G06F21/82

Near field communications system having enhanced security

A near field communication system can include a near field generator configured to generate a near field detectable information signal. The near field generator and supporting circuitry also produces incidental electromagnetic radiation. A masking signal transmitter is used with the near field generator and radiates a masking electromagnetic signal. The masking electromagnetic signal may substantially mask the incidental electromagnetic radiation.

Near field communications system having enhanced security

A near field communication system can include a near field generator configured to generate a near field detectable information signal. The near field generator and supporting circuitry also produces incidental electromagnetic radiation. A masking signal transmitter is used with the near field generator and radiates a masking electromagnetic signal. The masking electromagnetic signal may substantially mask the incidental electromagnetic radiation.

Systems and methods for control system security

A component security device may be disposed at an interface between a component and a cyber-physical system. The disclosed component security device may be physically and/or electrically coupled between the component and infrastructure of the cyber-physical system, such as a backplane, bus, and/or the like. The component security device may be configured to monitor the component, and selectively isolate the component from the cyber-physical system. Since the component security device is interposed at the interface of the component, the component security device may be capable of isolating the component regardless of whether the component has been compromised (e.g., regardless of whether the component is capable of complying with system commands).

Systems and methods for control system security

A component security device may be disposed at an interface between a component and a cyber-physical system. The disclosed component security device may be physically and/or electrically coupled between the component and infrastructure of the cyber-physical system, such as a backplane, bus, and/or the like. The component security device may be configured to monitor the component, and selectively isolate the component from the cyber-physical system. Since the component security device is interposed at the interface of the component, the component security device may be capable of isolating the component regardless of whether the component has been compromised (e.g., regardless of whether the component is capable of complying with system commands).

PRIVACY SHIELD DESIGN AND PLACEMENT IN AN INFORMATION HANDLING SYSTEM (IHS)
20230043837 · 2023-02-09 · ·

Embodiments of systems and methods for privacy shield design and placement in an Information Handling System (IHS) are described. In some embodiments, a privacy shield may include a film configured to emit light and a circular aperture in the film, such that the privacy shield is configured to be deployed in front of a lens of a camera coupled to an IHS.

SOC-assisted resilient boot

Systems, apparatuses and methods may provide for technology that assumes, by a root of trust located in a trusted region of a system on chip (SOC), control over a reset of the SOC and conducting, by the root of trust, an authentication of an update package in response to an update condition. The root of trust technology may also apply the update package to firmware located in non-volatile memory (NVM) associated with a microcontroller of the SOC if the authentication is successful.

SYSTEMS AND METHODS FOR USE OF PERIPHERAL HARDWARE BY MODERN WORKSPACES

Methods and system support use of peripheral devices by workspaces operating on an Information Handling System (IHS), where the workspaces operate in isolation from the hardware and other software of the IHS. Workspaces are thus unable to interface with hardware coupled to the IHS, including peripheral devices coupled to the IHS. In embodiments, workspace issue request for use of a remote operation supported by a peripheral device. A handle is then provided for invoking the remote operation supported by the peripheral device and for providing the workspace with exclusive use of the peripheral device for the duration of a validity of the handle. One the handle is used to invoke the remote operation supported by the peripheral device, the workspace is provided with output from the remote operation conducted during exclusive use of the peripheral device by the workspace.

Establishing a trusted connection with a peripheral device

The present disclosure relates to systems, methods, and computer-readable media for establishing and managing a trusted connection between a peripheral device and a client device. For example, systems discussed herein include determining whether a peripheral device poses a security risk based on a combination of peripheral device data and a client profile including environmental data and historical usage data for the client device. Systems described herein may further grant a level of trust based on the determine security risk. The systems disclosed herein facilitate implementation of intelligent policies that are user friendly without exposing the client device to a variety of security threats.

Establishing a trusted connection with a peripheral device

The present disclosure relates to systems, methods, and computer-readable media for establishing and managing a trusted connection between a peripheral device and a client device. For example, systems discussed herein include determining whether a peripheral device poses a security risk based on a combination of peripheral device data and a client profile including environmental data and historical usage data for the client device. Systems described herein may further grant a level of trust based on the determine security risk. The systems disclosed herein facilitate implementation of intelligent policies that are user friendly without exposing the client device to a variety of security threats.

Method of adapting a user interface on a mobile communication device based on different environments

A method of providing a user interface on a mobile communication device to control smart devices in an environment. The method comprises discovering a plurality of smart devices in an environment by a client application executing on a mobile communication device by initiating wireless communication between the mobile communication device and the plurality of smart devices, wherein the client application learns an electronic model identity of each of the discovered smart devices, communicating with a data store by the client application to look-up control interfaces of the discovered smart devices based on the electronic model identities of the smart devices, looking-up predefined environmental preferences associated with the mobile communication device in the data store by the client application, transmitting control commands by the client application to the plurality of smart devices based in part on the looked-up predefined environmental preferences.