SYSTEM AND METHODS FOR DYNAMICALLY AND RANDOMLY ENCRYPTING AND DECRYPTING DATA

    公开(公告)号:US20190182222A1

    公开(公告)日:2019-06-13

    申请号:US16210148

    申请日:2018-12-05

    申请人: CYPHYX, LLC

    IPC分类号: H04L29/06 H04L9/32 G06F21/12

    摘要: A system and method for encrypting and decrypting information is presented. In some embodiments, an endpoint token management system is provided for facilitating dynamic and random encryption and decryption methods. The system and methods may be employed in virtually any system or network, and may be used to protect virtually any type of data, whether at rest (data storage), in motion (data transfer), or in use. In some embodiments, synchronization points are used as analogs for encryption/decryption keys, enabling the encrypting system and decrypting system to begin randomly altering encryption data in a like-manner, thereby creating a constantly changing encryption field that is virtually impossible to decrypt without authorization.

    Incentive-based app execution
    3.
    发明授权

    公开(公告)号:US09760401B2

    公开(公告)日:2017-09-12

    申请号:US14941576

    申请日:2015-11-14

    摘要: Systems and methods of a personal daemon, executing as a background process on a mobile computing device, for providing personal assistant to an associated user is presented. Also executing on the mobile computing device is a scheduling manager. The personal daemon executes one or more personal assistance actions on behalf of the associated user. The scheduling manager responds to events in support of the personal daemon. More particularly, in response to receiving an event the scheduling manager determines a set of apps that are responsive to the received event and from that set of apps, identifies at least a first subset of apps for execution on the mobile computing device. The scheduling manager receives feedback information regarding the usefulness of the executed apps of the first subset of apps and updates the associated score of each of the apps of the first subset of apps.

    UNIFORM MODULAR FRAMEWORK FOR A HOST COMPUTER SYSTEM

    公开(公告)号:US20170195368A1

    公开(公告)日:2017-07-06

    申请号:US15402307

    申请日:2017-01-10

    申请人: Assa Abloy AB

    IPC分类号: H04L29/06 H04L9/00

    摘要: A security framework for a host computer system which allows a host to control access to a compliant security token by ensuring enforcement of established security policies administered by a middleware application. Processing between the host computer system and the security token is performed using one or more modular security application agents. The modular security application agents are counterpart applications to security applications installed in the security token and may be retrieved and installed upon to ensure compatibility between counterpart token and host security applications. The security policies are a composite of host security policies and token security policies which are logically combined by the middleware application at the beginning of a session.

    Plug part for forming a plug-in connection

    公开(公告)号:US09613230B2

    公开(公告)日:2017-04-04

    申请号:US14426530

    申请日:2013-09-10

    发明人: Max Gut Bernd Riedel

    摘要: The plug part (10) is connectable to a mating part (1), which is used as a connector of a device (50), to form a plug-in connection. The plug part (10) includes at least one non-volatile memory (13), a communication unit (15) and a microprocessor (14). A network having such plug parts (10) can be tested by means of a testing device, which is designed to generate test signals from information stored in the memory (13), which test signals can be laid on the cable wired leading out of the plug part (10) in order to generate measurement signals. The memory (13) preferably contains a list of permissible combinations of hardware and software versions, which can be compared with the current hardware and software combination of the device (50) in order to configure the device (50) and/or authorize the device (50) for normal operation.

    Method, system and terminal for encrypting/decrypting application program on communication terminal
    7.
    发明授权
    Method, system and terminal for encrypting/decrypting application program on communication terminal 有权
    通信终端上加密/解密应用程序的方法,系统和终端

    公开(公告)号:US09516019B2

    公开(公告)日:2016-12-06

    申请号:US14436183

    申请日:2013-07-22

    申请人: ZTE CORPORATION

    发明人: Xipeng Li

    IPC分类号: H04L29/06 G06F21/12

    摘要: A method, system and terminal for encrypting and decrypting an application program on a communication terminal are disclosed, including the communication terminal using an identification number of a subscriber identification card as an encryption key, performing encryption processing on an application program to be protected, and obtaining an encrypted application program. The method, system and terminal also include, when a user accesses the encrypted application program, the communication terminal performing matching processing on an identification number of a subscriber identification card inserted currently and the encryption key, and if a processing result is that the identification number of the subscriber identification card inserted currently is matched with the encryption key, performing decryption processing on the encrypted application program for the user to use.

