Patent classifications
G06F21/84
AUTHENTICATION METHOD, STORAGE MEDIUM, AND INFORMATION PROCESSING APPARATUS
An authentication method executed by a computer, the authentication method includes obtaining a captured image captured by a camera; selecting one facial image from a plurality of facial images based on a position of each of the plurality of facial images included in the captured image; referring to a memory that stores pieces of biometric information associated with the respective plurality of facial images; specifying a piece of the biometric information associated with a facial image in which a degree of similarity to the selected facial image satisfies a criterion; and performing, when biometric information detected by a sensor is received, authentication based on verification of the specified piece of the biometric information against the received biometric information.
Computing networks and systems for updating data
Systems and methods are provided for updating data in a computer network. An exemplary method includes: receiving a first data from one or more data servers; determining a second data for which a first update information is used to update at least one element of the second data; generating a second update information associated with the second data; generating a third update information by executing an operation that compares the first update information and the second update information; generating a third data by applying the third update information to the second data; allowing a user to select via a display device which of the different update elements to update the second data; generating a fourth update information by determining the selected different update elements to update the second data; and updating the second data using the fourth update information.
Computing networks and systems for updating data
Systems and methods are provided for updating data in a computer network. An exemplary method includes: receiving a first data from one or more data servers; determining a second data for which a first update information is used to update at least one element of the second data; generating a second update information associated with the second data; generating a third update information by executing an operation that compares the first update information and the second update information; generating a third data by applying the third update information to the second data; allowing a user to select via a display device which of the different update elements to update the second data; generating a fourth update information by determining the selected different update elements to update the second data; and updating the second data using the fourth update information.
PRIVACY SHIELD DESIGN AND PLACEMENT IN AN INFORMATION HANDLING SYSTEM (IHS)
Embodiments of systems and methods for privacy shield design and placement in an Information Handling System (IHS) are described. In some embodiments, a privacy shield may include a film configured to emit light and a circular aperture in the film, such that the privacy shield is configured to be deployed in front of a lens of a camera coupled to an IHS.
IMAGE REDACTION FOR A DISPLAY DEVICE
A system may be used to redact an image to be displayed by a display device. By intercepting a signal before an image of the signal is displayed on a display device, the display of confidential, sensitive and inappropriate information may be suppressed. More specifically, the image of the signal is analyzed using a content recognition algorithm to identify items of content, which may be redacted by modifying the signal. Using this concept, the image may be redacted by the display device, or by a port or adapter between a signal generator and the display device, without relying on redaction software local to the signal generation system.
IMAGE REDACTION FOR A DISPLAY DEVICE
A system may be used to redact an image to be displayed by a display device. By intercepting a signal before an image of the signal is displayed on a display device, the display of confidential, sensitive and inappropriate information may be suppressed. More specifically, the image of the signal is analyzed using a content recognition algorithm to identify items of content, which may be redacted by modifying the signal. Using this concept, the image may be redacted by the display device, or by a port or adapter between a signal generator and the display device, without relying on redaction software local to the signal generation system.
Data protection systems
Corporate information technology (IT) networks can protect sensitive data sent to computers located outside of the corporate IT network. For example, a computer located outside of the corporate IT network may receive a message that instructs the computer to operate in a data protection mode in which the computer reduces a frame rate of a monitor of the computer from a first frame rate to a lower second frame rate. In this example, the computer receives sensitive information that includes sensitive visual content to be displayed on the monitor and displays the sensitive visual content on the monitor configured to operate at the second frame rate.
Data protection systems
Corporate information technology (IT) networks can protect sensitive data sent to computers located outside of the corporate IT network. For example, a computer located outside of the corporate IT network may receive a message that instructs the computer to operate in a data protection mode in which the computer reduces a frame rate of a monitor of the computer from a first frame rate to a lower second frame rate. In this example, the computer receives sensitive information that includes sensitive visual content to be displayed on the monitor and displays the sensitive visual content on the monitor configured to operate at the second frame rate.
User interface for managing access to credentials for use in an operation
The present disclosure generally relates to managing access to credentials. In some examples, an electronic device authorizes release of credentials for use in an operation for which authorization is required. In some examples, an electronic device causes display of one or more steps to be taken to enable an input device for user input. In some examples, an electronic device disambiguates between commands to change the account that is actively logged-in on the device and commands to cause credentials to be released from the secure element.
User interface for managing access to credentials for use in an operation
The present disclosure generally relates to managing access to credentials. In some examples, an electronic device authorizes release of credentials for use in an operation for which authorization is required. In some examples, an electronic device causes display of one or more steps to be taken to enable an input device for user input. In some examples, an electronic device disambiguates between commands to change the account that is actively logged-in on the device and commands to cause credentials to be released from the secure element.