G06F2221/2129

SYSTEM SECURITY
20230050007 · 2023-02-16 ·

In accordance with embodiments of this disclosure, a method of securing a processing unit according to some embodiments includes receiving a request for access from a user; detecting a device; determining whether the device is a trusted device; and providing the user access to the processing unit only if the device is a trusted device. In some embodiments, the trusted device may be a Bluetooth device.

Keyboard emulation

Examples associated with keyboard emulation are described. One example system includes an input/output controller. The system also includes a remote signal receiver. A control module receives a first signal via the remote signal receiver. Based on the first signal, the control module communicates with the input/output controller to emulate a keyboard input.

DEVICE INTRODUCTION AND ACCESS CONTROL FRAMEWORK

In an embodiment, a method includes registering applications and network services for notification of an out-of-band introduction, and using the out-of-band introduction to bootstrap secure in-band provisioning of credentials and policies that are used to control subsequent access and resource sharing on an in-band channel. In another embodiment, an apparatus implements the method.

SECURE AUTHENTICATION SYSTEM AND METHOD

Methods and systems pertaining secure transaction systems are disclosed. In one implementation, a computer with a verification token associated with a computer can send user authentication data as well as a secure datum to a control server. The verification token may obtain the secure datum from a validation entity. The control server can validate the secure datum and authentication data and can generate a payer authentication response.

Anomaly detection in real-time multi-threaded processes on embedded systems and devices using hardware performance counters and/or stack traces

An aspect of behavior of an embedded system may be determined by (a) determining a baseline behavior of the embedded system from a sequence of patterns in real-time digital measurements extracted from the embedded system; (b) extracting, while the embedded system is operating, real-time digital measurements from the embedded system; (c) extracting features from the real-time digital measurements extracted from the embedded system while the embedded system was operating; and (d) determining the aspect of the behavior of the embedded system by analyzing the extracted features with respect to features of the baseline behavior determined.

PROTECTED ARTICLE MANAGEMENT

Tracking, identifying and article management systems and methods for reliably and repeatedly determining one or more physically uncopiable attribute instances (of the same or varying types) from or inherent in an article of manufacture, using the selected physical uncopiable attribute(s) to produce an unforgeable identity for the article, and then integrating that unforgeable identity into computer-based tracking systems in a way that permits the tracking system to track and monitor articles for which identity information is known. Applications include documents, fashion accessories, artwork, and other objects.

Storage device authentication

Systems and methods authenticate storage devices. In one implementation, a computer-implemented method is provided for authenticating a storage device. According to the method, a manifest that identifies a destination is receive. A transfer station reads a digital signature from the storage device. The digital signature is validated and, based on the validation of the digital signature, a transfer of one or more files from the storage device via the transfer station is authorized to the destination identified in the manifest.

STORAGE DEVICE AUTHENTICATION

Systems and methods authenticate storage devices. In one implementation, a computer-implemented method is provided for authenticating a storage device. According to the method, a manifest that identifies a destination is receive. A transfer station reads a digital signature from the storage device. The digital signature is validated and, based on the validation of the digital signature, a transfer of one or more files from the storage device via the transfer station is authorized to the destination identified in the manifest.

SYSTEM AND METHOD FOR PROVIDING DATA ACCESS
20230230156 · 2023-07-20 ·

Computing devices, platforms, methods, and storage media for providing data access are disclosed. Exemplary implementations may: obtain a device authorization token granting a computing device authenticated access to real-time equity quotes when the computing device is in an unauthenticated state; transmit, to a quote access server, an authorized quote access request specifying one or more equities for which one or more real-time equity quotes are requested; receive, from the quote access server, the one or more real-time equity quotes associated with the one or more equities; and provide, in the unauthenticated state, the one or more real-time equity quotes associated with the one or more equities. Example implementations make it simpler and easier to view real-time quotes, for example with a single swipe/gesture and without opening a financial institution app or logging in to a website hosted by a financial institution.

Electronic device for transmitting, to cover device, data acquired from external electronic device, on basis of identification information of cover device, and control method

An electronic device for transmitting, to a cover device, data acquired from an external electronic device, on the basis of identification information of the cover device, and a control method are disclosed. An electronic device according to various embodiments of the present document comprises: a housing; a first antenna and a second antenna which are accommodated in the housing; a first wireless communication circuit set to provide first wireless communication by using the first antenna; a second wireless communication circuit set to provide second wireless communication by using the second antenna; and a control circuit accommodated in the housing and operably connected to the first wireless communication circuit and the second wireless communication circuit, wherein the control circuit detects coupling between a cover device, which can be coupled to one side of the electronic device, and the electronic device, and the cover device includes a third antenna and a third wireless communication circuit set to provide the first wireless communication by using the third antenna, and can be set to: acquire, through the first wireless communication circuit, identification information related to the cover device from the cover device at least on the basis of the detection; acquire, through the second wireless communication circuit, data corresponding to the identification information from an external electronic device; and transmit, through the first wireless communication circuit, the acquired data to the third wireless communication circuit included in the cover device.