PROTECTING USER INPUT AGAINST FOCUS CHANGE
    11.
    发明申请
    PROTECTING USER INPUT AGAINST FOCUS CHANGE 有权
    保护用户输入反对焦点更改

    公开(公告)号:US20160180080A1

    公开(公告)日:2016-06-23

    申请号:US14578730

    申请日:2014-12-22

    Abstract: In an embodiment, a system includes a processor having at least one core and a security engine, the security engine having a focus change logic to inform a trusted application to be executed in a trusted execution environment of a request for a focus change during execution of the trusted application, enable the focus change to occur during execution of the trusted application when allowed by the trusted application, and otherwise to prevent the focus change. Other embodiments are described and claimed.

    Abstract translation: 在一个实施例中,系统包括具有至少一个核心和安全引擎的处理器,所述安全引擎具有聚焦改变逻辑,以便在受信任的执行环境中通知在可执行环境中执行焦点改变的请求 受信任的应用程序可以在可信应用程序执行期间发生焦点更改,而在受信任应用程序允许的情况下,可能会发生焦点更改,否则可能会阻止焦点更改。 描述和要求保护其他实施例。

    Two-phase discovery and onboarding of internet of things (IoT) devices

    公开(公告)号:US11818584B2

    公开(公告)日:2023-11-14

    申请号:US17531044

    申请日:2021-11-19

    Abstract: Various systems and methods for discovery and onboarding in an interconnected network framework of Internet of Things (IoT) devices are described. In an example, a technique for onboarding and provisioning a device onto an interconnected network framework includes operations to: receive a unique temporary device identifier from a device instance, the device instance indicating availability for onboarding onto a network; onboard the device instance onto the network; establish a secure session with the device instance via the network; receive, in the secure session, a secure device identifier; and initiate provisioning of the device instance in a secure directory based on the secure device identifier. In a further example, techniques are provided to securely identify and provision a second device instance (a doppelganger device instance) operating on a physical device that hosts both the first device instance and the second device instance.

    Access control in an observe-notify network using callback

    公开(公告)号:US11546761B2

    公开(公告)日:2023-01-03

    申请号:US16609697

    申请日:2018-05-08

    Abstract: Various systems and methods for implementing observe-notify callback context automation in a connected device framework are described herein. In an example, the techniques for context automation may include: expansion of RESTful permissions to include an OBSERVE command (e.g., as part of a CRUDON (Create, Retrieve, Update, Delete, Observe, Notify) command definition); configuration of a callback resource to implement the OBSERVE command; access control policies to implement the OBSERVE command; and OBSERVE registration events to be monitored within an access management service.

    Dynamic access policy provisioning in a device fog

    公开(公告)号:US11284259B2

    公开(公告)日:2022-03-22

    申请号:US16610835

    申请日:2018-05-11

    Abstract: Various systems and methods for dynamic access policy provisioning in a connected device framework are described herein. In an example, the techniques for policy provisioning may include resource update access policy automation, directory resource access policy automation, or hidden resources access policy automation, as monitored and operated with an access management service (AMS). In an example, the AMS monitors resources to receive a notification when they change (520). If the change observed is an addition or deletion of a resource object (530), the AMS responds by performing security analysis of devices hosting the new resource(s) (540), which may further result in device onboarding actions (550). The AMS may further respond by evaluating link semantics to determine which other devices and resources may need updated access control list (ACL) policies (560).

    System, apparatus and method for access control list processing in a constrained environment

    公开(公告)号:US10244001B2

    公开(公告)日:2019-03-26

    申请号:US15259560

    申请日:2016-09-08

    Abstract: In one embodiment, a method includes receiving a first request from a first device to access a first resource of the system and determining whether to grant access to the first resource based on a first access control list stored in the system, the first access control list associated with the first device, the first device having a first relevance value, and based on the determination, granting the access to the first resource; and receiving a second request from a second device to access a second resource of the system and forwarding the second request to an access manager service coupled to the system to determine whether to grant access to the second resource based on a second access control list stored in the access manager service associated with the second device, the second device having a second relevance value, receive an access grant from the access manager service and based thereon, granting the access to the second resource.

Patent Agency Ranking