GB2592499A - System and method for securely accessing, manipulating and controlling documents and devices using natural language processing - Google Patents

System and method for securely accessing, manipulating and controlling documents and devices using natural language processing Download PDF

Info

Publication number
GB2592499A
GB2592499A GB2104536.4A GB202104536A GB2592499A GB 2592499 A GB2592499 A GB 2592499A GB 202104536 A GB202104536 A GB 202104536A GB 2592499 A GB2592499 A GB 2592499A
Authority
GB
United Kingdom
Prior art keywords
transaction
user
processor
data
electronic device
Prior art date
Legal status (The legal status is an assumption and is not a legal conclusion. Google has not performed a legal analysis and makes no representation as to the accuracy of the status listed.)
Granted
Application number
GB2104536.4A
Other versions
GB202104536D0 (en
GB2592499B (en
Inventor
J Diaz Luis
Sherman Norman
Current Assignee (The listed assignees may be inaccurate. Google has not performed a legal analysis and makes no representation or warranty as to the accuracy of the list.)
Gabi Solutions LLC
Original Assignee
Gabi Solutions LLC
Priority date (The priority date is an assumption and is not a legal conclusion. Google has not performed a legal analysis and makes no representation as to the accuracy of the date listed.)
Filing date
Publication date
Application filed by Gabi Solutions LLC filed Critical Gabi Solutions LLC
Publication of GB202104536D0 publication Critical patent/GB202104536D0/en
Publication of GB2592499A publication Critical patent/GB2592499A/en
Application granted granted Critical
Publication of GB2592499B publication Critical patent/GB2592499B/en
Active legal-status Critical Current
Anticipated expiration legal-status Critical

Links

Classifications

    • HELECTRICITY
    • H04ELECTRIC COMMUNICATION TECHNIQUE
    • H04LTRANSMISSION OF DIGITAL INFORMATION, e.g. TELEGRAPHIC COMMUNICATION
    • H04L9/00Cryptographic mechanisms or cryptographic arrangements for secret or secure communications; Network security protocols
    • H04L9/32Cryptographic mechanisms or cryptographic arrangements for secret or secure communications; Network security protocols including means for verifying the identity or authority of a user of the system or for message authentication, e.g. authorization, entity authentication, data integrity or data verification, non-repudiation, key authentication or verification of credentials
    • H04L9/3226Cryptographic mechanisms or cryptographic arrangements for secret or secure communications; Network security protocols including means for verifying the identity or authority of a user of the system or for message authentication, e.g. authorization, entity authentication, data integrity or data verification, non-repudiation, key authentication or verification of credentials using a predetermined code, e.g. password, passphrase or PIN
    • H04L9/3231Biological data, e.g. fingerprint, voice or retina
    • GPHYSICS
    • G06COMPUTING; CALCULATING OR COUNTING
    • G06FELECTRIC DIGITAL DATA PROCESSING
    • G06F21/00Security arrangements for protecting computers, components thereof, programs or data against unauthorised activity
    • G06F21/30Authentication, i.e. establishing the identity or authorisation of security principals
    • G06F21/31User authentication
    • G06F21/32User authentication using biometric data, e.g. fingerprints, iris scans or voiceprints
    • HELECTRICITY
    • H04ELECTRIC COMMUNICATION TECHNIQUE
    • H04LTRANSMISSION OF DIGITAL INFORMATION, e.g. TELEGRAPHIC COMMUNICATION
    • H04L63/00Network architectures or network communication protocols for network security
