G06F21/83

Root level controls to enable privacy mode for device cameras

An approach is provided that detects when a digital camera has been set to a privacy mode that limits access to the digital camera. When in privacy mode, the digital camera receives a request to access the digital camera from an application. The approach determines whether the requesting application is allowed access to the digital camera while the digital camera is in the privacy mode. The requesting application is then allowed access to the digital camera in response to the determination being that the requesting application is allowed access to the digital camera. Likewise, the requesting application is inhibited access to the digital camera in response to the determination being that the requesting application is not allowed access to the digital camera.

Password input system
11514148 · 2022-11-29 ·

A password input system equipped with a security setting function is disclosed. The system includes one input unit configured to receive an input from user; an output unit configured to output a current state and result; a dedicated communication port configured to transmit and receive data to and from a password adaptor; a memory configured to save a program for security setting function; and a processor configured to execute the program saved in memory. When the processor waits for an input of a password from user and simultaneously password adaptor is coupled to dedicated communication port, the processor receives a password through communication with password adaptor and compares received password with a pre-saved password, and when the received password matches the pre-saved password, the processor unlocks a secure state without further inputting a password.

Secure authorization via a dynamic interface on a visitor device

A keyless access system for securely authorizing access to a resource via a dynamic interface that user equipment (“UE”) may access using a changing access identifier without the UE installing or executing any specialized applications or code. The secure authorization of visitor access may include periodically modifying the access identifier, providing access activation data with a first access identifier to a UE in response to a triggering action, providing the dynamic interface to the UE in response to the access activation data automatically directing a browser of the UE to the first access identifier, receiving UE authorization data that is entered using a keypad or login screen of the dynamic interface, and providing access to the resource based on the first access identifier being associated with the resource, the UE authorization data authorizing access to the resource, and the access being provided before an expiration time.

System, device and method for enforcing privacy during a communication session with a voice assistant

A system, device and method for enforcing privacy during a communication session with a voice assistant are disclosed. In response to a determination that an environment of a first voice assistant device is not private, a first secure communication session between the first voice assistant device and an application server is suspended. In response a determination that one or more other voice assistant devices have been authorized for communication with the application server is made and input to transfer the first secure communication session, a second secure communication session between a second voice assistant device and the application server is initiated. The first secure communication session between the first voice assistant device and the application server is terminated in response to successful initiation of the second secure communication session.

SYSTEMS AND METHODS FOR AUTOMATING PRE-BOOT SOFT KEYBOARD BEHAVIOR BASED ON SYSTEM CONTEXT

An information handling system may include a processor, a display device communicatively coupled to the processor, and a basic input/output system (BIOS) communicatively coupled to the processor and configured to cause the processor to, during a pre-boot environment of the information handling system, collect contextual information regarding the information handling system, based on the contextual information, determine whether to enable soft keyboard functionality, and responsive to a determination to enable soft keyboard functionality, cause display of soft keyboard functionality to the display device.

Data input method and apparatus and user equipment

A data input method and apparatus, and user equipment are provided. The method includes: when it is determined that an operation of a user on the user equipment UE is not performed in a preset display area, deliver an event corresponding to the operation to a first operating environment for processing, where the preset display area runs in a second operating environment of the UE, and the second operating environment has a higher security level than the first operating environment. This can better improve security of an event generated when the user operates a program that runs in a Normal World of the user equipment, and can directly operate an event that runs in the Normal World.

Data input method and apparatus and user equipment

A data input method and apparatus, and user equipment are provided. The method includes: when it is determined that an operation of a user on the user equipment UE is not performed in a preset display area, deliver an event corresponding to the operation to a first operating environment for processing, where the preset display area runs in a second operating environment of the UE, and the second operating environment has a higher security level than the first operating environment. This can better improve security of an event generated when the user operates a program that runs in a Normal World of the user equipment, and can directly operate an event that runs in the Normal World.

SYSTEM AND METHOD FOR PROVIDING SECURITY TO A GAME CONTROLLER DEVICE FOR ELECTRONIC TRADING
20220351293 · 2022-11-03 ·

A system for managing electronic trading, comprises an interface application including a mapping module that defines a plurality of controller signal relationships. Each controller signal relationship associates one or more of a plurality of game controller signals with one of a plurality of trading system commands associated with the electronic trading of financial instruments. The interface application receives a plurality of game controller signals generated by a game controller, and determines, based on the controller signal relationships, that one or more of the plurality of received game controller signals are erroneous. The interface application causes the communication of a command to lock the game controller based on the determination of the one or more erroneous game controller signals.

Posture detection for intelligent lighting accessory control

A method for intelligently controlling a lighting accessory coupled to a host device includes determining a posture of the lighting accessory, the posture being one of multiple user-selectable physical configurations; and selectively configuring a setting of an application executing on the host device based at least in part on the determined posture.

METHODS AND APPARATUS FOR STARTUP PROCESSES FOR A POWER MACHINE
20220350892 · 2022-11-03 ·

A power machine (200) can be configured to operate in one or more startup modes during startup processes (300), including during startup processes (310) for displays (286) or other input devices. Access to power machine functionality, including access only to limited power machine functionality, can be enabled during the startup processes (300) according to permissions (332) of the startup mode.