Abstract:
A method for secure data entry on an interface, the method comprising: receiving (100) a position of an interaction with the interface; determining (101) whether secure data is present in an area around the position; assessing (102) a number of interactions, n previous to the current interaction for secure data; and if secure data is present in the area and n interactions preceding the user interaction comprises secure data, asserting (104) that the user interaction comprises a security threat.
Abstract:
Features are described for efficiently and accurately identifying a user of an electronic device with limited user interaction. The features include receiving a mobile device identifier from the mobile device. The features include transmitting the mobile device identifier to a service provider associated with the mobile device. The features include receiving information identifying the user from the service provider. The features include identifying a set of candidates associated with at least a portion of the information. The features include generating a metric for the candidates included in the set of candidates. An individual metric indicates a degree of relatedness between a value for the user for the at least one data field and a value for a candidate for the at least one data field. The features include identifying the user as a specific candidate included in the set of candidates based on the metric corresponding to a threshold.
Abstract:
Systems and methods are presented for generating intelligence data related to at least one of a group comprising internet Protocol (IP) addresses, email addresses, domain names, commercial mail receiving agencies, device identifiers, and user system activity, and storing the intelligence data. Systems and methods are further presented for receiving a registration request message from a user via a computing device, comprising identifying information for the user and identifying information for the computing device, analyzing the registration request message to determine whether the identifying information for the user and the identifying information for the computing device, is associated with any data included in the intelligence data, and sending a registration response message indicating whether or not the user is registered, based on determining whether the identifying information for the user and the identifying information for the computing device, is associated, with any data included in the intelligence data.
Abstract:
The invention is a system and method of sensor profiling and identity modeling of IoT resources in IoT systems that are used in different industry verticals. The system is configured to carry out sensor profiling for the IoT Resources and such sensor profiling is deployed in the IoT systems associated with various industry verticals to identify the IoT Resources and their state. Further, the system is configured to associate and map each IoT Resource with a unique identity and such mapping helps in identifying a unique resource in an IoT system associated with the particular industry vertical. Such sensor profiling and identity modeling of IoT Resources can uniquely identify a Resource in an IoT system associated with a particular industry vertical and monitor the behavior of the IoT Resource.
Abstract:
The present invention relates to a portable electronic device and corresponding method allowing control of a remotely positioned electronic arrangement, allowing for improved user convenience and security improvements when combining gesture identification with fingerprint authentication.
Abstract:
An example system includes a location signature engine to determine a location signature based on a location of a user. The system also includes a signature comparison engine to determine whether the location signature matches a known signature. The system also includes a location determination engine to prompt the user for the location of the user based on the location signature not matching the known signature. The location determination engine also is to determine whether a user indication of the location is accurate.
Abstract:
A method for authenticating a user. The method includes the act of recording first data about an environment at a first time. A user interaction with the environment is stored as a stored password. Second data about the environment is received through an image sensor at a second time. While receiving the second data about the environment, a password is entered. The entered password is compared with the stored password.
Abstract:
In an example, there is disclosed a computing apparatus, comprising: a psychological state data interface to receive psychological state data; one or more logic elements, including at least one hardware element, comprising a verification engine to: receive a requested user action; receive a psychological state input via the psychological state data interface; analyze the psychological state input; and bar the requested user action at least partly responsive to the analyzing.
Abstract:
Techniques for securing a computing device are provided. An example method detecting contact with a touchscreen of the computing device, monitoring the contact with the touchscreen to determine whether the contact matches a predetermined pattern of movement, and performing one or more predetermined actions responsive to the contact with the touchscreen matching the predetermined pattern. The predetermined pattern includes a plurality of predetermined movements separated by pivot points. The pivot points represent a transition point in the predetermined pattern from a first type of movement to a second type of movement. The contact with the touchscreen can be broken at one or more of at least one pivot point, between a first instance of the first type of movement and a second instance of the first type of movement, or between a first instance of the second type of movement and a second instance of the second type of movement.