Abstract:
A technique for determining the safety of the content of beacon transmissions. A user device extracts beacon identification information from a beacon transmission. The user device queries the beacon registry to obtain the targeted content. The user device provides the targeted content and beacon identification information to a validation service. The validation service evaluates the targeted content and the beacon identification information for safety. The validation service determines a score based on that evaluation and sends the score to the user device. The user device alerts the user or performs background actions such as suppression of transmission of beacon contextual data to other apps on user device based on the score.
Abstract:
Protecting personally identifiable information data collected and/or stored in physical objects with embedded electronic devices by performing at least the following: obtaining a plurality of personally identifiable information algorithms for a plurality of electronic user devices, determining a relevant personally identifiable information algorithm from the plurality of personally identifiable information algorithms, executing the relevant personally identifiable information algorithm over the relevant personally identifiable information from one of the electronic user devices to construct a personally identifiable information data result, and transmitting the personally identifiable information data result without transmitting the relevant personally identifiable information to a remote computing system.
Abstract:
Technologies for authenticating a user and a mobile computing device of the user at an authentication computing device include generating, at the authentication computing device, a multi-factor authentication credential that includes a text-based credential and a plurality of biometric authentication factors corresponding to the user. The mobile computing device is configured to detect whether the authentication computing device is within proximity of the mobile computing device and establish a secure communication channel therebetween. The mobile computing device is further configured to securely store the multi-factor authentication credential received from the authentication computing device. The authentication computing device is configured to receive the multi-factor authentication credential from the mobile computing device and analyze the received multi-factor authentication credential to determine whether the user is an authorized user of the authentication computing device and take an action based on a result of the analysis. Other embodiments are described and claimed.
Abstract:
Methods, devices, systems, and non-transitory process-readable storage media manage unwanted tracking by evaluating conditions encountered by a browser application during sessions with websites. Embodiment methods performed by a processor of a computing device may include operations for identifying predefined browsing execution conditions encountered by the computing device during a session with a website, determining whether unwanted tracking of the computing device likely exists based on the identified predefined browsing execution conditions, and performing a corrective action in response to determining that the unwanted tracking of the computing device likely exists based on the identified predefined browsing execution conditions. Embodiment methods may also include operations for identifying a type of condition for each of the predefined browsing execution conditions and determining whether a number of each type of condition exceeds a predefined threshold for each type of condition for the session.
Abstract:
The disclosure relates to a system, devices and methods for distributing and using a communication scheme for way to enable secure communication between communication nodes in a network. A method comprises determining (S1), in the network node, a set of available IP addresses and a set of ports, dividing (S2), in the network node, a time frame in time slots, associating (S3), in the network node, each time slot with an IP address, with a port associated with the IP address and with a unique cryptographic key, distributing (S4), from the network node, the communication scheme to the communication node, receiving (S100), in the communication node, the communication scheme and communicating (S300), in the communication node, with another communication node in possession of a corresponding communication scheme by hopping between the IP addresses and ports according to the communication scheme and encrypting the communication using the unique cryptographic key.
Abstract:
In an example, a client-server platform identity architecture is disclosed. The platform identity architecture may be used to enable a venue operator to provide online services and to collect telemetry data and metrics while giving end users greater control over privacy. When entering a compatible venue, the user's device generates a signed temporary pseudonymous identity (TPI) in secure hardware or software. Any telemetry uploaded to the venue server includes the signature so that the server can verify that the data are valid. The TPI may have a built-in expiry. The venue server may thus receive useful tracking data during the term of the TPI, while the user is assured that the data are not kept permanently or correlated to personally-identifying information.
Abstract:
A system and method for providing secure, end-to-end data service enabling real-time data over the Internet is disclosed. The system and method provides a communication framework between sensors, devices, and machinery and the users of that data from any remote location that is connected to the Internet without requiring open inbound firewall ports, while at the same time enabling high data rates, low latency and full bi-directionality. The graphical and networking features of RIA frameworks in combination with the disclosed system and method provide low-latency, real-time data applications in a web browser securely over the Internet.
Abstract:
A gateway device for implementing data security is described herein. The gateway device is coupled between a client device and a server device, and generates a mapping between portions of data received from a client device and interface fields or data elements of the client device. Upon receiving subsequent data from the client device, the gateway device can access the generated mapping to identify portions of the subsequent data corresponding to particular interface fields or data elements of the client device using the mapping, and can encode the identified portions of the subsequent data, for instance based on data protection techniques defined by a security policy. The encoded data can then be outputted by the gateway device to the server device.
Abstract:
Embodiments of computer-implemented methods, systems, and non-transitory computer-readable medium having one or more computer programs stored therein are provided to transfer contents of transactional database records associated with a data historian between two or more networks configured to have different levels of network protection. Generated data barcodes can be decoded to produce contents of transactional database records to be transmitted between two or more networks having different levels of network security protection. Decoded contents of the transactional database records can then be securely communicated back to the sender for comparison by generating validation barcodes to be decoded by the sender. Generated verification barcodes can then be decoded to produce verification data. Verification data can confirm success of the transmission of contents of transactional database records encoded in the data barcodes. Decoded contents of transactional database records can then be stored responsive to an indication of successful transmission.