Patent classifications
H04L2463/121
BIOMETRIC SENSOR ON PORTABLE DEVICE
A method and system for secure remote digital interactions through the use of biometric templates is disclosed. In one example, the method includes an interaction that prompts the use of obtaining a first biometric template and comparing it to a second biometric template to determine if they match. The match process is performed on a portable device.
Identifying attack behavior based on scripting language activity
Techniques for identifying attack behavior based on scripting language activity are disclosed. A security monitoring system generates a behavior profile for a first client device based on scripting language commands included in a first set of raw machine data received from the first client device, where the first client device is coupled to a network, and the first set of raw machine data is associated with network traffic received by or transmitted from the first client device. The security monitoring system analyzes a second set of raw machine data received from the first client device, where the second set of raw machine data is associated with subsequent network traffic received by or transmitted from the first client device. The security monitoring system detects an anomaly in the second set of raw machine data based on the behavior profile, and initiates a mitigation action in response to detecting the anomaly.
Network interface with timestamping and data protection
In a general aspect, a network transmission interface can include, within an egress data path, a physical coding sublayer (PCS) operating in a constant bitrate domain for transmitting data frames on a network link; a timestamp unit configured to insert timestamps in payloads of the frames; a transmission media access control (MAC) unit located at a boundary between the constant bitrate domain and a variable bitrate domain, configured to receive the frames at a variable bitrate, encapsulate the frames, and provide the encapsulated frames at a constant bitrate; a MAC layer security unit located downstream from the timestamp unit, configured to sign and optionally encrypt the payloads and expand each frame with a security tag and an integrity check value (ICV). The timestamp unit and the MAC layer security unit (26b) can both operate in the constant bitrate domain.
Method and apparatus for secure computing device start up
The present invention provides methods and devices for secure computing device start up. The method includes generating a public/private key pair and signing a software image and obtaining a first time stamp and a second time stamp. The method further includes combining the signed software image, the first time stamp and the second time stamp into a bundle and deploying the bundle. During secure start up, the method includes authenticating the signed software image, the first time stamp and the second time stamp and booting the computing device if authentication passes. The computing device aborts booting the computing device if the authentication process fails.
Using a measure of influence of sender in determining a security risk associated with an electronic message
A measure of influence of a sender entity is determined for a message receiving entity based at least in part on an analysis of previous electronic messages sent by the sender entity. An electronic message associated with the sender entity is received. The measure of influence of the sender entity is utilized to determine a security risk associated with the received electronic message.
ABNORMALITY DETECTION
A method of detecting abnormality may include the following steps. A normal-value range of a parameter for a target object is determined based on historical values of the parameter in a preset time period or at a preset time point. Whether the target object is abnormal is determined based on the normal-value range and the value of the parameter for the target object in the preset time period or at the preset time point within a current time cycle. Further, another normal-value range may be determined based on historical deviation values for the target object in historical time periods or at historical time points before the preset time period or the preset time point. Whether the target object is abnormal is determined based on either of the two normal-value ranges.
DATABASE PLATFORM FOR REALTIME UPDATING OF USER DATA FROM THIRD PARTY SOURCES
A data processing system communicates with a secure third-party database to obtain information about a user that is usable to determine one or more items associated with the user. The system then coordinates gathering and identification of additional data relevant to the user from other third-party data sources, to potentially update the user's information stored with the secure third-party database. The updated information may then be accessed at the secure third-party database to determine items associated with the user, which may include additional items in view of the additional data
Enhanced user authentication based on device usage characteristics for interactions using blockchains
A first set of device usage characteristics of a first user interaction with a user communication device are received. For example, a device usage characteristic may be an average key pressure, a used WiFi access point, an install date of an application, an angle of a user communication device, etc. The first set of device usage characteristics of the first user interaction are compared to a second set of device usage characteristics of a second user interaction with the user communication device that is stored in a blockchain. One or more reason codes that identifies why the first and second compared sets of device usage characteristics do not match is generated in response to the first and second compared sets of device usage characteristics not matching. The one or more reason codes are used for identifying a level of trust of a user in a communication session.
AUTONOMOUS VEHICLE SENSOR SECURITY SYSTEM
Example methods and systems are disclosed to provide autonomous vehicle sensor security. An example method may include generating, by a first autonomous vehicle, a first map instance of a physical environment using first environmental information generated by a first sensor of a first autonomous vehicle. A second map instance from at least one of a second autonomous vehicle located in the physical environment is received. The first map instance may be correlated with the second map instance. In response to a discrepancy between the first map instance and the second map instance, a secure sensor may be activated to generate a third map instance. In response to the third map instance verifying that the discrepancy accurately describes the physical environment, the first environmental information including the discrepancy is used to navigate the first autonomous vehicle.
Information processing apparatus and non-transitory computer readable medium
An information processing apparatus includes a first cryptographic communication control unit, a second cryptographic communication control unit, and a timeout control unit. The first cryptographic communication control unit issues an encrypted connection request to a communication destination node and performs cryptographic communication. The second cryptographic communication control unit issues, concurrently with the connection request by the first cryptographic communication control unit, a connection request by plain text to the communication destination node, establishes connection, and then performs cryptographic communication. The timeout control unit changes a period for a timeout set in advance for the connection request by the first cryptographic communication control unit in a case where a response to the connection request by the second cryptographic communication control unit is received from the communication destination node before a response to the connection request by the first cryptographic communication control unit is received from the communication destination node.