Abstract:
A method and system regulate a digital security system that controls access to a resource. The digital security system controls access to the resource according to a multi-level security protocol including a high-security-level access protocol and a low-security-level access protocol. The regulation method and system are configured to collect data from a set of user-data sources with which the user interacts during his daily life and, based on the collected data, to compute security parameters characterizing user activity. The computed security parameters are compared to a digital profile that models the characteristic behaviour of this user. When the comparison indicates that the observed user activity is inconsistent with the digital behaviour profile, the method and system regulate the digital security system to set (or maintain) it in an operating state such that, when the user requests access to the resource in the future, the digital security system will automatically implement the high-security-level access protocol at that time.
Abstract:
A method and system regulate a digital security system that controls access to a resource. The digital security system controls access to the resource according to a multi-level security protocol including a high-security-level access protocol and a low-security-level access protocol. The regulation method and system are configured to collect data from a set of user-data sources with which the user interacts during his daily life and, based on the collected data, to compute security parameters characterizing user activity. The computed security parameters are compared to a digital profile that models the characteristic behaviour of this user. When the comparison indicates that the observed user activity is inconsistent with the digital behaviour profile, the method and system regulate the digital security system to set (or maintain) it in an operating state such that, when the user requests access to the resource in the future, the digital security system will automatically implement the high-security-level access protocol at that time.
Abstract:
A method and system regulate a digital security system that controls access to a resource. The digital security system controls access to the resource according to a multi-level security protocol including a high-security-level access protocol and a low-security-level access protocol. The regulation method and system are configured to collect data from a set of user-data sources with which the user interacts during his daily life and, based on the collected data, to compute security parameters characterizing user activity. The computed security parameters are compared to a digital profile that models the characteristic behaviour of this user. When the comparison indicates that the observed user activity is inconsistent with the digital behaviour profile, the method and system regulate the digital security system to set (or maintain) it in an operating state such that, when the user requests access to the resource in the future, the digital security system will automatically implement the high-security-level access protocol at that time.
Abstract:
A hypervisor intermediate layer executed by an electronic device and interfaced with at least two operating systems (OS) with means to receive a message from a first OS, said message comprising an indication on an application to be executed in a second OS, send a message to the second OS, the message comprising a request to execute the application according to preset execution parameters, receive a message from the second OS comprising an indication that the application is being executed in a Graphical User Interface of the second OS according to the preset execution parameters, send to a hardware layer of the electronic device a command to display the second OS Graphical User Interface.