G06F21/305

Password-based authorization for audio rendering

A method and device for processing one or more audio streams based on password-based privacy restrictions is described. A device may be configured to receive unrestricted audio streams of the one or more audio streams based on privacy restrictions associated with a password, wherein the one or more audio streams are from audio elements represented in an acoustic environment that comprises one or more sub-acoustic spaces, each of the one or more audio streams representative of a respective soundfield, and generate the respective soundfields of the unrestricted audio streams.

SYSTEMS AND METHODS FOR USE OF PERIPHERAL HARDWARE BY MODERN WORKSPACES

Methods and system support use of peripheral devices by workspaces operating on an Information Handling System (IHS), where the workspaces operate in isolation from the hardware and other software of the IHS. Workspaces are thus unable to interface with hardware coupled to the IHS, including peripheral devices coupled to the IHS. In embodiments, workspace issue request for use of a remote operation supported by a peripheral device. A handle is then provided for invoking the remote operation supported by the peripheral device and for providing the workspace with exclusive use of the peripheral device for the duration of a validity of the handle. One the handle is used to invoke the remote operation supported by the peripheral device, the workspace is provided with output from the remote operation conducted during exclusive use of the peripheral device by the workspace.

Systems and Methods for Automating Processes for Remote Work

A method may include a method of automating processes for remote work. The method may include receiving, at a server, first login data from a client software application. The client software application may be executing on a user device of a remote worker user. The method may include authenticating the remote worker user based on the first login data. The method may include receiving, at the server, command data from the client software application. The command data may include data indicating to the server to launch a software application. The method may include launching, on the server, the software application. The method may include inputting, using a robotic process automation (RPA) process, second login data of the remote worker user into the software application. The method may include key site information, speech-to-text functionality, onboarding functionality, automated support, or activity logging.

Method and apparatus for enhancing driver situational awareness

Aspects of the subject disclosure may include, for example, determining, by a system comprising a processor, a driver profile according to a driver identity for a driver of a vehicle, selecting a driver-specific enforcement scenario for the vehicle according to the driver profile and traffic enforcement information that is associated with a vehicle location, and presenting an in-vehicle alert to convey the driver-specific enforcement scenario to the driver. Other embodiments are disclosed.

PROCESSING APPARATUS, METHOD FOR CONTROLLING PROCESSING APPARATUS, AND NON-TRANSITORY COMPUTER-READABLE STORAGE MEDIUM
20180004922 · 2018-01-04 ·

Provided is a processing apparatus that authenticates a requestor in response to a request for performing predetermined processing. The processing apparatus executes the predetermined processing upon the authentication succeeding. Whether or not authentication is performed is set individually for each of the processing apparatus and an external apparatus of the processing apparatus that serve as the requestor. The authentication is performed in the case where authentication is set to be performed on the requestor that made the request.

AIR CONDITIONER CONNECTION SYSTEM
20180004920 · 2018-01-04 ·

An air conditioner connection system includes an air conditioner having a first device connected via a power line in a communication-capable manner, and a second device capable of performing radio communication with the air conditioner. The air conditioner includes an authentication process control unit that controls the first device to perform an authentication process when a starting request of the authentication process for performing power carrier communication is received from the second device, the first device includes an authentication process unit that performs the authentication process under the control of the air conditioner, and the second device includes an authentication start process unit that transmits the starting request of the authentication process to the air conditioner.

APPLICATION UNLOCK USING A CONNECTED PHYSICAL DEVICE AND TRANSFER OF DATA THEREBETWEEN
20180011988 · 2018-01-11 · ·

According to one embodiment, a system includes a medical device configured to provide a function to a user, communicate via a wireless communication channel with one or more other devices, and send a signal to shift a medical device application from a locked state to an unlocked state. The system also includes a computing device having wireless communication channels and a processor and logic integrated with and/or executable by the processor. The logic is configured to cause the computing device to communicate with the medical device, execute the medical device application, and shift from the locked state to the unlocked state in response to receiving the signal from the medical device. Core functionality of the medical device application is disabled when the medical device application is in the locked state, and some functionality applicable to the medical device is enabled when the medical device application is in the unlocked state.

APPARATUS AND METHOD FOR ENHANCING PERSONAL INFORMATION DATA SECURITY

The present disclosure relates to a communication technique for converging a 5G communication system for supporting a higher data rate beyond a 4G system with an IoT technology, and a system therefor. The present disclosure can be applied to intelligent services on the basis of a 5G communication technology and an IoT-related technology (for example, smart home, smart building, smart city, smart car or connected car, healthcare, digital education, retail, security and safety-related service, and the like). The present invention provides a method for enhancing data security, comprising: when a request message including information related to a first privacy level is received from a user device, authenticating the user device; when the user device is an authenticated device as a result of the authentication, verifying the information related to the first privacy level; and when the verification of the information related to the first privacy level is completed, transmitting, to the user device, an image processed on the basis of the first privacy level among images processed on the basis of a plurality of privacy levels.

Expedited user authentication

A system for granting access to an account at an access device includes a computer server having a hardware processor and a memory storing a software code. The hardware processor executes the software code to receive a login request from the access device through a first communications socket, open a second communications socket between the access device and the computer server, transmit a verification request message including a required call-to-action to a verification device through a third communications socket, and receive a verification response message verifying that the required call-to-action has been completed at the verification device. Upon receiving the verification response message, the software code sends an access token for accessing the account to the access device through the second communications socket, receives the access token from the access device, and grants the access device access to the account.

ACOUSTIC SECURITY CODE TRANSMISSION
20180011999 · 2018-01-11 ·

A system and methods of computer security are provided wherein a first mobile computing device drives an acoustic transducer to emit an acoustic signal encoding a time-based, one time password (TOTP) code, and a second mobile computing device measures output of a MEMS gyroscope that senses the emitted acoustic signal. The second mobile computing device decodes the TOTP code from the gyroscope output, validates the TOTP code and responsively permits a user to access a secure application.