G06F21/1013

SYSTEMS AND METHODS FOR GENERATING AND FACILITATING ACCESS TO A PERSONALIZED AUGMENTED RENDERING OF A USER
20230093062 · 2023-03-23 ·

Systems and methods for generating and facilitating access to a personalized augmented rendering of a user to be presented in an augmented reality environment are discussed herein. The augmented rendering of a user may be personalized by the user to comprise a desired representation of the user in an augmented reality environment. When a second user is detected within the field of view of a first user, the second user may be identified and virtual content (e.g., an augmented rendering) for the second user may be obtained. The virtual content obtained may differ based on one or more subscriptions fo the first user and/or permissions associated with the virtual content of the second user. The virtual content obtained may be rendered and appear superimposed over or in conjunction with a view of the second in the augmented reality environment.

SECURE PASSWORD ENTRY METHOD AND SYSTEM
20220327192 · 2022-10-13 ·

A method and system for safely entering a password, the method comprising: a smart key device receives a password verification request sent from an upper computer, generates and displays randomly arranged characters, and returns a password verification response to the upper computer; upon the reception of the password verification response, the upper computer displays a password input interface and waits for a user to input, upon the reception of a user input, obtains a password acquisition response according to the user input, and sends the password acquisition response to the smart key device; and the smart key device determines whether the user input is correct according to the received password acquisition response. By means of the present invention, a password input solution in which a user needs to click a different position every time a password character is entered is achieved. In addition, the numbers are not displayed on the screen of the upper computer, the security of the user's digital assets is further ensured.

Technologies for supporting multiple digital rights management protocols on a client device

Technologies for supporting and implementing multiple digital rights management protocols on a client device are described. In some embodiments, the technologies include a client device having an architectural enclave which may function to identify one of a plurality of digital rights management protocols for protecting digital information to be received from a content provider or a sensor. The architectural enclave select a preexisting secure information processing environment (SIPE) to process said digital information, if a preexisting SIPE supporting the DRM protocol is present on the client. If a preexisting SIPE supporting the DRM protocol is not present on the client, the architectural enclave may general a new SIPE that supports the DRM protocol on the client. Transmission of the digital information may then be directed to the selected preexisting SIPE or the new SIPE, as appropriate.

APPLICATION EXECUTION ON A VIRTUAL SERVER BASED ON A KEY ASSIGNED TO A VIRTUAL NETWORK INTERFACE

In some implementations, a cloud computing system may deploy a virtual server to execute an application associated with an application licensor system. The cloud computing system may identify a virtual network interface that corresponds to the virtual server. The cloud computing system may associate a key received from the application licensor system to the virtual network interface to allow the application to be executed based on the virtual network interface. The cloud computing system may associate the virtual server and the virtual network interface. The cloud computing system may execute the application on the virtual server based on the key that is associated with the virtual network interface and based on associating the virtual server and the virtual network interface.

DYNAMIC RETRIEVAL OF REGION CODE FOR NETWORK DEVICES ON DATA COMMUNICATION NETWORKS

In network devices, during manufacturing, input for designation of a region code to be a non-specific region code is stored in a BIOS memory of the network device, and a specific region code is stored off the BIOS. During boot up, the BIOS is checked for a specific region code to regulate wireless transmissions at a physical location of operation. Responsive to receiving the non-specific region code from BIOS, the specific region code is requested from a region code server based on a network device identifier. Once received, the region code is stored in flash memory, until rebooted or otherwise reset, rather than BIOS.

SYSTEM AND METHOD FOR MANAGING ACCESS TO SOFTWARE APPLICATIONS ON A MOBILE COMMUNICATION DEVICE VIA A PHONE LOCATION UNIT
20230276243 · 2023-08-31 · ·

A method and system for managing access to software applications installed on a mobile communication device, via a phone location unit. The method may include: determining a position of the at least one mobile communication device, using the phone location unit which is further configured to communicate with the at least one mobile communication device, over a wireless communication channel; blocking access to the software applications installed, by an access management software application, whenever the mobile communication device is detected within a specific area; launching, via the access management software application, at least one whitelisted software application, responsive to a selection by a human user; and repeatedly instructing the mobile communication device, by the phone location unit and over the wireless communication channel, to re-launch the at least one whitelisted software application, as long as the at least one mobile communication device is detected within the specific area.

Incorporating risk-based decision in standard authentication and authorization systems
11727104 · 2023-08-15 · ·

Embodiments of the disclosure provide a method for enhancing standard authentication systems to include risk-based decisions. Risk-based decisions can be selectively implemented within existing authentication systems to strategically modify and supplement security if an unacceptable risk is detected. Embodiments capture information pertaining to a user and user device. Information is stored to create a profile for the user and user device. A comparison between the stored information and live data can be performed within authentication systems to optimize security. If the results of the comparison demonstrate the presence of an acceptable risk, then the need for subsequent authentication can be reduced or eliminated, which improves a user experience.

SYSTEMS AND METHODS FOR CONTENT RIGHTS PORTABILITY
20210349971 · 2021-11-11 ·

The system and methods described allow a content delivery application to provide temporary access to a content item for display on a content access device based on a user obtaining access to the content item initially on another system. The content delivery application receives content accessed confirmation that user access a content item and then monitors whether that access was interrupted. If the access was interrupted, the content delivery application generates a content access bookmark based on a content timeline and stores a content access authorization comprising the content access bookmark and an identifier from the profile. When the user requests the content item, the content delivery application transmits access information corresponding to segments of the content item, based on the content access bookmark to a user's device.

EVENT-DRIVEN GENERATION OF DIGITAL OBJECTS
20230289408 · 2023-09-14 · ·

A digital object generation platform processes a request to generate a digital object associated with an event according to criteria associated with the event for generating the digital object. If the criteria are satisfied, the platform generates the digital object based on digital media associated with the event. A user decipherable representation of the digital object is encoded to a smart contract.

INCORPORATING RISK-BASED DECISION IN STANDARD AUTHENTICATION AND AUTHORIZATION SYSTEMS
20230367862 · 2023-11-16 ·

Embodiments of the disclosure provide a method for enhancing standard authentication systems to include risk-based decisions. Risk-based decisions can be selectively implemented within existing authentication systems to strategically modify and supplement security if an unacceptable risk is detected. Embodiments capture information pertaining to a user and user device. Information is stored to create a profile for the user and user device. A comparison between the stored information and live data can be performed within authentication systems to optimize security. If the results of the comparison demonstrate the presence of an acceptable risk, then the need for subsequent authentication can be reduced or eliminated, which improves a user experience.