executable portion within a sandbox process having a predetermined set of access permissions, progressively downloading a remaining executable portion of the native application while the user is interacting with the executed first executable portion, and in response to a determination that the native application is completely downloaded, installing the native application on the operating system.

Systems and methods for role-based computer security configurations

An apparatus includes a processor operatively coupled to a memory. The processor detects a software application installed on a client computing device, and/or usage data. Detected usage data is associated with a current user of the client computing device and with the software application. The processor identifies a user role for the current user based on the software application and/or usage data. The processor applies a security configuration to the client computing device based on the user role. The security configuration limits access by the current user to a portion of the software application. The processor sends an identifier of the user role to an administrative server for storage in an Active Directory (AD) database.

Methods and systems for providing relevant season series recording functionality

Systems and methods are provided herein for scheduling a season recording. A series is provided to a user device, the series having a plurality of sequential seasons, and each season having a plurality of episodes. A request for recording the series is received from the user. In response, a last episode of the series watched by the user is identified. A relevant season of the plurality of seasons is then determined, such that the relevant season precedes another season of the plurality of seasons and includes the last episode watched by the user. Then, episodes of the relevant season that follow the last episode watched by the user are scheduled for recording, such that episodes of a season that precedes the relevant season are not scheduled for recording.

Information transmission method, apparatus, device and medium for medical imaging application

Disclosed are information transmission method, apparatus, device and medium for medical imaging application. The method includes: an imaging device corresponding to an application authorization request is determined according to the received application authorization request, and an application permission profile of the imaging device is acquired; and a medical imaging application corresponding to the imaging device is determined according to the application permission profile of the imaging device, and medical imaging application information corresponding to the medical imaging application is transmitted to the imaging device.

Implementing an achievement platform using a database system

An achievement platform may be maintained using a database system. A user interface may be displayed on a device of an authorized user of the achievement platform. The user interface may be configurable to allow the authorized user to create or modify customizable awards that are achievable based on customizable logic definable by the authorized user. The authorized user may be affiliated with a first one of a plurality of organizations implementing an application or service. Input, to create a first award based on first customizable logic may be processed. The first customizable logic may be configured by the authorized user such that satisfaction of conditions causes designated users associated with the application or service to be presented with the first award. It may be determined that a first user affiliated with the first organization has satisfied the conditions. The first user may be presented with the first award.

Method and system for a semi-dictatorial determination of stackable system roles in an information handling system

A method for managing information handling system includes obtaining, by a zone-leading information handling system of the set of information handling systems, a first hardware resource information entry from a first information handling system in a first zone, obtaining a second hardware resource information entry from a second information handling system in the first zone, performing a stackable system role (SSR) entry analysis based on the first hardware resource information entry and the second hardware resource information entry, determining a set of SSRs, wherein each SSR in the set of SSRs corresponds to each of: the first information handling system, the second information handling system, and the zone-leading information handling system, initiating a SSR distribution of SSR entries based on the set of SSRs.

METHODS AND DEVICE FOR TASK MOBILIZATION
20230214242 · 2023-07-06 ·

A method for task mobilization may include a server receiving user inputs from a desktop application. A user input may correspond to a respective function performed by a user on the desktop application. A processor may identify the respective functions of the user inputs. Further, the method may include translating the respective functions into respective mobile view functions. Based on the respective mobile view functions, the processor may generate a mobile application and provide the mobile application to a mobile user device.

PERMISSION NEGOTIATION METHOD AND APPARATUS DURING COMMUNICATION, AND ELECTRONIC DEVICE
20230214532 · 2023-07-06 ·

Embodiments of this application provide example permission negotiation methods and apparatuses during communication, and electronic devices. An example first electronic device displays an interface of a currently running communication application, and obtains, in response to the first operation, a permission item restricted for use in a process of communication with a second electronic device. Then, the first electronic device sends a first request to the second electronic device that includes the permission item restricted for use. The first electronic device receives confirmation information of the second electronic device for the permission item restricted for use, and restricts, based on the confirmation information, a locally installed application on applying for the permission item restricted for use. After communication with the second electronic device ends, the first electronic device restores settings of the permission item of the locally installed application to settings preceding the communication with the second electronic device.

Screen locking method and apparatus
11550461 · 2023-01-10 · ·

A screen locking method and apparatus include establishing, by a first electronic device, a coupling to a second electronic device, sending, by the first electronic device, to-be-displayed data to the second electronic device to enable the second electronic device to display a first interface, and in this case, the first electronic device displays a second interface different from the first interface, obtaining, by the first electronic device, a first screen locking operation from a user, where the first screen locking operation instructs to lock a screen of the second electronic device, and sending, by the first electronic device, a screen locking instruction to the second electronic device in response to the first screen locking operation whereby the second electronic device enters a screen-locked state.