Supervised Online Identity
    41.
    发明申请

    公开(公告)号:US20200169563A1

    公开(公告)日:2020-05-28

    申请号:US16532057

    申请日:2019-08-05

    Abstract: Technologies to facilitate supervision of an online identify include a gateway server to facilitate and monitor access to an online service by a user of a “child” client computer device. The gateway server may include an identity manager to receive a request for access to the online service from the client computing device, retrieve access information to the online service, and facilitate access to the online service for the client computing device using the access information. The access information is kept confidential from the user. The gateway server may also include an activity monitor module to control activity between the client computing device and the online service based on the set of policy rules of a policy database. The gateway server may transmit notifications of such activity to a “parental” client computing device for review and/or approval, which also may be used to update the policy database.

    Supervised online identity
    42.
    发明授权

    公开(公告)号:US10375080B2

    公开(公告)日:2019-08-06

    申请号:US15477867

    申请日:2017-04-03

    Abstract: Technologies to facilitate supervision of an online identify include a gateway server to facilitate and monitor access to an online service by a user of a “child” client computer device. The gateway server may include an identity manager to receive a request for access to the online service from the client computing device, retrieve access information to the online service, and facilitate access to the online service for the client computing device using the access information. The access information is kept confidential from the user. The gateway server may also include an activity monitor module to control activity between the client computing device and the online service based on the set of policy rules of a policy database. The gateway server may transmit notifications of such activity to a “parental” client computing device for review and/or approval, which also may be used to update the policy database.

    Secure import and export of keying material

    公开(公告)号:US09602500B2

    公开(公告)日:2017-03-21

    申请号:US14367434

    申请日:2013-12-20

    Abstract: An embodiment includes a method executed by at least one processor of a first computing node comprising: generating a key pair including a first public key and a corresponding first private key; receiving an instance of a certificate, including a second public key, from a second computing node located remotely from the first computing node; associating the instance of the certificate with the key pair; receiving an additional instance of the certificate; verifying the additional instance of the certificate is associated with the key pair; and encrypting and exporting the first private key in response to verifying the additional instance of the certificate is associated with the key pair. Other embodiments are described herein.

    Detection of spoofing attacks for video-based authentication
    46.
    发明授权
    Detection of spoofing attacks for video-based authentication 有权
    检测基于视频认证的欺骗攻击

    公开(公告)号:US09594958B2

    公开(公告)日:2017-03-14

    申请号:US14551839

    申请日:2014-11-24

    Abstract: Methods, apparatus, systems and articles of manufacture detect spoofing attacks for video-based authentication are disclosed. Disclosed example method to perform video-based authentication include determining whether a sequence of input images provided to perform video-based authentication of a subject exhibits a first region having fluctuating pixel values. Such example methods also include determining that the sequence of input images is associated with a spoofing attack in response to determining that the sequence of input images exhibits the first region having fluctuating pixel values.

    Abstract translation: 公开了方法,装置,系统和制造商检测用于视频认证的欺骗攻击。 用于执行基于视频的认证的公开的示例方法包括确定提供用于执行对象的基于视频的认证的输入图像的序列是否具有具有波动像素值的第一区域。 响应于确定输入图像序列呈现具有波动像素值的第一区域,这样的示例性方法还包括确定输入图像的序列与欺骗攻击相关联。

    Method and apparatus for cloud-assisted cryptography
    47.
    发明授权
    Method and apparatus for cloud-assisted cryptography 有权
    云辅助加密技术的方法与装置

    公开(公告)号:US09503433B2

    公开(公告)日:2016-11-22

    申请号:US14227319

    申请日:2014-03-27

    Abstract: In an embodiment, a system includes a processor that includes private key decryption logic to decrypt an encrypted private key received from a consuming device to produce a private key, and symmetric key decryption logic to receive the private key from the private key decryption logic and to decrypt an encrypted symmetric key received from the consuming device using the private key. The system also includes a dynamic random access memory (DRAM) coupled to the processor. Other embodiments are described and claimed.

