GB2592499A - System and method for securely accessing, manipulating and controlling documents and devices using natural language processing - Google Patents
System and method for securely accessing, manipulating and controlling documents and devices using natural language processing Download PDFInfo
- Publication number
- GB2592499A GB2592499A GB2104536.4A GB202104536A GB2592499A GB 2592499 A GB2592499 A GB 2592499A GB 202104536 A GB202104536 A GB 202104536A GB 2592499 A GB2592499 A GB 2592499A
- Authority
- GB
- United Kingdom
- Prior art keywords
- transaction
- user
- processor
- data
- electronic device
- Prior art date
- Legal status (The legal status is an assumption and is not a legal conclusion. Google has not performed a legal analysis and makes no representation as to the accuracy of the status listed.)
- Granted
Links
Classifications
-
- H—ELECTRICITY
- H04—ELECTRIC COMMUNICATION TECHNIQUE
- H04L—TRANSMISSION OF DIGITAL INFORMATION, e.g. TELEGRAPHIC COMMUNICATION
- H04L9/00—Cryptographic mechanisms or cryptographic arrangements for secret or secure communications; Network security protocols
- H04L9/32—Cryptographic mechanisms or cryptographic arrangements for secret or secure communications; Network security protocols including means for verifying the identity or authority of a user of the system or for message authentication, e.g. authorization, entity authentication, data integrity or data verification, non-repudiation, key authentication or verification of credentials
- H04L9/3226—Cryptographic mechanisms or cryptographic arrangements for secret or secure communications; Network security protocols including means for verifying the identity or authority of a user of the system or for message authentication, e.g. authorization, entity authentication, data integrity or data verification, non-repudiation, key authentication or verification of credentials using a predetermined code, e.g. password, passphrase or PIN
- H04L9/3231—Biological data, e.g. fingerprint, voice or retina
-
- G—PHYSICS
- G06—COMPUTING; CALCULATING OR COUNTING
- G06F—ELECTRIC DIGITAL DATA PROCESSING
- G06F21/00—Security arrangements for protecting computers, components thereof, programs or data against unauthorised activity
- G06F21/30—Authentication, i.e. establishing the identity or authorisation of security principals
- G06F21/31—User authentication
- G06F21/32—User authentication using biometric data, e.g. fingerprints, iris scans or voiceprints
-
- H—ELECTRICITY
- H04—ELECTRIC COMMUNICATION TECHNIQUE
- H04L—TRANSMISSION OF DIGITAL INFORMATION, e.g. TELEGRAPHIC COMMUNICATION
- H04L63/00—Network architectures or network communication protocols for network security
- H04L63/10—Network architectures or network communication protocols for network security for controlling access to devices or network resources
-
- H—ELECTRICITY
- H04—ELECTRIC COMMUNICATION TECHNIQUE
- H04L—TRANSMISSION OF DIGITAL INFORMATION, e.g. TELEGRAPHIC COMMUNICATION
- H04L9/00—Cryptographic mechanisms or cryptographic arrangements for secret or secure communications; Network security protocols
- H04L9/08—Key distribution or management, e.g. generation, sharing or updating, of cryptographic keys or passwords
- H04L9/0894—Escrow, recovery or storing of secret information, e.g. secret key escrow or cryptographic key storage
-
- H—ELECTRICITY
- H04—ELECTRIC COMMUNICATION TECHNIQUE
- H04L—TRANSMISSION OF DIGITAL INFORMATION, e.g. TELEGRAPHIC COMMUNICATION
- H04L9/00—Cryptographic mechanisms or cryptographic arrangements for secret or secure communications; Network security protocols
- H04L9/32—Cryptographic mechanisms or cryptographic arrangements for secret or secure communications; Network security protocols including means for verifying the identity or authority of a user of the system or for message authentication, e.g. authorization, entity authentication, data integrity or data verification, non-repudiation, key authentication or verification of credentials
- H04L9/3234—Cryptographic mechanisms or cryptographic arrangements for secret or secure communications; Network security protocols including means for verifying the identity or authority of a user of the system or for message authentication, e.g. authorization, entity authentication, data integrity or data verification, non-repudiation, key authentication or verification of credentials involving additional secure or trusted devices, e.g. TPM, smartcard, USB or software token
-
- H—ELECTRICITY
- H04—ELECTRIC COMMUNICATION TECHNIQUE
- H04L—TRANSMISSION OF DIGITAL INFORMATION, e.g. TELEGRAPHIC COMMUNICATION
- H04L9/00—Cryptographic mechanisms or cryptographic arrangements for secret or secure communications; Network security protocols
- H04L9/32—Cryptographic mechanisms or cryptographic arrangements for secret or secure communications; Network security protocols including means for verifying the identity or authority of a user of the system or for message authentication, e.g. authorization, entity authentication, data integrity or data verification, non-repudiation, key authentication or verification of credentials
