METHODS AND APPARATUS TO MANAGE PASSWORD SECURITY

    公开(公告)号:US20170187697A1

    公开(公告)日:2017-06-29

    申请号:US15397224

    申请日:2017-01-03

    Abstract: Methods, apparatus, systems and articles of manufacture are disclosed to manage password security. An example apparatus includes a password field identifier to: monitor a computing device to detect entry of password information for web services, the password field identifier to identify when the password information for a first one of the web services is new or is changing. When the password information is new or is changing, capture the entered password associated with the first one of the web services. The example apparatus further includes a password linkage monitor to store a hash value of the captured password in a password vault and associate the stored hash value of the captured password with the first one of the web services.

    Protection system including machine learning snapshot evaluation

    公开(公告)号:US09613196B2

    公开(公告)日:2017-04-04

    申请号:US14360333

    申请日:2013-12-19

    Abstract: This disclosure is directed to a protection system including machine learning snapshot evaluation. A device may comprise a machine learning engine (MLE) to generate snapshots of device operation. The MLE may use active or planned operations in the snapshot to learn user behavior. Once normal user behavior is established for the device, the MLE may be able to determine when snapshots include unusual behavior that may signify a threat to the device. Snapshots determined to include unusual behavior may be transmitted to a remote resource for evaluation. The remote resource may include at least a user behavior classification engine (UBCE) to classify the user behavior by characterizing it as at least one type of use. The snapshot may be analyzed by the UBCE to determine if potential threats exist in the device, and the threat analysis may be provided to the device for evaluation and/or corrective action.

    Methods and apparatus to manage password security
    55.
    发明授权
    Methods and apparatus to manage password security 有权
    管理密码安全的方法和设备

    公开(公告)号:US09563768B2

    公开(公告)日:2017-02-07

    申请号:US14359437

    申请日:2013-11-25

    Abstract: Methods, apparatus, systems and articles of manufacture are disclosed to manage password security. An example apparatus includes an alarm action engine to invoke a provisional transmission block in response to detecting entry of a candidate password, a password linkage monitor to retrieve a list of password hash values associated with previously used passwords, and to compare the list of password hash values to a hash of the candidate password, the alarm action engine to invoke a permanent block of the candidate password when a match condition occurs between the hash of the candidate password and a hash of one of the list of password hash values.

    Abstract translation: 公开了方法,装置,系统和制品以管理密码安全。 示例性装置包括响应于检测到候选密码的输入而调用临时传输块的警报动作引擎,密码链接监视器以检索与先前使用的密码相关联的密码哈希值的列表,并且比较密码散列表 值作为候选密码的散列,当候选密码的散列和密码散列值列表的散列之间发生匹配条件时,报警动作引擎调用候选密码的永久块。

    Technologies for determining a threat assessment based on fear responses
    56.
    发明授权
    Technologies for determining a threat assessment based on fear responses 有权
    基于恐惧反应确定威胁评估的技术

    公开(公告)号:US09547971B2

    公开(公告)日:2017-01-17

    申请号:US14583695

    申请日:2014-12-27

    Abstract: Technologies for determining a threat assessment based on fear responses comprises monitoring sensor data received from a sensor array located at a monitored site. The sensor data may include behavioral sensor data indicative of a physical behavior of individuals within the monitored site and physiological sensor data indicative of physiological characteristics of individuals within the monitored site. The threat assessment may be based on the behavioral sensor data and physiological sensor data. In some embodiments, context data related to the monitored site may be utilized analyze the behavioral sensor data and physiological sensor data and determine a threat assessment based thereon.

    Abstract translation: 基于恐惧响应来确定威胁评估的技术包括监测从位于被监视站点的传感器阵列接收到的传感器数据。 传感器数据可以包括指示被监测位点内的个体的物理行为的行为传感器数据和指示被监测位点内的个体的生理特性的生理传感器数据。 威胁评估可以基于行为传感器数据和生理传感器数据。 在一些实施例中,可以利用与所监视的站点相关的上下文数据来分析行为传感器数据和生理传感器数据,并基于此来确定威胁评估。

    SECURITY DATA AGGREGATION AND BUSINESS INTELLIGENCE FOR WEB APPLICATIONS
    57.
    发明申请
    SECURITY DATA AGGREGATION AND BUSINESS INTELLIGENCE FOR WEB APPLICATIONS 审中-公开
    WEB应用程序的安全数据聚合和业务智能

    公开(公告)号:US20160226906A1

    公开(公告)日:2016-08-04

    申请号:US14968178

    申请日:2015-12-14

    CPC classification number: H04L63/1433 G06F21/51 H04L67/02

    Abstract: Systems and methods may provide for detecting a browser request for web content. Additionally, interaction information associated with a plurality of sources may be determined in response to the browser request, and a risk profile may be generated based on the interaction. The risk profile may include at least a portion of the interaction information as well as recommended control actions to mitigate the identified risk. In one example, the risk profile is presented to a user associated with the browser request as well as to a security control module associated with the platform.

