G06F2221/032

Machine learning model score obfuscation using time-based score oscillations
11580442 · 2023-02-14 · ·

An artefact is received. Features are later extracted from the artefact and are used to populate a vector. The vector is input into a classification model to generate a score. This score is then modified using a time-based oscillation function and is provided to a consuming application or process. Related apparatus, systems, techniques and articles are also described.

Method of processing secure data and electronic device supporting the same

An electronic device is provided. The electronic device includes a communication circuit, a display, a memory including a first display driver, a processor functionally connected with the communication circuit, the display, and the memory, and a secure module which is physically separated from the processor, and includes a secure processor and a second display driver, and the secure processor is configured to: when secure data is received from an external server through the communication circuit, disable the first display driver and enable the second display driver, and output a user interface including a first object corresponding to the secure data to the display by using the enabled second display driver.

Interaction method and apparatus

An interaction method includes receiving a service request from a client application (CA) installed on a terminal and that runs in a rich execution environment (REE), determining a trusted user interface (TUI) identifier, sending a TUI call instruction carrying the TUI identifier to a trusted execution environment (TEE) to instruct to draw an image based on the TUI template or the TUI function component to call a TUI to display the drawn image, receiving response information from the TEE, and executing a corresponding service procedure based on the response information.

IMAGE DATA ENCRYPTION AND RENDERING SYSTEM
20180012329 · 2018-01-11 ·

Systems, devices, and techniques are generally described to transmit image data. An image file including image data may be identified. The image data may be divided into a plurality of portions. The plurality of portions may include a first portion corresponding to a first position in the image data and a second portion corresponding to a second position in the image data. The image data may be modified to produce a shuffled image. The shuffled image may indicate that the first portion corresponds to a third position and the second portion corresponds to a fourth position. The shuffled image may be sent to a recipient computing device. The recipient computing device may render the first portion at the first position and the second portion at the second position to display the image data.

BANNER NOTIFICATION IN LOCKED HOST MONITOR

Aspects of the disclosure relates to systems and methods for locking a display device of a host computer remotely using a management controller, and providing a banner notification on the locked display device. The system includes a computing device as the host computer, which has a display device, and a management controller. When the management controller receives a locking command, the management controller, in response to the locking command, performs the following operations: generating a locking instruction, and sending the locking instruction to the computing device to lock the display device; and generating a message display instruction including a message to be displayed, and sending the message display instruction to the display device of the computing device, in order to display the message on the display device. Thus, a local user at the computing device may be notified by the message that the display device is locked.

HIDING AND UNHIDING JAVA CARD APPLET INSTANCES
20230236815 · 2023-07-27 ·

Methods and devices are provided for installing and hiding applets onto smart cards devices. In a first step, a request for installing an instance of a first applet is received at the card device from an off-card entity. The request includes a first applet identifier. An applet instance is then installed with the first applet identifier in a registry of the card device's operating system. In a further step, a request for hiding the instance of the first applet identified by the first applet identifier is received at the card de-vice from the off-card entity. After receiving the hiding request, the smart card operating system finds the applet instance with the give applet identifier and hides it.

Gracefully handling endpoint feedback when starting to monitor

A method, system and computer-usable medium for adaptively assessing risk associated with an endpoint, comprising: determining a risk level corresponding to an entity associated with an endpoint; selecting a frequency and a duration of an endpoint monitoring interval; collecting user behavior to collect user behavior associated with the entity for the duration of the endpoint monitoring interval via the endpoint; processing the user behavior to generate a current risk score for the entity; comparing the current risk score of the user to historical risk scores to determine whether a risk score of a user has changed; and changing the risk score of the user to the current risk score when the risk score of the user has changed.

Remote register updates

Examples described herein provide for a first core to map a measurement of packet processing activity and operating parameters so that a second core can access the measurement of packet processing activity and potentially modify an operating parameter of the first core. The second core can modify operating parameters of the first core based on the measurement of packet processing activity. The first and second cores can be provisioned on start-up with a common key. The first and second cores can use the common key to encrypt or decrypt measurement of packet processing activity and operating parameters that are shared between the first and second cores. Accordingly, operating parameters of the first core can be modified by a different core while providing for secure modification of operating parameters.

MULTI-ZONE DISPLAY PRIVACY BASED ON LOCATION AND CONTENT

Examples of multi-zone display privacy based on location and content are described. In some examples, an electronic device may include a location engine to determine a location of the electronic device. The electronic device may also include a privacy engine to determine the location to be an insecure location and to determine that displayed data includes sensitive information. In some examples, the electronic device may include a display controller to enable a privacy mode in a zone of a multiple-zone display screen in response to a determination that the location is an insecure location and the displayed data includes sensitive information.

Secure Display of Sensitive Content
20230214481 · 2023-07-06 ·

Methods and systems for secure display of sensitive content are described herein. A server may receive, from a first computing device, a request for content. The content may include at least one portion that is marked as sensitive content. The server may determine that the first computing device does not satisfy an authorized device criterion, and send a modified version of the content to the first computing device. The modified version of the content may include the at least one portion that is obfuscated. The server may send an unmodified version of the content to a second computing device that satisfies the authorized device criterion. The second computing device may display the unmodified version of the content at least partially overlaid on top of the modified version of the content being displayed on the first computing device.