- H04L9/3236—Cryptographic mechanisms or cryptographic arrangements for secret or secure communications; Network security protocols including means for verifying the identity or authority of a user of the system or for message authentication, e.g. authorization, entity authentication, data integrity or data verification, non-repudiation, key authentication or verification of credentials using cryptographic hash functions
- H04L9/3239—Cryptographic mechanisms or cryptographic arrangements for secret or secure communications; Network security protocols including means for verifying the identity or authority of a user of the system or for message authentication, e.g. authorization, entity authentication, data integrity or data verification, non-repudiation, key authentication or verification of credentials using cryptographic hash functions involving non-keyed hash functions, e.g. modification detection codes [MDCs], MD5, SHA or RIPEMD
-
- G—PHYSICS
- G06—COMPUTING; CALCULATING OR COUNTING
- G06Q—INFORMATION AND COMMUNICATION TECHNOLOGY [ICT] SPECIALLY ADAPTED FOR ADMINISTRATIVE, COMMERCIAL, FINANCIAL, MANAGERIAL OR SUPERVISORY PURPOSES; SYSTEMS OR METHODS SPECIALLY ADAPTED FOR ADMINISTRATIVE, COMMERCIAL, FINANCIAL, MANAGERIAL OR SUPERVISORY PURPOSES, NOT OTHERWISE PROVIDED FOR
- G06Q30/00—Commerce
Landscapes
- Engineering & Computer Science (AREA)
- Computer Security & Cryptography (AREA)
- Computer Networks & Wireless Communication (AREA)
- Signal Processing (AREA)
- Life Sciences & Earth Sciences (AREA)
- General Engineering & Computer Science (AREA)
- Health & Medical Sciences (AREA)
- Computer Hardware Design (AREA)
- Biodiversity & Conservation Biology (AREA)
- Biomedical Technology (AREA)
- General Health & Medical Sciences (AREA)
- Theoretical Computer Science (AREA)
- Computing Systems (AREA)
- Software Systems (AREA)
- Physics & Mathematics (AREA)
- General Physics & Mathematics (AREA)
- Storage Device Security (AREA)
Abstract
A system and method for securing transaction between a user and an electronic device or an electronic document, where the device or document is accessible and controllable by a user with a user electronic device. A transaction request is initiated by the user electronic device, the electronic device is connectable to a network and the electronic document is accessible over the network. The system includes a smart box connectable to the network and having a processor and memory storing general purpose and special purpose software. One or more monitoring hots storable in the memory of the smart box are configured to collect data for the transaction request pertaining to at least one of the user,a process or a the transaction.
Claims (20)
1. A system configured to secure a transaction between a user and an electronic device: or an electronic document, the transaction being initiated using a user electronic device, the electronic device being connectable to a network and the electronic document being accessible over the network, the system comprising; a smart box connectable to the network, the smart box having a processor an memory having stored therein general purpose software, and having storable therein smart box special purpose software; a user device control installable on the user electronic device, wherein fee user device control enables a user of the user electronic device to request initiation of the transaction; and a bot storable in memory of the smart box, configured to collect data for the transaction request, and pertaining to at least one of the user, a process or the transaction,
2. A system according to claim 1, further comprising a user account file associated with the user and store in memory of a server, the user account file containing at least one user permission, wherein the bot is configured to collect data corresponding to the at least one user permission, and to provide the data to the server, wherein a processor of the server is configured to determine whether to allow or deny the transaction comparing the data with the at least one user permission.
3. A system according t claim 1, wherein the smart bo processor is configured to cause the hot to transmit the data to a server having a processor and server special purpose software, and wherein the server special purpose software is configured to cause the sewer processor to determine, from the data, whether the transaction is an anomaly, and to cause the smart box processor to deny the transaction when the transaction is an anomaly.
4 A system according to claim 1, wherein the smart box processor is configured to cause the hot to transmi the data to a sewer having a processor and server special purpose software, and wherein the server special purpose software is configured to cause the server processor to determine, from the data, whether the transaction is an anomaly, and to cause the smart box processor to allow the transaction when the transaction is an anomaly.
