Method and device for managing security events
    1.
    发明专利
    Method and device for managing security events 有权
    用于管理安全事件的方法和设备

    公开(公告)号:JP2011138505A

    公开(公告)日:2011-07-14

    申请号:JP2010282624

    申请日:2010-12-20

    CPC classification number: H04L63/1416 G06F21/554 H04L67/04

    Abstract: PROBLEM TO BE SOLVED: To provide a method and device for managing security events effectively. SOLUTION: The method includes a step of establishing a security event manager on a mobile computing device, a step of retrieving security policy data with the security event manager, the security policy data defining a security event rule set for determining the occurrence of a security event, a step of receiving security event data with the security event manager, the security event data being generated from at least one security event source of the mobile computing device, a step of determining an occurrence of a security event with the security event manager based on the security event data and the security policy data, and a step of responding to the security event with the security event manager. COPYRIGHT: (C)2011,JPO&INPIT

    Abstract translation: 要解决的问题:提供有效管理安全事件的方法和设备。 解决方案:该方法包括在移动计算设备上建立安全事件管理器的步骤,利用安全事件管理器检索安全策略数据的步骤,定义安全事件规则集的安全策略数据,用于确定安全事件管理器的发生 安全事件,与安全事件管理器接收安全事件数据的步骤,从移动计算设备的至少一个安全事件源产生安全事件数据;确定安全事件的发生的步骤 基于安全事件数据和安全策略数据的管理器,以及利用安全事件管理器响应安全事件的步骤。 版权所有(C)2011,JPO&INPIT

    Authentication based on trajectory
    2.
    发明专利
    Authentication based on trajectory 有权
    基于TRAJECTORY的认证

    公开(公告)号:JP2011138488A

    公开(公告)日:2011-07-14

    申请号:JP2010255318

    申请日:2010-11-15

    CPC classification number: G06F21/30 G06F2221/2111 G07C9/00111

    Abstract: PROBLEM TO BE SOLVED: To attain an authentication method for performing authentication and authorization of a privilege by tracking a dynamic location, route or trajectory of a person or device within a specific environment. SOLUTION: An authentication system authenticates a device by detecting the trajectory of the device within a physical environment. The device includes a wireless transmitter that communicates with sensors distributed throughout the environment. As the device moves throughout the environment, the sensors send location information to an authentication system. The authentication system tracks the trajectory or dynamic location of the device and authenticates the device based on whether the observed trajectory of the device conforms with a predicted trajectory or behavior. COPYRIGHT: (C)2011,JPO&INPIT

    Abstract translation: 要解决的问题:通过跟踪特定环境内的人或设备的动态位置,路线或轨迹来获得用于执行特权的认证和授权的认证方法。 解决方案:认证系统通过在物理环境中检测设备的轨迹来认证设备。 该设备包括与分布在整个环境中的传感器进行通信的无线发射器。 随着设备在整个环境中移动,传感器将位置信息发送到认证系统。 认证系统跟踪设备的轨迹或动态位置,并根据设备的观测轨迹是否符合预测的轨迹或行为来认证设备。 版权所有(C)2011,JPO&INPIT

    Enhancing biometric security of system
    3.
    发明专利
    Enhancing biometric security of system 有权
    增强系统的生物安全性

    公开(公告)号:JP2014026661A

    公开(公告)日:2014-02-06

    申请号:JP2013190449

    申请日:2013-09-13

    Abstract: PROBLEM TO BE SOLVED: To provide techniques of enhancing biometric security of a computer system.SOLUTION: In one embodiment, a method includes: receiving an ordered sequence of biometric inputs from a user via a biometric sensor; determining if each in the ordered sequence matches a corresponding entry stored in a table that includes a stored ordered sequence of biometric inputs corresponding to a password pattern of the user; and if they match, enabling the user to access the processing system, and otherwise preventing the user from accessing the processing system. Other embodiments are described and claimed.