    • H04L63/10Network architectures or network communication protocols for network security for controlling access to devices or network resources
    • HELECTRICITY
    • H04ELECTRIC COMMUNICATION TECHNIQUE
    • H04LTRANSMISSION OF DIGITAL INFORMATION, e.g. TELEGRAPHIC COMMUNICATION
    • H04L9/00Cryptographic mechanisms or cryptographic arrangements for secret or secure communications; Network security protocols
    • H04L9/08Key distribution or management, e.g. generation, sharing or updating, of cryptographic keys or passwords
    • H04L9/0894Escrow, recovery or storing of secret information, e.g. secret key escrow or cryptographic key storage
    • HELECTRICITY
    • H04ELECTRIC COMMUNICATION TECHNIQUE
    • H04LTRANSMISSION OF DIGITAL INFORMATION, e.g. TELEGRAPHIC COMMUNICATION
    • H04L9/00Cryptographic mechanisms or cryptographic arrangements for secret or secure communications; Network security protocols
    • H04L9/32Cryptographic mechanisms or cryptographic arrangements for secret or secure communications; Network security protocols including means for verifying the identity or authority of a user of the system or for message authentication, e.g. authorization, entity authentication, data integrity or data verification, non-repudiation, key authentication or verification of credentials
    • H04L9/3234Cryptographic mechanisms or cryptographic arrangements for secret or secure communications; Network security protocols including means for verifying the identity or authority of a user of the system or for message authentication, e.g. authorization, entity authentication, data integrity or data verification, non-repudiation, key authentication or verification of credentials involving additional secure or trusted devices, e.g. TPM, smartcard, USB or software token
    • HELECTRICITY
    • H04ELECTRIC COMMUNICATION TECHNIQUE
    • H04LTRANSMISSION OF DIGITAL INFORMATION, e.g. TELEGRAPHIC COMMUNICATION
    • H04L9/00Cryptographic mechanisms or cryptographic arrangements for secret or secure communications; Network security protocols
    • H04L9/32Cryptographic mechanisms or cryptographic arrangements for secret or secure communications; Network security protocols including means for verifying the identity or authority of a user of the system or for message authentication, e.g. authorization, entity authentication, data integrity or data verification, non-repudiation, key authentication or verification of credentials
    • H04L9/3236Cryptographic mechanisms or cryptographic arrangements for secret or secure communications; Network security protocols including means for verifying the identity or authority of a user of the system or for message authentication, e.g. authorization, entity authentication, data integrity or data verification, non-repudiation, key authentication or verification of credentials using cryptographic hash functions
    • H04L9/3239Cryptographic mechanisms or cryptographic arrangements for secret or secure communications; Network security protocols including means for verifying the identity or authority of a user of the system or for message authentication, e.g. authorization, entity authentication, data integrity or data verification, non-repudiation, key authentication or verification of credentials using cryptographic hash functions involving non-keyed hash functions, e.g. modification detection codes [MDCs], MD5, SHA or RIPEMD
    • GPHYSICS
    • G06COMPUTING; CALCULATING OR COUNTING
    • G06QINFORMATION AND COMMUNICATION TECHNOLOGY [ICT] SPECIALLY ADAPTED FOR ADMINISTRATIVE, COMMERCIAL, FINANCIAL, MANAGERIAL OR SUPERVISORY PURPOSES; SYSTEMS OR METHODS SPECIALLY ADAPTED FOR ADMINISTRATIVE, COMMERCIAL, FINANCIAL, MANAGERIAL OR SUPERVISORY PURPOSES, NOT OTHERWISE PROVIDED FOR
    • G06Q30/00Commerce