5, A system according to claim 4, thy server special purpose software is configured to: cause the server processor to cause the smart box processor to allow only the transaction when the transaction is an anomaly,
6. A system according to claim 4, wherein the smart box processor is configured to cause the hot to transmit the data to a server having a processor and server special purpose software, and wherein the sewer special purpose software is configured to cause the sewer processor to determine. From the data, whether the transaction is an anomaly, to notify an administrator when the transaction is an anomaly, to receive an instruction from the administrator and to cause the smart box processor to carry-out the instruction.
7. A system according to claim 1, wherein the transaction comprises at least one of accessing, controlling or manipulating the electronic device or electronic document.
8, A syste according to claim 1, wherein the transaction comprises causing the electronic device to execute a command.
9 A system according to claim 1 , wherein the transaction comprises executing a command on the electronic device.
10. A system according to claim 1, wherein th electronic device is a multi -function printer (MFP). and wherein the smart box is connectable to the MFP as a super-user.
11. A system according to claim l, wherein the hot comprises machine executable' instructions that, whe executed, cause the smart box processor to collect data about the transaction that may be used by the smart box processor to access, manipulate or control an electronic device or electronic document.
12. A system according to claim 1, further comprising an application programming interface (â LR ) oft a cloud-based server configured to receive data from the hot and determine whether the transaction is an anomaly.
13, A system according to claim 12, wherein the API provides blockchain functionality to create a cryptographic structure and to verify a data unit
14. A system according to claim 13, wherein the data unit is for the. transaction.
15, A method for securing a transaction between a user and an electronic device or an electronic document the transaction being initiated using a user electronic device, the electronic device being connectable to a network and the electronic document being accessible over the network, the method being performed by at least one processor operable by machine-readable instructions, the method comprising the step of providing a smart box connectable to the network, the smart box having a central processing unit comprising a processor and memory having stored therein general purpose software, and having storable therein a hot and smart box special purpose software, wherein tire smart box special purpose software is configured for: receiving a request to authenticate the user using biometric data of the user: receiving a command to control an electronic device or access an electronic document; receiving a determination of whether the transaction is an anomaly; and allowing or denying the transaction based upon the determination of whether the transaction is an anomaly, wherein the hot is at least one of user-centric, process-centric or transaction-centric, and is configured for: collecting data for the transaction; and transmitting the data to a cloud-based server.
16. A method according to claim 15, wherein the bat is a user-cenirie bot, and further configured to activate in response to a request to authenticate from a specific user.
17. A method according to claim 15, wherein the hot is a process-centric hot, and further configured to acti vate in response to a request to carry-out -a specific process.
18. A method according to claim 15, wherein the hot is a transaction -centric hot, and further configured to activate in response to initiation of a transaction request by a user
19 A method according to claim 18, wherein the step of receiving a request to authenticate the user using biometric data of the user further comprises receiving an audio signal from a audio input device of the user electronic device or proximate the electronic device.
20 A method according to claim 15, wherein the smart box special purpose software is further configured for providing an application programming interface (*APFy) to a cloud-based server, wherei the API is configured to receive data from the hot an determine whether the transaction is an anomaly.;21. A method according; to claim 20, wherein the API provides bioekchain functionality to create a cryptographic unit from the data, and to verify the data.;22. A method according to claim 21 , wherein the data is for the transaction.;23. A method according to claim 15, wherein the smart box special purpose software is further configured for receiving an instruction to allow the transaction when the transaction is an anomaly.;24. A method according to claim 23, wherein theinstractlon is only for the transaction.*
Applications Claiming Priority (1)
Application Number | Priority Date | Filing Date | Title |
---|---|---|---|