    Abstract translation: 要解决的问题:提供增强计算机系统的生物测定安全性的技术。解决方案:在一个实施例中,一种方法包括:经由生物测定传感器从用户接收生物测定输入的有序序列; 确定所述有序序列中的每一个是否与存储在表中的对应条目匹配,所述对应条目包括与用户的密码模式相对应的存储的生物测定输入的有序序列; 并且如果它们匹配,则使得用户能够访问处理系统,否则阻止用户访问处理系统。 描述和要求保护其他实施例。

    Method and device for controlling use of context information of user
    4.
    发明专利
    Method and device for controlling use of context information of user 审中-公开
    用于控制用户上下文信息的方法和设备

    公开(公告)号:JP2011071978A

    公开(公告)日:2011-04-07

    申请号:JP2010206462

    申请日:2010-09-15

    CPC classification number: H04M1/72569 H04M2250/10 H04M2250/12

    Abstract: PROBLEM TO BE SOLVED: To provide a method and a device for controlling use of context information of a user. SOLUTION: A method and a device for controlling the use of context information of a user includes establishing a context policy enforcement engine on a mobile computing device. The context policy enforcement engine may be embodied as software and/or hardware components. The context policy enforcement engine retrieves context policy data in response to reception of a request for context information related to a user. The context policy data define a set of context rules for responding to context requests. The context policy enforcement engine responds to the request based on the set of context rules. COPYRIGHT: (C)2011,JPO&INPIT

    Abstract translation: 要解决的问题:提供一种用于控制用户的上下文信息的使用的方法和装置。 解决方案:用于控制用户的上下文信息的使用的方法和设备包括在移动计算设备上建立上下文策略执行引擎。 上下文策略实施引擎可以被实现为软件和/或硬件组件。 响应于接收到与用户相关的上下文信息的请求,上下文策略实施引擎检索上下文策略数据。 上下文策略数据定义了一组用于响应上下文请求的上下文规则。 上下文策略执行引擎基于上下文规则集响应请求。 版权所有(C)2011,JPO&INPIT

    Method for exchanging strong encryption key between devices using alternative input method in wireless personal area network (wpan)
    5.
    发明专利
    Method for exchanging strong encryption key between devices using alternative input method in wireless personal area network (wpan) 审中-公开
    在无线个人网络(WPAN)中使用替代输入方法的设备之间交换强加密的方法

    公开(公告)号:JP2008178092A

    公开(公告)日:2008-07-31

    申请号:JP2007332027

    申请日:2007-12-25

    Abstract: PROBLEM TO BE SOLVED: To provide a method for exchanging strong encryption keys between devices using alternate input methods. SOLUTION: At least two devices that want to communicate with one another are set in key exchange mode. The at least two devices are to communicate with one another using a short range radio or personal area network. The at least two devices negotiate with one another to determine which of the at least two devices will generate an encryption key, wherein device A represents the negotiated device and device B represents the non-negotiated device. Device A generates the encryption key and transmits the encryption key to device B using an out-of-band transmission channel. The out-of-band transmission channel may be transmitting the encryption key via audio tones. A validation process determines whether the transmission of the encryption key via the out-of-band transmission channel was successful. If the encryption key has been successfully validated, the at least two devices are enabled to automatically accept communications between them over the short range radio or personal area network. COPYRIGHT: (C)2008,JPO&INPIT

    Abstract translation: 要解决的问题:提供一种在使用替代输入方法的设备之间交换强加密密钥的方法。

    解决方案:要在密钥交换模式下设置至少两台想要彼此通信的设备。 至少两个设备将使用短距离无线电或个人区域网络彼此通信。 所述至少两个设备彼此协商以确定所述至少两个设备中的哪一个将生成加密密钥,其中设备A表示协商的设备,设备B表示未协商的设备。 设备A产生加密密钥,并使用带外传输信道将加密密钥发送到设备B. 带外传输信道可以经由音频音调发送加密密钥。 验证过程确定经由带外传输信道的加密密钥的传输是否成功。 如果加密密钥已被成功验证,则至少两个设备能够通过短距离无线电或个人区域网络自动接受它们之间的通信。 版权所有(C)2008,JPO&INPIT

    METHOD, APPARATUS AND SYSTEM FOR PERFORMING ACCESS CONTROL AND INTRUSION DETECTION ON ENCRYPTED DATA
    6.
    发明申请
    METHOD, APPARATUS AND SYSTEM FOR PERFORMING ACCESS CONTROL AND INTRUSION DETECTION ON ENCRYPTED DATA 审中-公开
    用于对加密数据进行访问控制和侵入检测的方法,装置和系统

    公开(公告)号:WO2007111662A3

    公开(公告)日:2008-02-21

    申请号:PCT/US2006047905

    申请日:2006-12-14

    CPC classification number: H04L63/1416

    Abstract: A method, apparatus and system enable access control and intrusion detection on encrypted data. Specifically, application data on a node may be routed to a partition on the host. The partition may utilize Direct Memory Access ("DMA") to access session key stored in a host OS. The partition may thereafter utilize the session key to perform intrusion detection on encrypted data from the application.

