Methods and apparatus to facilitate secure screen input
    31.
    发明授权
    Methods and apparatus to facilitate secure screen input 有权
    促进安全屏幕输入的方法和设备

    公开(公告)号:US09514304B2

    公开(公告)日:2016-12-06

    申请号:US14362399

    申请日:2013-12-23

    Abstract: Methods, apparatus, systems and articles of manufacture are disclosed to facilitate secure screen input. An example disclosed system includes a user interface (UI) manager to generate a UI comprising a quantity of ordinal entry points, each one of the quantity of ordinal entry points comprising a repeating selectable pattern, an ordinal sequence generator to generate an initial randomized combination of the quantity of ordinal entry points, the randomized combination stored in a trusted execution environment, and an offset calculator to calculate a password entry value by comparing an offset value and direction value retrieved from the UI with the initial randomized combination of the quantity of ordinal entry points.

    Abstract translation: 公开了方法,装置,系统和制品以便于安全的屏幕输入。 一个示例公开的系统包括用户界面(UI)管理器,用于生成包括一定数量的顺序入口点的UI,每个数量的顺序入口点包括重复的可选择模式,序数序列生成器,用于生成初始随机化组合 顺序入口点的数量,存储在可信执行环境中的随机化组合,以及偏移计算器,用于通过将从UI获取的偏移值和方向值与序数量的初始随机组合进行比较来计算密码输入值 积分

    MULTI-SIGNAL GEOMETRIC LOCATION SENSING FOR ACCESS CONTROL
    32.
    发明申请
    MULTI-SIGNAL GEOMETRIC LOCATION SENSING FOR ACCESS CONTROL 有权
    用于访问控制的多信号几何位置感测

    公开(公告)号:US20160174031A1

    公开(公告)日:2016-06-16

    申请号:US14572576

    申请日:2014-12-16

    CPC classification number: H04W4/021 H04W12/08

    Abstract: Various embodiments are generally directed to the provision and use of geometric location based security systems that use multiple beacons for determining a location. A beacon transmitted from an ultrasound broadcast as well as one or more different wireless broadcasts can be used to geo-locate a device and provide access controls based on the geo-location.

    Abstract translation: 各种实施例通常涉及提供和使用基于几何位置的安全系统,其使用多个信标来确定位置。 可以使用从超声波广播发送的信标以及一个或多个不同的无线广播来定位设备并基于地理位置提供访问控制。

    Continuous Authentication Confidence Module
    33.
    发明申请
    Continuous Authentication Confidence Module 审中-公开
    持续认证信任模块

    公开(公告)号:US20150373007A1

    公开(公告)日:2015-12-24

    申请号:US14838731

    申请日:2015-08-28

    Abstract: Generally, this disclosure describes a continuous authentication confidence module. A system may include user device including processor circuitry configured to determine presence data; a confidence factor including at least one of a sensor configured to capture sensor input and a system monitoring module configured to monitor activity of the user device; memory configured to store a confidence score and an operating system; and a continuous authentication confidence module configured to determine the confidence score in response to an initial authentication of a specific user, update the confidence score based, at least in part, an expectation of user presence and/or selected presence data, and notify the operating system that the authentication is no longer valid if the updated confidence score is within a tolerance of a session close threshold; the initial authentication configured to open a session, the confidence score configured to indicate a current strength of authentication during the session.

    Abstract translation: 通常,本公开描述了连续认证置信模块。 系统可以包括用户设备,包括被配置为确定存在数据的处理器电路; 包括被配置为捕获传感器输入的传感器中的至少一个的置信因子和被配置为监视用户设备的活动的系统监视模块中的至少一个; 存储器被配置为存储置信度分数和操作系统; 以及连续认证置信模块,被配置为响应于特定用户的初始认证来确定置信度得分,至少部分地基于用户存在和/或选择的存在数据的期望来更新置信度得分,并且通知操作 系统,如果更新的置信度分数在会话关闭阈值的容限内,认证不再有效; 所述初始认证被配置为打开会话,所述置信度分数被配置为指示所述会话期间的当前认证强度。

    IOT SENSOR FUSION
    34.
    发明申请
    IOT SENSOR FUSION 审中-公开

    公开(公告)号:US20200322434A1

    公开(公告)日:2020-10-08

    申请号:US16087965

    申请日:2016-04-01

    Abstract: Various systems and methods for Internet of Things (IoT) network sensor fusion are provided herein. A system for providing sensor collaboration includes: a sensor command circuit to access first-tier sensor data from a first-tier sensor associated with a user; a risk assessment circuit to use the first-tier sensor data to determine a risk rating, the risk rating representing a potential risk to the user; a user context circuit to determine a user context from the first-tier sensor data, wherein the user context circuit and the sensor command circuit are to selectively access second-tier sensor data from a second-tier sensor based on the user context; and a rule evaluation circuit to access a rule database to identify a rule corresponding to the risk rating and user context, and execute the rule when the rule is identified.

    Technologies for analyzing uniform resource locators

    公开(公告)号:US10218716B2

    公开(公告)日:2019-02-26

    申请号:US15283389

    申请日:2016-10-01

    Abstract: Technologies for analyzing a Uniform Resource Locator (URL) include a multi-stage URL analysis system. The multi-stage URL analysis system analyzes the URL using a multi-stage analysis. In the first stage, the multi-stage URL analysis system analyzes the URL using an ensemble lexical analysis. In the second stage, the multi-stage URL analysis system analyzes the URL based on third-party detection results. In the third stage, the multi-stage URL analysis system analyzes the URL based on metadata related to the URL. The multi-stage URL analysis system advances the stages of analysis if a malicious classification score determined by each stage does not satisfy a confidence threshold. The URL may also be selected for additional rigorous analysis using selection criteria not used in by the analysis stages.

    Technologies for login pattern based multi-factor authentication

    公开(公告)号:US10114935B2

    公开(公告)日:2018-10-30

    申请号:US14580817

    申请日:2014-12-23

    Abstract: Technologies for multi-factor authentication of a user include a computing device with one or more sensors. The computing device may authenticate the user by analyzing biometric and/or environmental sensor data to determine whether to allow the user access to a computing device. To do so, the computing device may determine reliability scores based on the environment during authentication for each biometric authentication factor used to authenticate the user. Additionally, the computing device may determine a login pattern based on sensor data collected during historical authentication attempts by the user over a period of time. The computing device may apply a machine-learning classification algorithm to determine classification rules, based on the login pattern, applied by the computing device to determine whether to allow the user access to the computing device. Other embodiments are described herein and claimed.

    Technologies for performing orientation-independent bioimpedance-based user authentication

    公开(公告)号:US09934372B1

    公开(公告)日:2018-04-03

    申请号:US15476995

    申请日:2017-04-01

    CPC classification number: G06F21/32 A61B5/0024 A61B5/0536 A61B5/117 A61B5/6803

    Abstract: Technologies for performing orientation-independent bioimpedance-based user authentication include a compute device. The compute device includes a plurality of electrodes usable to transmit an alternating current and measure a bioimpedance in a section of the body of a user. The compute device is to transmit, with a pair of the electrodes, an alternating current through the section of the body of the user, measure, with a pair of the electrodes, a bioimpedance of the section of the body to the transmitted alternating current, generate a tomographic image as a function of the measured bioimpedance, identify a position of a fiduciary marker in the tomographic image, rotate the tomographic image to a predefined orientation as a function of the position of the fiduciary marker, extract one or more biometric features from the rotated tomographic image, and perform authentication of the user as a function of the extracted one or more biometric features.

Patent Agency Ranking