Abstract:
PROBLEM TO BE SOLVED: To provide a method and device for managing security events effectively. SOLUTION: The method includes a step of establishing a security event manager on a mobile computing device, a step of retrieving security policy data with the security event manager, the security policy data defining a security event rule set for determining the occurrence of a security event, a step of receiving security event data with the security event manager, the security event data being generated from at least one security event source of the mobile computing device, a step of determining an occurrence of a security event with the security event manager based on the security event data and the security policy data, and a step of responding to the security event with the security event manager. COPYRIGHT: (C)2011,JPO&INPIT
Abstract:
PROBLEM TO BE SOLVED: To attain an authentication method for performing authentication and authorization of a privilege by tracking a dynamic location, route or trajectory of a person or device within a specific environment. SOLUTION: An authentication system authenticates a device by detecting the trajectory of the device within a physical environment. The device includes a wireless transmitter that communicates with sensors distributed throughout the environment. As the device moves throughout the environment, the sensors send location information to an authentication system. The authentication system tracks the trajectory or dynamic location of the device and authenticates the device based on whether the observed trajectory of the device conforms with a predicted trajectory or behavior. COPYRIGHT: (C)2011,JPO&INPIT
Abstract:
PROBLEM TO BE SOLVED: To provide techniques of enhancing biometric security of a computer system.SOLUTION: In one embodiment, a method includes: receiving an ordered sequence of biometric inputs from a user via a biometric sensor; determining if each in the ordered sequence matches a corresponding entry stored in a table that includes a stored ordered sequence of biometric inputs corresponding to a password pattern of the user; and if they match, enabling the user to access the processing system, and otherwise preventing the user from accessing the processing system. Other embodiments are described and claimed.
Abstract:
PROBLEM TO BE SOLVED: To provide a method and a device for controlling use of context information of a user. SOLUTION: A method and a device for controlling the use of context information of a user includes establishing a context policy enforcement engine on a mobile computing device. The context policy enforcement engine may be embodied as software and/or hardware components. The context policy enforcement engine retrieves context policy data in response to reception of a request for context information related to a user. The context policy data define a set of context rules for responding to context requests. The context policy enforcement engine responds to the request based on the set of context rules. COPYRIGHT: (C)2011,JPO&INPIT
Abstract:
PROBLEM TO BE SOLVED: To provide a method for exchanging strong encryption keys between devices using alternate input methods. SOLUTION: At least two devices that want to communicate with one another are set in key exchange mode. The at least two devices are to communicate with one another using a short range radio or personal area network. The at least two devices negotiate with one another to determine which of the at least two devices will generate an encryption key, wherein device A represents the negotiated device and device B represents the non-negotiated device. Device A generates the encryption key and transmits the encryption key to device B using an out-of-band transmission channel. The out-of-band transmission channel may be transmitting the encryption key via audio tones. A validation process determines whether the transmission of the encryption key via the out-of-band transmission channel was successful. If the encryption key has been successfully validated, the at least two devices are enabled to automatically accept communications between them over the short range radio or personal area network. COPYRIGHT: (C)2008,JPO&INPIT
Abstract:
A method, apparatus and system enable access control and intrusion detection on encrypted data. Specifically, application data on a node may be routed to a partition on the host. The partition may utilize Direct Memory Access ("DMA") to access session key stored in a host OS. The partition may thereafter utilize the session key to perform intrusion detection on encrypted data from the application.
Abstract:
Technologien zum Steuern des Abbaus eines Sensormotes einschließlich Erfassens eines Auslöseereignisses und Initiieren des Abbaus von wenigstens einem Teil des Sensormotes als Reaktion auf das Auslöseereignis. Das Auslöseereignis kann als ein vom Sensormote erfassbares Ereignis beliebiger Art verkörpert sein, wie z. B. als Auslösesignal, bestimmte abgetastete Daten, Ablauf einer Bezugszeitdauer, Abschluss einer Aufgabe und so weiter. Der Sensormote kann den Abbau initiieren, zum Beispiel durch Steuern eines Ventils zum Freigeben einer im Sensormote gespeicherten Chemikalie oder zum Gelangenlassen einer Substanz in den Sensormote.
Abstract:
Die Techniken zum Managen von Sensorkonflikten in einem Computersystem enthalten das Bestimmen einer Implikation der durch zwei oder mehr Sensoren des Computersystems abgetasteten Reize und das Bestimmen, ob zwischen den bestimmten Implikationen ein Konflikt vorhanden ist. Falls ein Konflikt vorhanden ist, wird ein Betrag der Unannehmlichkeit auf die Computervorrichtung angewendet. Es kann z. B. eine Leistungseigenschaft der Computervorrichtung basierend auf dem bestimmten Konflikt ungünstig beeinflusst werden. In einigen Ausführungsformen basiert das Niveau der angewendeten Unannehmlichkeit auf einer Größe, einer Wichtigkeit und/oder einer Dauer des Implikationskonflikts.
Abstract:
Die Techniken zum Managen von Sensoranomalien in einem Computersystem enthalten das Bestimmen basierend auf den Sensordaten von einem weiteren Sensor und einer Korrelationsregel, ob die von einem ersten Sensor empfangenen Sensordaten anomal sind. Die Korrelationsregel definiert eine erwartete Korrelation zwischen den ersten Sensordaten und den zweiten Sensordaten. Falls die Korrelation zwischen den ersten Sensordaten und den zweiten Sensordaten nicht beobachtet wird, können die ersten Sensordaten für anomal gehalten werden. Wenn ja, können die ersten Sensordaten unter Verwendung eines weiteren Sensors oder einer anderen Korrelation verifiziert werden. Falls bestimmt wird, dass der erste Sensor schlecht funktioniert, kann das Computersystem den Verlust des ersten Sensors unter Verwendung eines weiteren Sensors an seiner Stelle abschwächen.
Abstract:
Apparatuses, methods and storage medium associated with provision and receipt of virtual sensor service, are disclosed. In embodiments, an apparatus may comprise a virtual sensor server configured to provide virtual sensor service to one or more mobile client devices to virtualize one or more sensors of each of the one or more mobile client devices. Virtualization of the one or more sensors of each of the one or more mobile client devices may comprise provision of sensor data to each of the one or more mobile client devices, or reporting of sensor data to one or more recipients external to the one or more mobile client devices on behalf of respective one or ones of the one or more mobile client devices. The provision or the reporting supersedes the corresponding sensor on the respective one or more of the mobile client devices. Other embodiments may be described and/or claimed.