    Abstract translation: 系统和方法可以提供用于检测对web内容的浏览器请求。 此外,可以响应于浏览器请求来确定与多个源相关联的交互信息,并且可以基于交互来生成风险简档。 风险简档可以包括交互信息的至少一部分以及推荐的控制动作以减轻所识别的风险。 在一个示例中,将风险简档呈现给与浏览器请求相关联的用户以及与该平台相关联的安全控制模块。

    PERFORMING AUTHENTICATION BASED ON USER SHAPE MANIPULATION
    58.
    发明申请
    PERFORMING AUTHENTICATION BASED ON USER SHAPE MANIPULATION 有权
    基于用户形状处理执行认证

    公开(公告)号:US20160162677A1

    公开(公告)日:2016-06-09

    申请号:US14561410

    申请日:2014-12-05

    CPC classification number: G06F21/36 G06F3/0484 G06F3/0488

    Abstract: In one embodiment, an apparatus comprises: a first logic to receive a user selection of an authentication shape, the authentication shape to be displayed on a display of a system during a user authentication, associate at least one identity characteristic with each of a plurality of sides of the authentication shape, and receive a plurality of user indications each corresponding to a manipulation of the authentication shape to enable one of the plurality of sides of the authentication shape to be a prominent side of the authentication shape on the display; an encoding logic to encode an identification of the authentication shape, the at least one identity characteristic associated with each of the plurality of sides, and the plurality of user indications into an encoded value; a security logic to generate a secure authentication value based on the encoded value; and a secure storage to store the secure authentication value. Other embodiments are described and claimed.

    Abstract translation: 在一个实施例中,一种装置包括:第一逻辑,用于接收认证形状的用户选择,在用户认证期间要显示在系统的显示器上的认证形状,将至少一个身份特征与多个 并且接收多个用户指示,每个对应于认证形状的操纵,使认证形状的多个侧面中的一个成为认证形状的显示侧; 编码逻辑,用于对所述认证形状的识别,与所述多个侧中的每一个相关联的所述至少一个身份特征以及所述多个用户指示进行编码; 用于基于编码值生成安全认证值的安全逻辑; 以及用于存储安全认证值的安全存储。 描述和要求保护其他实施例。

    CONTEXTUAL APPLICATION MANAGEMENT
    59.
    发明申请
    CONTEXTUAL APPLICATION MANAGEMENT 审中-公开
    背景应用管理

    公开(公告)号:US20160085763A1

    公开(公告)日:2016-03-24

    申请号:US14495274

    申请日:2014-09-24

    CPC classification number: H04L67/10 G06F8/62 H04L67/22

    Abstract: Technologies are presented that optimize application management on a computing device through contextual application archival and retrieval. A method of managing applications may include: learning contextual relevancy of one or more applications installed on a computing device to a user of the device and determining whether an application is no longer contextually relevant to the user. If the application is no longer contextually relevant, the device may send a request to an application management service to obtain and/or maintain the application; create a placeholder for the application at the device; and remove the application from the device. The device may monitor contextual inputs for relevancy of the archived application. If contextual relevancy is determined, the device may send a request to the service to provide the archived application or a replacement of the archived application to the device; receive the requested application; install the requested application; and remove the placeholder.

    Abstract translation: 提出了通过上下文应用程序归档和检索来优化计算设备上的应用程序管理的技术。 管理应用的方法可以包括:将安装在计算设备上的一个或多个应用的​​内容相关性学习到设备的用户并且确定应用是否不再与用户上下文相关。 如果应用程序不再具有内容相关性,则设备可以向应用管理服务发送请求以获得和/或维护应用; 在设备上创建应用程序的占位符; 并从设备中删除应用程序。 该设备可以监视与归档应用程序的相关性的上下文输入。 如果确定了上下文相关性,则设备可以向服务发送请求以提供归档的应用或将该归档的应用替换到该设备; 接收请求的应用程序; 安装请求的应用程序; 并删除占位符。

    Dynamically implementing an image protection policy
    60.
    发明授权
    Dynamically implementing an image protection policy 有权
    动态实施图像保护政策

    公开(公告)号:US09094700B2

    公开(公告)日:2015-07-28

    申请号:US13997778

    申请日:2013-03-14

    Abstract: Technologies for dynamically implementing an image protection policy include a camera device with a camera to capture an image of at least one person. The camera device determines a location in the image of at least one person in the image, determines a location of at least one personal computing device, and maps the personal computing devices to the persons captured in the image based on the determined device and image locations. The camera device may broadcast an announcement of the creation of the image to the personal computing devices, negotiate an image protection policy with each of the personal computing devices, and implement the negotiated image protection policy.

    Abstract translation: 用于动态实施图像保护策略的技术包括具有相机以捕获至少一个人的图像的相机设备。 相机设备确定图像中的至少一个人的图像中的位置,确定至少一个个人计算设备的位置,并且基于所确定的设备和图像位置将个人计算设备映射到图像中捕获的人物 。 相机设备可以向个人计算设备广播创建图像的通知,与每个个人计算设备协商图像保护策略,并且实现协商的图像保护策略。

Patent Agency Ranking