Technologies for analyzing uniform resource locators

    公开(公告)号:US10218716B2

    公开(公告)日:2019-02-26

    申请号:US15283389

    申请日:2016-10-01

    Abstract: Technologies for analyzing a Uniform Resource Locator (URL) include a multi-stage URL analysis system. The multi-stage URL analysis system analyzes the URL using a multi-stage analysis. In the first stage, the multi-stage URL analysis system analyzes the URL using an ensemble lexical analysis. In the second stage, the multi-stage URL analysis system analyzes the URL based on third-party detection results. In the third stage, the multi-stage URL analysis system analyzes the URL based on metadata related to the URL. The multi-stage URL analysis system advances the stages of analysis if a malicious classification score determined by each stage does not satisfy a confidence threshold. The URL may also be selected for additional rigorous analysis using selection criteria not used in by the analysis stages.

    Preventing pattern recognition in electronic code book encryption

    公开(公告)号:US10110374B2

    公开(公告)日:2018-10-23

    申请号:US15354527

    申请日:2016-11-17

    Abstract: In general, in one aspect, noise is injected into a bitmap associated with content to be presented on a display to create a noisy bitmap. The noisy bitmap is encrypted using electronic code book (ECB) encryption. The resulting ciphertext does not include recognizable patterns from the content as is typical with ECB encryption. The injection of noise may include modifying pixel values for at least a subset of pixels in the bitmap. The pixel values may be modified by using a counter, a known modification pattern, or a random number generator. The bitmap may be analyzed to determine how the bitmap can be modified to maximize the randomness of the bitmap while ensuring that the noisy bitmap is visually perceptually similar when presented. The noise may be injected into a block of pixels prior to the block being encrypted.

    Technologies for performing orientation-independent bioimpedance-based user authentication

    公开(公告)号:US09934372B1

    公开(公告)日:2018-04-03

    申请号:US15476995

    申请日:2017-04-01

    CPC classification number: G06F21/32 A61B5/0024 A61B5/0536 A61B5/117 A61B5/6803

    Abstract: Technologies for performing orientation-independent bioimpedance-based user authentication include a compute device. The compute device includes a plurality of electrodes usable to transmit an alternating current and measure a bioimpedance in a section of the body of a user. The compute device is to transmit, with a pair of the electrodes, an alternating current through the section of the body of the user, measure, with a pair of the electrodes, a bioimpedance of the section of the body to the transmitted alternating current, generate a tomographic image as a function of the measured bioimpedance, identify a position of a fiduciary marker in the tomographic image, rotate the tomographic image to a predefined orientation as a function of the position of the fiduciary marker, extract one or more biometric features from the rotated tomographic image, and perform authentication of the user as a function of the extracted one or more biometric features.

    Continuous authentication confidence module

    公开(公告)号:US09871779B2

    公开(公告)日:2018-01-16

    申请号:US14838731

    申请日:2015-08-28

    Abstract: Generally, this disclosure describes a continuous authentication confidence module. A system may include user device including processor circuitry configured to determine presence data; a confidence factor including at least one of a sensor configured to capture sensor input and a system monitoring module configured to monitor activity of the user device; memory configured to store a confidence score and an operating system; and a continuous authentication confidence module configured to determine the confidence score in response to an initial authentication of a specific user, update the confidence score based, at least in part, an expectation of user presence and/or selected presence data, and notify the operating system that the authentication is no longer valid if the updated confidence score is within a tolerance of a session close threshold; the initial authentication configured to open a session, the confidence score configured to indicate a current strength of authentication during the session.

    Technologies for secure storage and use of biometric authentication information

    公开(公告)号:US09628478B2

    公开(公告)日:2017-04-18

    申请号:US14812514

    申请日:2015-07-29

    CPC classification number: H04L63/06 G06F21/32 G06F21/62 G06F21/78 H04L63/0861

    Abstract: Generally, this disclosure describes technologies for securely storing and using biometric authentication information, such as biometric reference templates. In some embodiments, the technologies include a client device that stores one or more biometric reference templates in a memory thereof. The client device may transfer such templates to an authentication device. The transfer may be conditioned on verification that the authentication device includes a suitable protected environment for the templates and will execute an acceptable temporary storage policy. The technologies may also include an authentication device that is configured to temporarily store biometric reference templates received from a client device in a protected environment thereof. Upon completion of biometric authentication or the occurrence of a termination event, the authentication devices may delete the biometric reference templates from the protected environment.

    Preventing Pattern Recognition in Electronic Code Book Encryption
    57.
    发明申请
    Preventing Pattern Recognition in Electronic Code Book Encryption 审中-公开
    防止电子代码加密中的模式识别

    公开(公告)号:US20170070342A1

    公开(公告)日:2017-03-09

    申请号:US15354527

    申请日:2016-11-17

    Abstract: In general, in one aspect, noise is injected into a bitmap associated with content to be presented on a display to create a noisy bitmap. The noisy bitmap is encrypted using electronic code book (ECB) encryption. The resulting ciphertext does not include recognizable patterns from the content as is typical with ECB encryption. The injection of noise may include modifying pixel values for at least a subset of pixels in the bitmap. The pixel values may be modified by using a counter, a known modification pattern, or a random number generator. The bitmap may be analyzed to determine how the bitmap can be modified to maximize the randomness of the bitmap while ensuring that the noisy bitmap is visually perceptually similar when presented. The noise may be injected into a block of pixels prior to the block being encrypted.

