Patent application number | Description | Published |
20140164772 | AUGMENTED REALITY BASED PRIVACY AND DECRYPTION - A method, non-transitory computer readable medium and apparatus for decrypting a document are disclosed. For example, the method captures a tag on an encrypted document, transmits the tag to an application server of a communication network to request a per-document decryption key, receives the per-document decryption key if the tag is authenticated, and decrypts a portion of the encrypted document using a temporary decryption key contained in the tag, the tag decrypted with the per-document decryption key. | 06-12-2014 |
20140259172 | Multilayered Deception for Intrusion Detection and Prevention - Concepts and technologies are disclosed herein for multilayered deception for intrusion detection. According to various embodiments of the concepts and technologies disclosed herein, a multilayer deception system includes honey servers, honey files and folders, honey databases, and/or honey computers. A multilayer deception system controller generates honey activity between the honey entities and exposes a honey profile with contact information associated with a honey user. Contact directed at the honey user and/or activity at any of the honey entities can trigger alarms and/or indicate an attack, and can be analyzed to prevent future attacks. | 09-11-2014 |
20150016602 | METHOD AND APPARATUS FOR PROVIDING SECURE IMAGE ENCRYPTION AND DECRYPTION - Methods, non-transitory computer readable media and apparatuses for decrypting an image are disclosed. For example, a method captures a portion of an encrypted image and decrypts the portion of the image using a decryption key. The portion of the image contains partial information for an adjacent portion of the image. The method then displays the portion of the image that is decrypted and also displays the adjacent portion of the image using the partial information for the adjacent portion of the image. Another method includes capturing a first portion of an image that is encrypted using a first key and a second key, decrypting the first portion of the image using a first key and displaying the first portion of the image that is decrypted. | 01-15-2015 |
20150101018 | Communication Devices, Computer Readable Storage Devices, and Methods for Secure Multi-Path Communication - A message is divided into multiple message segments, and a network interface is selected from among a plurality of different types of network interfaces included within a communication device for transmitting each message segment. Each network interface is dedicated to a different type of communication protocol using a different encryption technique, and a network interface is selected for transmitting each message segment according to a pattern of the network interfaces. Secure transmission of the multiple message segments is initiated via the network interfaces according to the pattern. | 04-09-2015 |
20150149359 | Out-Of-Band Device Verification of Transactions - Concepts and technologies are disclosed herein for out-of-band device verification of transactions. A processor can execute a verification service. The verification service can receive a verification request with data relating to a transaction between a computing device and an application. The verification service can identify an out-of-band device associated with the computing device and obtain verification data from the out-of-band device. The verification service can compare the verification data to data relating to the transaction to determine if the transaction is to be verified. Based upon the determination, the verification service can approve or block the transaction. | 05-28-2015 |
20150154598 | Secure Interaction with Input Devices - Methods of obtaining input on a physical input device are provided. A virtual input device is superimposed over the physical input device. The virtual input device has a different layout than the physical input device, such that a first input on the physical input device is mapped to a different input on the virtual input device. In another aspect, methods of securing a transaction according include displaying a first input screen to a user, encrypting a scrambling key using a public key, the scrambling key defining a second input screen that has a different layout from the first input screen, transmitting the encrypted scrambling key to a user device, receiving an input from the user device, and mapping the input to the second input screen. | 06-04-2015 |
20150381572 | AUGMENTED REALITY BASED PRIVACY AND DECRYPTION - A method, non-transitory computer readable medium and apparatus for decrypting a document are disclosed. For example, the method captures a tag on an encrypted document, transmits the tag to an application server of a communication network to request a per-document decryption key, receives the per-document decryption key if the tag is authenticated, and decrypts a portion of the encrypted document using a temporary decryption key contained in the tag, the tag decrypted with the per-document decryption key. | 12-31-2015 |
20160004870 | Personal Security Agent - Concepts and technologies disclosed herein are directed to a personal security agent. According to one aspect disclosed herein, a compute resource includes a processor that can execute the personal security agent to perform operations. The compute resource can receive data from a data source. The compute resource can receive a job request to provide security for an entity. The job request can include a job requirement. The compute resource can analyze the job requirement and the data to determine an action. The compute resource can provide instructions for executing the action to a controller domain. The controller domain can execute the action in at least partial fulfillment of the job requirement. | 01-07-2016 |