REDUCING AUTHENTICATION CONFIDENCE OVER TIME BASED ON USER HISTORY

    公开(公告)号:US20170142089A1

    公开(公告)日:2017-05-18

    申请号:US15419447

    申请日:2017-01-30

    Abstract: Technologies are provided in embodiments to manage an authentication confirmation score. Embodiments are configured to identify, in absolute session time, a beginning time and an ending time of an interval of an active user session on a client. Embodiments are also configured to determine a first value representing a first subset of a set of prior user sessions, where the prior user sessions of the first subset were active for at least as long as the beginning time. Embodiments can also determine a second value representing a second subset of the set of prior user sessions, where the prior user sessions of the second subset were active for at least as long as the ending time. Embodiments also determine, based on the first and second values, a decay rate for the authentication confidence score of the active user session. In some embodiments, the set is based on context attributes.

    PERFORMING USER SEAMLESS AUTHENTICATIONS
    43.
    发明申请
    PERFORMING USER SEAMLESS AUTHENTICATIONS 审中-公开
    执行用户无缝认证

    公开(公告)号:US20160306955A1

    公开(公告)日:2016-10-20

    申请号:US14859611

    申请日:2015-09-21

    CPC classification number: G06F21/34 G06F21/00 G06F21/35

    Abstract: In one embodiment, a first device includes: a first logic to generate a first token when a user adapts the first device in approximate contact to the user, the first token including a first timestamp; a storage to store the first token and a second token, the second token obtained from an authenticator and associated with an authentication of the user to a second device, the second token including a second timestamp; and a communication module to communicate the first and second tokens to the second device to cause the second device to authenticate the user based at least in part on the first and second tokens. Other embodiments are described and claimed.

    Abstract translation: 在一个实施例中,第一设备包括:第一逻辑,用于当用户以与用户近似接触的方式适配第一设备时生成第一令牌,第一令牌包括第一时间戳; 用于存储所述第一令牌和第二令牌的存储器,所述第二令牌从认证器获得并与所述用户的认证相关联到第二设备,所述第二令牌包括第二时间戳; 以及通信模块,用于将第一和第二令牌传送到第二设备,以使得第二设备至少部分地基于第一和第二令牌来认证用户。 描述和要求保护其他实施例。

    Continuous Authentication Confidence Module
    44.
    发明申请
    Continuous Authentication Confidence Module 审中-公开
    持续认证信任模块

    公开(公告)号:US20150373007A1

    公开(公告)日:2015-12-24

    申请号:US14838731

    申请日:2015-08-28

    Abstract: Generally, this disclosure describes a continuous authentication confidence module. A system may include user device including processor circuitry configured to determine presence data; a confidence factor including at least one of a sensor configured to capture sensor input and a system monitoring module configured to monitor activity of the user device; memory configured to store a confidence score and an operating system; and a continuous authentication confidence module configured to determine the confidence score in response to an initial authentication of a specific user, update the confidence score based, at least in part, an expectation of user presence and/or selected presence data, and notify the operating system that the authentication is no longer valid if the updated confidence score is within a tolerance of a session close threshold; the initial authentication configured to open a session, the confidence score configured to indicate a current strength of authentication during the session.

    Abstract translation: 通常,本公开描述了连续认证置信模块。 系统可以包括用户设备,包括被配置为确定存在数据的处理器电路; 包括被配置为捕获传感器输入的传感器中的至少一个的置信因子和被配置为监视用户设备的活动的系统监视模块中的至少一个; 存储器被配置为存储置信度分数和操作系统; 以及连续认证置信模块,被配置为响应于特定用户的初始认证来确定置信度得分,至少部分地基于用户存在和/或选择的存在数据的期望来更新置信度得分,并且通知操作 系统,如果更新的置信度分数在会话关闭阈值的容限内,认证不再有效; 所述初始认证被配置为打开会话,所述置信度分数被配置为指示所述会话期间的当前认证强度。

    Device and method for secure user interface gesture processing using processor graphics
    45.
    发明授权
    Device and method for secure user interface gesture processing using processor graphics 有权
    使用处理器图形进行安全用户界面手势处理的设备和方法

    公开(公告)号:US09134878B2

    公开(公告)日:2015-09-15

    申请号:US13631288

    申请日:2012-09-28

    CPC classification number: G06F3/0481 G06F3/041 G06F3/04883 G06F21/74 G06F21/82

    Abstract: A device and method for securely rendering content on a gesture-enabled computing device includes initializing a secure execution environment on a processor graphics of the computing device. The computing device transfers view rendering code and associated state data to the secure execution environment. An initial view of the content is rendered by executing the view rendering code in the secure execution environment. A gesture is recognized, and an updated view of the content is rendered in the secure execution environment in response to the gesture. The gesture may include a touch gesture recognized on a touch screen, or a physical gesture of the user recognized by a camera. After the updated view of the content is rendered, the main processor of the computing device may receive updated view data from the secure execution environment.

    Abstract translation: 用于在启用姿势的计算设备上安全地呈现内容的设备和方法包括在计算设备的处理器图形上初始化安全执行环境。 计算设备将视图呈现代码和相关联的状态数据传送到安全执行环境。 通过在安全执行环境中执行视图呈现代码来呈现内容的初始视图。 识别手势,并且响应于手势在安全执行环境中呈现内容的更新视图。 手势可以包括在触摸屏上识别的触摸手势,或者由相机识别的用户的身体手势。 在呈现内容的更新视图之后,计算设备的主处理器可以从安全执行环境接收更新的视图数据。

    Provisioning federated computation on distributed private data

    公开(公告)号:US12223079B2

    公开(公告)日:2025-02-11

    申请号:US17483543

    申请日:2021-09-23

    Abstract: A method comprises receiving in a governor device, from a plurality of data owner devices, metadata for one or more datasets maintained by the plurality of data owner devices, registering the metadata for the one or more datasets with the governor device, in response to a request from an aggregator, providing at least a portion of the metadata for the one or more datasets to the aggregator, receiving, from the aggregator, a compute plan to be implemented by the plurality of data owner devices, distributing at least a portion of the compute plan to the plurality of data owner devices, in response to receiving, from the plurality of data owner devices, a verification report and a certification for an enclave, binding the enclave to a host device, and providing the compute plan to the plurality of data owner devices.

Patent Agency Ranking