    Abstract translation: 通常,在一个方面,将噪声注入到与将要呈现在显示器上的内容相关联的位图中以产生噪声位图。 噪声位图使用电子代码簿(ECB)加密进行加密。 所得到的密文不包括来自内容的可识别模式,如ECB加密典型。 噪声的注入可以包括修改位图中的至少像素子集的像素值。 可以通过使用计数器,已知修改模式或随机数生成器来修改像素值。 可以分析位图以确定如何修改位图以最大化位图的随机性,同时确保在呈现时视觉上感觉上类似的噪声位图。 在块被加密之前,可以将噪声注入到像素块中。

    MECHANISM FOR FACILITATING DYNAMIC CONTEXT-BASED ACCESS CONTROL OF RESOURCES
    58.
    发明申请
    MECHANISM FOR FACILITATING DYNAMIC CONTEXT-BASED ACCESS CONTROL OF RESOURCES 审中-公开
    促进动态基于上下文的资源访问控制机制

    公开(公告)号:US20170012983A1

    公开(公告)日:2017-01-12

    申请号:US15098524

    申请日:2016-04-14

    Abstract: A mechanism is described for facilitating context-based access control of resources for according to one embodiment. A method of embodiments, as described herein, includes receiving a first request to access a resource of a plurality of resources. The first request may be associated with one or more contexts corresponding to a user placing the first request at a computing device. The method may further include evaluating the one or more contexts. The evaluation of the one or more contexts may include matching the one or more contexts with one or more access policies associated with the requested resource. The method may further include accepting the first request if the one or more contexts satisfy at least one of the access policies.

    Abstract translation: 描述了一种用于促进根据一个实施例的资源的基于上下文的访问控制的机制。 如本文所述的实施例的方法包括接收访问多个资源的资源的第一请求。 第一请求可以与对应于在计算设备处放置第一请求的用户相关联的一个或多个上下文相关联。 该方法还可以包括评估一个或多个上下文。 一个或多个上下文的评估可以包括将一个或多个上下文与与所请求的资源相关联的一个或多个访问策略进行匹配。 该方法还可以包括:如果一个或多个上下文满足访问策略中的至少一个,则接受第一请求。

    Method and system for smart door directionality detection
    59.
    发明申请
    Method and system for smart door directionality detection 审中-公开
    智能门方向性检测方法与系统

    公开(公告)号:US20160066254A1

    公开(公告)日:2016-03-03

    申请号:US14594719

    申请日:2015-01-12

    Abstract: Disclosed herein are directionality detection techniques for smart door locks. According to various such techniques, a smart door lock may be configured to transmit an inside chirp on a private side of a door and an outside chirp on a public side of the door. The inside and outside chirps may comprise wireless signals of a type that typically does not penetrate walls, doors, and/or other barriers. In some embodiments, such directionality detection techniques may be utilized in combination with device discovery procedures performed according to a low-power wireless discovery protocol such as Bluetooth® Low Energy (BLE) or Neighbor Awareness Networking (NAN).

    Abstract translation: 这里公开了用于智能门锁的方向性检测技术。 根据各种这样的技术,智能门锁可以被配置为在门的私人侧上传送内部啁啾和在门的公共侧上的外部啁啾声。 内部和外部啁啾可以包括通常不穿透墙壁,门和/或其他障碍物的类型的无线信号。 在一些实施例中,这种方向性检测技术可以与根据低功率无线发现协议(例如蓝牙低能耗(BLE)或邻近意识网络(NAN))执行的设备发现过程结合使用。

    Technologies for secure storage and use of biometric authentication information
    60.
    发明授权
    Technologies for secure storage and use of biometric authentication information 有权
    用于安全存储和使用生物特征认证信息的技术

    公开(公告)号:US09137247B2

    公开(公告)日:2015-09-15

    申请号:US13995247

    申请日:2013-03-15

    CPC classification number: H04L63/06 G06F21/32 G06F21/62 G06F21/78 H04L63/0861

    Abstract: Generally, this disclosure describes technologies for securely storing and using biometric authentication information, such as biometric reference templates. In some embodiments, the technologies include a client device that stores one or more biometric reference templates in a memory thereof. The client device may transfer such templates to an authentication device. The transfer may be conditioned on verification that the authentication device includes a suitable protected environment for the templates and will execute an acceptable temporary storage policy. The technologies may also include an authentication device that is configured to temporarily store biometric reference templates received from a client device in a protected environment thereof. Upon completion of biometric authentication or the occurrence of a termination event, the authentication devices may delete the biometric reference templates from the protected environment.

    Abstract translation: 通常,本公开描述了用于安全地存储和使用生物测定认证信息(诸如生物测定参考模板)的技术。 在一些实施例中,技术包括将一个或多个生物测定参考模板存储在其存储器中的客户端设备。 客户端设备可以将这样的模板传送到认证设备。 传输可以根据认证设备包括用于模板的合适的受保护环境并将执行可接受的临时存储策略的验证。 这些技术还可以包括认证设备,其被配置为在其受保护的环境中临时存储从客户端设备接收的生物测定参考模板。 在完成生物认证或发生终止事件时,认证设备可以从受保护的环境中删除生物测定参考模板。

Patent Agency Ranking