H04W12/77

Methods and systems for blocking malware attacks
11563740 · 2023-01-24 ·

User identities, password, etc. represent the barrier between a user's confidential data and any other third party seeking to access this data. As multiple software applications, web applications, web services, etc. embody this confidential data it is a tradeoff between easy recollection of said identities, passwords, etc. and data security. However, malware by intercepting user credentials provides third parties access to even complex passwords, user credentials, security keys etc. even where these are changed/updated regularly. Within the prior art substantial work has gone into addressing malware. However, in many instances the user is at or very near the computer with a software application executing a transaction requiring credentials/authorisation with a portable electronic device or another device. Accordingly, it would be beneficial to provide users with an out-of-band communications channel for exchanging credentials and/or keys etc.

Methods and systems for blocking malware attacks
11563740 · 2023-01-24 ·

User identities, password, etc. represent the barrier between a user's confidential data and any other third party seeking to access this data. As multiple software applications, web applications, web services, etc. embody this confidential data it is a tradeoff between easy recollection of said identities, passwords, etc. and data security. However, malware by intercepting user credentials provides third parties access to even complex passwords, user credentials, security keys etc. even where these are changed/updated regularly. Within the prior art substantial work has gone into addressing malware. However, in many instances the user is at or very near the computer with a software application executing a transaction requiring credentials/authorisation with a portable electronic device or another device. Accordingly, it would be beneficial to provide users with an out-of-band communications channel for exchanging credentials and/or keys etc.

TRANSMITTING A COMPLEMENT OF USER PARAMETERS TO A COMMUNICATIONS DEVICE

Briefly, example methods, apparatuses, and/or articles of manufacture may be implemented, in whole or in part, using one or more computing devices to obtain, from a communications device, an identifier of the communications device transmitted via a communications network. The communications network may transmit a request for one or more parameters unique to a subscriber of the communications network. The method may also include processing signals indicative of the requested one or more parameters in response to the subscriber entering the one or more parameters into a graphical user interface of the communications device. The method may further include transmitting, to the communications device, one or more signals to provide a complement of subscriber parameters.

Device registration to management domain

The technology disclosed herein pertains to a method for mobile storage device registration to a management domain using a random token and a pin. In at least one implementation, a technology disclosed herein provides a method of authenticating a device on a system, the method including generating a random token, displaying the random token to a user, communicating the random token to an authentication system portal, in response the authentication system portal validating the random token receiving a PIN from the user, and communicating the PIN to the authentication system portal, and receiving a portal IP address and a certificate of authentication from the authentication system portal.

TRUE SECURE AIRGAP
20230012696 · 2023-01-19 ·

Techniques for securely monitoring an air-gapped machine. Systems, methods, and devices for generating a status message representing a state of an air-gapped machine, converting the status message to a visual code, displaying the visual code to a display monitor connected to the air-gapped machine, capturing image data of the visual code at a camera connected to a monitoring machine, and transmitting the image data to the monitoring machine, thereby causing the visual code to be accessible by a user of the monitoring machine. Techniques for verifying the integrity of the status message, and optionally, encrypting the status message.

SYSTEMS AND METHODS FOR REDUCING GRAIN THEFT IN HARVESTING OPERATIONS
20230018114 · 2023-01-19 ·

Systems and methods for theft reduction of grain are disclosed. A grain cart includes a theft detection system that monitors grain onboarded into the grain cart from a harvesting machine, and grain offloaded from the grain cart to a trailer. The theft detection system measures a weight value of the grain received from the harvesting machine, and transmits the weight value to a tracking system. Additionally, the theft detection system can receive an expected grain weight value from the harvesting machine and compare the measured weight value with the received weight value, and provide a notification (e.g., alarm) of the difference is greater than a predetermined threshold. The theft detection system can provide similar functions between weight values of grain in the grain cart and a trailer. Also, the theft detection system can encrypt transmit the weight values prior to transmitting to the tracking system.

PROVIDING NETWORK ACCESS VIA COMMUNAL DEVICE
20230224355 · 2023-07-13 · ·

Methods, systems, and devices are provided that allow for access to a wireless computer network, such as a home or business network, via a communal device. The communal device retrieves network access information such as a PSK and provides a machine-readable code such as a QR code or bar code that automatically provides the access information to a user's device, thereby allowing access to the network with little or no user input required.

Password protection with independent virtual keyboard
11558375 · 2023-01-17 · ·

A virtual keyboard rendered on a separate computing device is independent of the user's computer. A virtual keyboard displayed on the user's computer screen is blank without any alphanumeric characters. Another virtual keyboard displayed on the user's independent computing device has a randomly generated layout of alphanumeric characters on a keypad. The user enters a password by pressing the blank keys of the blank keyboard on his computer screen with reference to the other virtual keyboard. The position sequence of these entered keys is sent to an application on a remote server computer. The remote server computer shares a virtual keyboard having the randomly generated layout of characters with the independent computing device via an online or off-line technique. When online, an encoded image of the encrypted layout is sent to the client computer and displayed for scanning by the device. When off-line, both the application and the device generate the same random key sequence by using the same pseudo random number generator and the same seed value.

Providing enhanced functionality in an interactive electronic technical manual

Embodiments of the present disclosure provide methods, apparatus, systems, computer program products for transferring a performance of a procedure found in technical documentation for an item via an interactive electronic technical manual system (IETM) configured to provide electronic and credentialed access to the technical documentation. In one embodiment, a method is provided comprising: providing the steps of the procedure in an order in which the steps are to be carried out; and while a user is participating in the performance of the procedure: causing a particular step that is being carried out to be highlighted; receiving input of a selection of a transfer mechanism and in response: causing an indication to be displayed between the particular step and a next step to be carried out identifying where the performance has been suspended; providing a transfer window displaying transfer information; and recording the transfer information and an identifier for the indication.

SYSTEM AND METHODS OF CAPTURING MEDICAL IMAGING DATA USING A MOBILE DEVICE
20230215529 · 2023-07-06 ·

Methods for capturing medical images associated with a patient using a mobile image-capturing device are disclosed. One example method includes accessing patient identifying information. A user may launch a scan application installed in the mobile image-capturing device by visually scanning a machine-readable optical label, which may also authenticate the user. Upon accessing the scan application, the scan application may be provided with the patient identifying information scanned from the machine-readable optical label, and one or more details of the patient based on the patient identifying information scanned from the machine-readable optical label may be displayed at an interface of the scan application. The scan application may capture medical images using an imaging equipment of the mobile image-capturing device, associate the captured images with the patient identifying information, and transmit the captured images with the patient identifying information to a storage location.