    摘要翻译: 公开了一种用于在通信终端上加密和解密应用程序的方法,系统和终端,包括使用用户识别卡的标识号作为加密密钥的通信终端,对要保护的应用程序执行加密处理,以及 获得加密的应用程序。 该方法,系统和终端还包括当用户访问加密的应用程序时,通信终端对当前插入的用户识别卡的识别号码和加密密钥执行匹配处理,并且如果处理结果是识别号码 当前插入的用户识别卡与加密密钥相匹配,对用户使用的加密应用程序执行解密处理。

    Enforcing runtime policies in a networked computing environment
    8.
    发明授权
    Enforcing runtime policies in a networked computing environment 有权
    在联网的计算环境中实施运行时策略

    公开(公告)号:US09479398B2

    公开(公告)日:2016-10-25

    申请号:US13934338

    申请日:2013-07-03

    摘要: Embodiments of the present invention provide approaches for enforcing runtime policies in a networked computing environment (e.g., a cloud computing environment). Specifically, in a typical embodiment, computer code and data of an application is annotated with metadata defining a set of runtime policies for executing the computer code and data. Once a request is received to run the application, a set of parameters (e.g., geographic location) corresponding to the execution of the computer code and data of the application is dynamically determined, and compared to the runtime policies. The runtime policies for executing the computer code and data are then enforced at runtime. This includes either running the application, or preventing the running of the application in the case that the set of parameters corresponding to the execution of the computer code and data of the application do not satisfy the runtime policies.

    摘要翻译: 本发明的实施例提供了在网络计算环境(例如,云计算环境)中实施运行时策略的方法。 具体地,在典型的实施例中,应用程序的代码和数据用定义用于执行计算机代码和数据的一组运行时策略的元数据来注释。 一旦接收到运行应用的请求,就动态地确定与计算机代码的执行和应用的数据相对应的一组参数(例如,地理位置),并与运行时策略进行比较。 然后在运行时执行用于执行计算机代码和数据的运行时策略。 这包括运行应用程序,或者在与计算机代码的执行对应的一组参数和应用程序的数据不满足运行时策略的情况下,阻止运行应用程序。

    Radio frequency identifiers for providing user access to computing resources
    9.
    发明授权
    Radio frequency identifiers for providing user access to computing resources 有权
    提供用户访问计算资源的射频标识符

    公开(公告)号:US09471757B2

    公开(公告)日:2016-10-18

    申请号:US12236802

    申请日:2008-09-24

    摘要: A system for controlling access to computing resources including an authentication device operatively associated with a computing device, the authentication device being configured to transmit an interrogation signal to a predetermined area. A computing device has at least one software application resides thereon. A wireless license device is configured to transmit license information to the authentication device in response to the interrogation signal and to allow the software application to run while the wireless license device is within the predetermined area and to prevent the software application from running when the wireless license device is not within the predetermined area.

    摘要翻译: 一种用于控制对计算资源的访问的系统,包括与计算设备可操作地相关联的认证设备,所述认证设备被配置为将询问信号发送到预定区域。 计算设备具有驻留在其上的至少一个软件应用。 无线许可证设备被配置为响应于询问信号向认证设备发送许可证信息,并且允许软件应用程序在无线许可证设备在预定区域内运行并且在无线许可证时防止软件应用程序运行 设备不在预定区域内。

    Method for facilitating quick logins from a mobile device
    10.
    发明授权
    Method for facilitating quick logins from a mobile device 有权
    促进从移动设备快速登录的方法

    公开(公告)号:US09465786B2

    公开(公告)日:2016-10-11

    申请号:US14175466

    申请日:2014-02-07

    摘要: A computer-implemented method is provided for facilitating a quick login using a mobile computing device having a space-wise limited virtual keyboard. The method includes detecting a response from a server of a website or from an application native to the computing device that includes a login form displayed on a screen of the mobile computing device for authenticating a user, activating an application on the mobile computing device configured to auto fill the login form, and displaying a quick login keyboard, which includes a plurality of boxes configured to hold credential data of the user, wherein the quick login keyboard further includes a plurality of fill buttons, each of which is associated with one of the credential data boxes. The method further includes detecting a tapping on one of the plurality of fill buttons, and populating the login form with the credential data associated with the tapped fill button.

    摘要翻译: 提供了一种计算机实现的方法,用于促进使用具有空间有限的虚拟键盘的移动计算设备的快速登录。 该方法包括检测来自网站的服务器或从本机到计算设备的应用的响应,该响应包括在移动计算设备的屏幕上显示的用于认证用户的登录表单,激活移动计算设备上的应用,被配置为 自动填写登录表单,并显示快速登录键盘,其包括被配置为保存用户的凭证数据的多个框,其中快速登录键盘还包括多个填充按钮,每个填充按钮与 凭证数据框。 该方法还包括检测在多个填充按钮中的一个填充按钮上的敲击,以及使用与轻敲填充按钮相关联的凭证数据填充登录表单。