Landscapes

  • Engineering & Computer Science (AREA)
  • Computer Security & Cryptography (AREA)
  • Computer Networks & Wireless Communication (AREA)
  • Signal Processing (AREA)
  • Life Sciences & Earth Sciences (AREA)
  • General Engineering & Computer Science (AREA)
  • Health & Medical Sciences (AREA)
  • Computer Hardware Design (AREA)
  • Biodiversity & Conservation Biology (AREA)
  • Biomedical Technology (AREA)
  • General Health & Medical Sciences (AREA)
  • Theoretical Computer Science (AREA)
  • Computing Systems (AREA)
  • Software Systems (AREA)
  • Physics & Mathematics (AREA)
  • General Physics & Mathematics (AREA)
  • Storage Device Security (AREA)

Abstract

A system and method for securing transaction between a user and an electronic device or an electronic document, where the device or document is accessible and controllable by a user with a user electronic device. A transaction request is initiated by the user electronic device, the electronic device is connectable to a network and the electronic document is accessible over the network. The system includes a smart box connectable to the network and having a processor and memory storing general purpose and special purpose software. One or more monitoring hots storable in the memory of the smart box are configured to collect data for the transaction request pertaining to at least one of the user,a process or a the transaction.

Claims (20)

1. A system configured to secure a transaction between a user and an electronic device: or an electronic document, the transaction being initiated using a user electronic device, the electronic device being connectable to a network and the electronic document being accessible over the network, the system comprising; a smart box connectable to the network, the smart box having a processor an memory having stored therein general purpose software, and having storable therein smart box special purpose software; a user device control installable on the user electronic device, wherein fee user device control enables a user of the user electronic device to request initiation of the transaction; and a bot storable in memory of the smart box, configured to collect data for the transaction request, and pertaining to at least one of the user, a process or the transaction,
2. A system according to claim 1, further comprising a user account file associated with the user and store in memory of a server, the user account file containing at least one user permission, wherein the bot is configured to collect data corresponding to the at least one user permission, and to provide the data to the server, wherein a processor of the server is configured to determine whether to allow or deny the transaction comparing the data with the at least one user permission.
3. A system according t claim 1, wherein the smart bo processor is configured to cause the hot to transmit the data to a server having a processor and server special purpose software, and wherein the server special purpose software is configured to cause the sewer processor to determine, from the data, whether the transaction is an anomaly, and to cause the smart box processor to deny the transaction when the transaction is an anomaly.
4 A system according to claim 1, wherein the smart box processor is configured to cause the hot to transmi the data to a sewer having a processor and server special purpose software, and wherein the server special purpose software is configured to cause the server processor to determine, from the data, whether the transaction is an anomaly, and to cause the smart box processor to allow the transaction when the transaction is an anomaly.
5, A system according to claim 4, thy server special purpose software is configured to: cause the server processor to cause the smart box processor to allow only the transaction when the transaction is an anomaly,
6. A system according to claim 4, wherein the smart box processor is configured to cause the hot to transmit the data to a server having a processor and server special purpose software, and wherein the sewer special purpose software is configured to cause the sewer processor to determine. From the data, whether the transaction is an anomaly, to notify an administrator when the transaction is an anomaly, to receive an instruction from the administrator and to cause the smart box processor to carry-out the instruction.
7. A system according to claim 1, wherein the transaction comprises at least one of accessing, controlling or manipulating the electronic device or electronic document.
8, A syste according to claim 1, wherein the transaction comprises causing the electronic device to execute a command.
9 A system according to claim 1 , wherein the transaction comprises executing a command on the electronic device.
10. A system according to claim 1, wherein th electronic device is a multi -function printer (MFP). and wherein the smart box is connectable to the MFP as a super-user.
11. A system according to claim l, wherein the hot comprises machine executable' instructions that, whe executed, cause the smart box processor to collect data about the transaction that may be used by the smart box processor to access, manipulate or control an electronic device or electronic document.
12. A system according to claim 1, further comprising an application programming interface (â LR ) oft a cloud-based server configured to receive data from the hot and determine whether the transaction is an anomaly.
13, A system according to claim 12, wherein the API provides blockchain functionality to create a cryptographic structure and to verify a data unit
14. A system according to claim 13, wherein the data unit is for the. transaction.
15, A method for securing a transaction between a user and an electronic device or an electronic document the transaction being initiated using a user electronic device, the electronic device being connectable to a network and the electronic document being accessible over the network, the method being performed by at least one processor operable by machine-readable instructions, the method comprising the step of providing a smart box connectable to the network, the smart box having a central processing unit comprising a processor and memory having stored therein general purpose software, and having storable therein a hot and smart box special purpose software, wherein tire smart box special purpose software is configured for: receiving a request to authenticate the user using biometric data of the user: receiving a command to control an electronic device or access an electronic document; receiving a determination of whether the transaction is an anomaly; and allowing or denying the transaction based upon the determination of whether the transaction is an anomaly, wherein the hot is at least one of user-centric, process-centric or transaction-centric, and is configured for: collecting data for the transaction; and transmitting the data to a cloud-based server.
16. A method according to claim 15, wherein the bat is a user-cenirie bot, and further configured to activate in response to a request to authenticate from a specific user.
17. A method according to claim 15, wherein the hot is a process-centric hot, and further configured to acti vate in response to a request to carry-out -a specific process.
18. A method according to claim 15, wherein the hot is a transaction -centric hot, and further configured to activate in response to initiation of a transaction request by a user
19 A method according to claim 18, wherein the step of receiving a request to authenticate the user using biometric data of the user further comprises receiving an audio signal from a audio input device of the user electronic device or proximate the electronic device.
20 A method according to claim 15, wherein the smart box special purpose software is further configured for providing an application programming interface (*APFy) to a cloud-based server, wherei the API is configured to receive data from the hot an determine whether the transaction is an anomaly.;21. A method according; to claim 20, wherein the API provides bioekchain functionality to create a cryptographic unit from the data, and to verify the data.;22. A method according to claim 21 , wherein the data is for the transaction.;23. A method according to claim 15, wherein the smart box special purpose software is further configured for receiving an instruction to allow the transaction when the transaction is an anomaly.;24. A method according to claim 23, wherein theinstractlon is only for the transaction.*
GB2104536.4A 2018-09-19 2018-09-19 System and method for securely accessing, manipulating and controlling documents and devices using natural language processing Active GB2592499B (en)

Applications Claiming Priority (1)