    Abstract translation: 在一个实施例中,系统包括处理器,其包括私钥解密逻辑,用于解密从消费设备接收的加密专用密钥以产生私钥,以及对称密钥解密逻辑,用于从私钥解密逻辑接收专用密钥, 使用私钥对从消费设备接收的加密对称密钥进行解密。 该系统还包括耦合到处理器的动态随机存取存储器(DRAM)。 描述和要求保护其他实施例。

    Multi-persona computing based on real time user recognition
    48.
    发明授权
    Multi-persona computing based on real time user recognition 有权
    基于实时用户识别的多人角色计算

    公开(公告)号:US09207945B2

    公开(公告)日:2015-12-08

    申请号:US13630076

    申请日:2012-09-28

    CPC classification number: G06F9/44 G06F9/4451 G06F21/00

    Abstract: A computing device may configure one or more applications on the computing device for a specific user in response to identifying that the specific user is operating the device and may make relevant content available to such applications. The identification of the specific user may be performed using a signal from one or more user identification sensors.

    Abstract translation: 响应于识别特定用户正在操作该设备并且可以使相关内容可用于这样的应用,计算设备可以为特定用户在计算设备上配置一个或多个应用。 可以使用来自一个或多个用户识别传感器的信号来执行特定用户的识别。

    METHODS AND APPARATUS TO SECURELY SHARE DATA
    49.
    发明申请
    METHODS AND APPARATUS TO SECURELY SHARE DATA 有权
    安全分享数据的方法和装置

    公开(公告)号:US20150278531A1

    公开(公告)日:2015-10-01

    申请号:US14230618

    申请日:2014-03-31

    Abstract: Methods and apparatus to securely share data are disclosed. An example includes generating, at a first device of a first user of cloud services, an archive file representative of a drive of the first device; encrypting, via a processor, the archive file to form an encrypted archive file; and conveying the encrypted archive file to a cloud service provider, the encrypted archive file to be decrypted by a second device of a second user of the cloud services, the decrypted archive file to be mounted to an operating system of the second device.

    Abstract translation: 公开了安全地共享数据的方法和装置。 一个示例包括在云服务的第一用户的第一设备处生成代表第一设备的驱动器的归档文件; 通过处理器加密存档文件以形成加密的存档文件; 以及将加密的存档文件传送到云服务提供商,由云服务的第二用户的第二设备解密的加密存档文件,将被安装到第二设备的操作系统的解密归档文件。

    METHODS AND APPARATUS FOR PAIRING ITEMS FOR SECURITY
    50.
    发明申请
    METHODS AND APPARATUS FOR PAIRING ITEMS FOR SECURITY 有权
    配对物品安全的方法和装置

    公开(公告)号:US20150179033A1

    公开(公告)日:2015-06-25

    申请号:US14354486

    申请日:2013-12-23

    Abstract: An item of value comprises an assembly of parts. The parts comprise a component that has value independent of the item, and an assembly security system that is operable to communicate with a central security system via a wide area network. The component comprises a component security system that is operable to communicate with the assembly security system. The assembly security system is operable to perform operations comprising (a) saving component data that identifies the component as part of the item; (b) after saving the component data, monitoring the component, via the component security system, to automatically determine whether the component has left a predetermined zone of proximity, relative to the item; and (c) in response to determining that the component has left the predetermined zone of proximity, automatically notifying the central security system that the component has left the predetermined zone of proximity. Other embodiments are described and claimed.

    Abstract translation: 价值项包括零件的组装。 这些部件包括具有与项目无关的值的组件,以及可操作以经由广域网与中央安全系统通信的组装安全系统。 该组件包括可操作以与组装安全系统通信的组件安全系统。 组装安全系统可操作以执行操作,包括(a)将组件数据保存为项目的一部分; (b)在保存组件数据之后,通过组件安全系统监视组件以自动确定组件是否已经相对于项目已经离开预定的接近区域; 和(c)响应于确定组件已经离开预定的接近区域,自动通知中央安全系统组件已经离开预定的接近区域。 描述和要求保护其他实施例。

Patent Agency Ranking