63 patents in CPC class H04W
A system and/or method is provided to implement authentication for a user device, without having to enter authentication credentials. Based on the presence of at least two paired short-range communication devices near the user device. In an example, a user's Bluetooth device, such as a smart phone, may be registered to be used for automatic authentication for an online user account. When the user is attempting to log onto the online user account at a user device, such as a laptop, the user device may detect that the user's Bluetooth device is in proximity to the user device and is paired to the user device and thus allow the user to be logged into the online user account at the user device automatically. Thus, the user may be logged into the online user account seamlessly without requiring the user to input credentials, such as user name and/or password.
A computer system, method, and computer readable product are provided for managing passwords using steganography. In various embodiments, a computing system provides a password manager that a user provides a password to. The user then selects a service for which credentials will be generated or stored, and an image on the user's device that will be used to steganographically store the credentials. The computing system then generates a steganographic image that includes the credentials and stores that image with the other images on the user's device.
There is provided an information processing device in which an application of an electronic device provides a service to a user, the information processing device including a processor; and a memory that includes instructions, which when executed, cause the processor to execute the following steps: associating the application with a processing flow; associating the processing flow with a scope of authorization of an external service; retrieving the scope of the authorization of the external service required by the processing flow associated with the application; retrieving authorized information representing a scope of authorization of the external service authorized by the user; and providing, for each external service, information indicating whether the external service is authorized, based on a result of comparing the scope of the authorization of the external service required by the processing flow with the scope of the authorization of the external service authorized by the user.
The disclosed computer-implemented method for monitoring bait to protect users from security threats may include (i) monitoring a bait computing resource to detect attempts to access the bait computing resource, (ii) virtualizing the bait computing resource to prevent a false positive by hiding the bait computing resource from at least one trusted application that has been categorized as safe, (iii) detecting an attempt by a different application to access the virtualized bait computing resource, and (iv) performing a security action to protect a trusted user by reporting the attempt to access the virtualized bait computing resource by the different application. Various other methods, systems, and computer-readable media are also disclosed.
An operating system (OS) update to a secure element (SE) may be commanded, for example, in order to fix a security bug, upgrade a version of an OS, provide mobile network operator (MNO) specific extensions such as to an application programming interface (API) or to cause OS/profile switching. Many of these OS updates will affect one or more profiles present on the SE. An MNO associated with a given profile will benefit in some instances by being provided with a notification of the OS update, since the OS update may affect SE capabilities and thus affect what a given profile can or cannot do after the OS update occurs. Embodiments provided herein create notification entries that will appropriately inform the concerned MNO. In some embodiments, a capability linking variable (“linkedcapability”) is used to determine whether an SE capability change should trigger transmission of a notification to the concerned MNO.
A method for fingerprint unlocking is provided. Fingerprint information for an application to be unlocked is acquired. The fingerprint information is compared with preset fingerprint information. A display page of the application to be unlocked is refreshed in parallel with comparing the fingerprint information with the preset fingerprint information. A refreshed display page of the application to be unlocked is displayed, when the fingerprint information matches the preset fingerprint information successfully. A terminal is also provided.
Systems and methods are described herein for authorizing master resets (e.g., factory resets) of mobile devices, such as smart phones, tablets, and so on. In some embodiments, the systems and methods employ a server-based authorization schema or mechanism, where at least one step or operation is performed, or caused to be performed, by a server or other system that is remote from the mobile device being reset.