Application Number Priority Date Filing Date Title
PCT/US2018/051648 WO2020060542A1 (en) 2018-09-19 2018-09-19 System and method for securely accessing, manipulating and controlling documents and devices using natural language processing

Publications (3)

Publication Number Publication Date
GB202104536D0 GB202104536D0 (en) 2021-05-12
GB2592499A true GB2592499A (en) 2021-09-01
GB2592499B GB2592499B (en) 2022-12-14

Family

ID=69887809

Family Applications (1)

Application Number Title Priority Date Filing Date
GB2104536.4A Active GB2592499B (en) 2018-09-19 2018-09-19 System and method for securely accessing, manipulating and controlling documents and devices using natural language processing

Country Status (3)

Country Link
CA (1) CA3112706A1 (en)
GB (1) GB2592499B (en)
WO (1) WO2020060542A1 (en)

Citations (4)

* Cited by examiner, † Cited by third party
Publication number Priority date Publication date Assignee Title
US6088717A (en) * 1996-02-29 2000-07-11 Onename Corporation Computer-based communication system and method using metadata defining a control-structure
US20160277439A1 (en) * 2015-03-20 2016-09-22 Ncluud Corporation Locking Applications and Devices Using Secure Out-of-Band Channels
US9477737B1 (en) * 2013-11-20 2016-10-25 Consumerinfo.Com, Inc. Systems and user interfaces for dynamic access of multiple remote databases and synchronization of data based on user rules
US20170046698A1 (en) * 2015-08-13 2017-02-16 The Toronto-Dominion Bank Systems and methods for establishing and enforcing transaction-based restrictions using hybrid public-private blockchain ledgers

Patent Citations (4)

* Cited by examiner, † Cited by third party
Publication number Priority date Publication date Assignee Title
US6088717A (en) * 1996-02-29 2000-07-11 Onename Corporation Computer-based communication system and method using metadata defining a control-structure
US9477737B1 (en) * 2013-11-20 2016-10-25 Consumerinfo.Com, Inc. Systems and user interfaces for dynamic access of multiple remote databases and synchronization of data based on user rules
US20160277439A1 (en) * 2015-03-20 2016-09-22 Ncluud Corporation Locking Applications and Devices Using Secure Out-of-Band Channels
US20170046698A1 (en) * 2015-08-13 2017-02-16 The Toronto-Dominion Bank Systems and methods for establishing and enforcing transaction-based restrictions using hybrid public-private blockchain ledgers

Also Published As

Publication number Publication date
WO2020060542A1 (en) 2020-03-26
GB202104536D0 (en) 2021-05-12
GB2592499B (en) 2022-12-14
CA3112706A1 (en) 2020-03-26

Similar Documents

Publication Publication Date Title
CN105187362B (en) Method and device for connection authentication between desktop cloud client and server
CN101026455B (en) Secure processor
EP2947905B1 (en) Intra-application permissions on an electronic device
WO2020161662A1 (en) Authentication, authorization and audit of digital assets using the blockchain
KR20140026451A (en) Binding applications to device capabilities
WO2005099340A3 (en) On-line centralized and local authorization of executable files
WO2015067163A1 (en) Method, server and system for controling authority
US10037415B2 (en) Information processing system that authenticates license of application program installed in information processing apparatus, and information processing method
EP2267625A3 (en) On-line centralized and local authorization of executable files
US9424404B2 (en) Software revalidation
GB2599273A (en) Fine-grained token based access control
US8370957B2 (en) Method and apparatus for transmitting contents with limited system permissions
CN104951688B (en) Suitable for the exclusive data encryption method and encrypted card under Xen virtualized environment
US20080301771A1 (en) Electronic device, application authentication method, application execution system, and computer readable medium containing executable program instruction
KR20160081255A (en) A mobile terminal for providing one time password and methed thereof
CN101561855B (en) Method and system for controlling computer to access USB device
CN111797038B (en) Burning control method, system, device, equipment and computer readable storage medium
US20110307708A1 (en) Enabling access to removable hard disk drives
GB2592499A (en) System and method for securely accessing, manipulating and controlling documents and devices using natural language processing
CN107818272A (en) Hard disk secure starts and hard disk binding method, device and industrial computer
CN111143826A (en) BIOS user account password setting method and device and related equipment
KR101719129B1 (en) Cross-platform endpoint security system
CN112187725A (en) Cloud computing resource access method and device, service line service and gateway
CN105208115B (en) A kind of network-based file separation storage and transmission and management system and method
US10078747B2 (en) Resumption of logon across reboots