    Abstract translation: 一种方法,装置和系统启用对加密数据的访问控制和入侵检测。 具体来说,节点上的应用数据可以被路由到主机上的分区。 分区可以利用直接存储器访问(“DMA”)来访问存储在主机OS中的会话密钥。 该分区之后可以利用该会话密钥对来自该应用的加密数据进行入侵检测。

    TECHNOLOGIEN ZUM STEUERN DES ABBAUS VON SENSORSCHALTUNGEN

    公开(公告)号:DE112016006074T5

    公开(公告)日:2018-09-06

    申请号:DE112016006074

    申请日:2016-11-23

    Applicant: INTEL CORP

    Abstract: Technologien zum Steuern des Abbaus eines Sensormotes einschließlich Erfassens eines Auslöseereignisses und Initiieren des Abbaus von wenigstens einem Teil des Sensormotes als Reaktion auf das Auslöseereignis. Das Auslöseereignis kann als ein vom Sensormote erfassbares Ereignis beliebiger Art verkörpert sein, wie z. B. als Auslösesignal, bestimmte abgetastete Daten, Ablauf einer Bezugszeitdauer, Abschluss einer Aufgabe und so weiter. Der Sensormote kann den Abbau initiieren, zum Beispiel durch Steuern eines Ventils zum Freigeben einer im Sensormote gespeicherten Chemikalie oder zum Gelangenlassen einer Substanz in den Sensormote.

    TECHNIKEN ZUM MANAGEN VON SENSORKONFLIKTEN

    公开(公告)号:DE112016006073T5

    公开(公告)日:2018-10-04

    申请号:DE112016006073

    申请日:2016-11-23

    Applicant: INTEL CORP

    Abstract: Die Techniken zum Managen von Sensorkonflikten in einem Computersystem enthalten das Bestimmen einer Implikation der durch zwei oder mehr Sensoren des Computersystems abgetasteten Reize und das Bestimmen, ob zwischen den bestimmten Implikationen ein Konflikt vorhanden ist. Falls ein Konflikt vorhanden ist, wird ein Betrag der Unannehmlichkeit auf die Computervorrichtung angewendet. Es kann z. B. eine Leistungseigenschaft der Computervorrichtung basierend auf dem bestimmten Konflikt ungünstig beeinflusst werden. In einigen Ausführungsformen basiert das Niveau der angewendeten Unannehmlichkeit auf einer Größe, einer Wichtigkeit und/oder einer Dauer des Implikationskonflikts.

    Techniken zum Managen von Sensoranomalien

    公开(公告)号:DE112016006063T5

    公开(公告)日:2018-09-06

    申请号:DE112016006063

    申请日:2016-11-23

    Applicant: INTEL CORP

    Abstract: Die Techniken zum Managen von Sensoranomalien in einem Computersystem enthalten das Bestimmen basierend auf den Sensordaten von einem weiteren Sensor und einer Korrelationsregel, ob die von einem ersten Sensor empfangenen Sensordaten anomal sind. Die Korrelationsregel definiert eine erwartete Korrelation zwischen den ersten Sensordaten und den zweiten Sensordaten. Falls die Korrelation zwischen den ersten Sensordaten und den zweiten Sensordaten nicht beobachtet wird, können die ersten Sensordaten für anomal gehalten werden. Wenn ja, können die ersten Sensordaten unter Verwendung eines weiteren Sensors oder einer anderen Korrelation verifiziert werden. Falls bestimmt wird, dass der erste Sensor schlecht funktioniert, kann das Computersystem den Verlust des ersten Sensors unter Verwendung eines weiteren Sensors an seiner Stelle abschwächen.

    VIRTUAL SENSOR APPARATUS AND METHOD
    10.
    发明公开

    公开(公告)号:EP3225072A4

    公开(公告)日:2018-06-27

    申请号:EP15862803

    申请日:2015-10-26

    Applicant: INTEL CORP

    CPC classification number: H04W4/021 H04W4/02 H04W4/025

    Abstract: Apparatuses, methods and storage medium associated with provision and receipt of virtual sensor service, are disclosed. In embodiments, an apparatus may comprise a virtual sensor server configured to provide virtual sensor service to one or more mobile client devices to virtualize one or more sensors of each of the one or more mobile client devices. Virtualization of the one or more sensors of each of the one or more mobile client devices may comprise provision of sensor data to each of the one or more mobile client devices, or reporting of sensor data to one or more recipients external to the one or more mobile client devices on behalf of respective one or ones of the one or more mobile client devices. The provision or the reporting supersedes the corresponding sensor on the respective one or more of the mobile client devices. Other embodiments may be described and/or claimed.

Patent Agency Ranking