PCT/US2018/051648 WO2020060542A1 (en) | 2018-09-19 | 2018-09-19 | System and method for securely accessing, manipulating and controlling documents and devices using natural language processing |
Publications (3)
Publication Number | Publication Date |
---|---|
GB202104536D0 GB202104536D0 (en) | 2021-05-12 |
GB2592499A true GB2592499A (en) | 2021-09-01 |
GB2592499B GB2592499B (en) | 2022-12-14 |
Family
ID=69887809
Family Applications (1)
Application Number | Title | Priority Date | Filing Date |
---|---|---|---|
GB2104536.4A Active GB2592499B (en) | 2018-09-19 | 2018-09-19 | System and method for securely accessing, manipulating and controlling documents and devices using natural language processing |
Country Status (3)
Country | Link |
---|---|
CA (1) | CA3112706A1 (en) |
GB (1) | GB2592499B (en) |
WO (1) | WO2020060542A1 (en) |
Citations (4)
Publication number | Priority date | Publication date | Assignee | Title |
---|---|---|---|---|
US6088717A (en) * | 1996-02-29 | 2000-07-11 | Onename Corporation | Computer-based communication system and method using metadata defining a control-structure |
US20160277439A1 (en) * | 2015-03-20 | 2016-09-22 | Ncluud Corporation | Locking Applications and Devices Using Secure Out-of-Band Channels |
US9477737B1 (en) * | 2013-11-20 | 2016-10-25 | Consumerinfo.Com, Inc. | Systems and user interfaces for dynamic access of multiple remote databases and synchronization of data based on user rules |
US20170046698A1 (en) * | 2015-08-13 | 2017-02-16 | The Toronto-Dominion Bank | Systems and methods for establishing and enforcing transaction-based restrictions using hybrid public-private blockchain ledgers |
-
2018
- 2018-09-19 WO PCT/US2018/051648 patent/WO2020060542A1/en active Application Filing
- 2018-09-19 CA CA3112706A patent/CA3112706A1/en active Pending
- 2018-09-19 GB GB2104536.4A patent/GB2592499B/en active Active
Patent Citations (4)
Publication number | Priority date | Publication date | Assignee | Title |
---|---|---|---|---|
US6088717A (en) * | 1996-02-29 | 2000-07-11 | Onename Corporation | Computer-based communication system and method using metadata defining a control-structure |
US9477737B1 (en) * | 2013-11-20 | 2016-10-25 | Consumerinfo.Com, Inc. | Systems and user interfaces for dynamic access of multiple remote databases and synchronization of data based on user rules |
US20160277439A1 (en) * | 2015-03-20 | 2016-09-22 | Ncluud Corporation | Locking Applications and Devices Using Secure Out-of-Band Channels |
US20170046698A1 (en) * | 2015-08-13 | 2017-02-16 | The Toronto-Dominion Bank | Systems and methods for establishing and enforcing transaction-based restrictions using hybrid public-private blockchain ledgers |
Also Published As
Publication number | Publication date |
---|---|
WO2020060542A1 (en) | 2020-03-26 |
GB202104536D0 (en) | 2021-05-12 |
GB2592499B (en) | 2022-12-14 |
CA3112706A1 (en) | 2020-03-26 |
Similar Documents
Publication | Publication Date | Title |
---|---|---|
CN105187362B (en) | Method and device for connection authentication between desktop cloud client and server | |
CN101026455B (en) | Secure processor | |
EP2947905B1 (en) | Intra-application permissions on an electronic device | |
WO2020161662A1 (en) | Authentication, authorization and audit of digital assets using the blockchain | |
KR20140026451A (en) | Binding applications to device capabilities | |
WO2005099340A3 (en) | On-line centralized and local authorization of executable files | |
WO2015067163A1 (en) | Method, server and system for controling authority | |
US10037415B2 (en) | Information processing system that authenticates license of application program installed in information processing apparatus, and information processing method | |
EP2267625A3 (en) | On-line centralized and local authorization of executable files | |
US9424404B2 (en) | Software revalidation | |
GB2599273A (en) | Fine-grained token based access control | |
US8370957B2 (en) | Method and apparatus for transmitting contents with limited system permissions | |
CN104951688B (en) | Suitable for the exclusive data encryption method and encrypted card under Xen virtualized environment | |
US20080301771A1 (en) | Electronic device, application authentication method, application execution system, and computer readable medium containing executable program instruction | |
KR20160081255A (en) | A mobile terminal for providing one time password and methed thereof | |
CN101561855B (en) | Method and system for controlling computer to access USB device | |
CN111797038B (en) | Burning control method, system, device, equipment and computer readable storage medium | |
US20110307708A1 (en) | Enabling access to removable hard disk drives | |
GB2592499A (en) | System and method for securely accessing, manipulating and controlling documents and devices using natural language processing | |
CN107818272A (en) | Hard disk secure starts and hard disk binding method, device and industrial computer | |
CN111143826A (en) | BIOS user account password setting method and device and related equipment | |
KR101719129B1 (en) | Cross-platform endpoint security system | |
CN112187725A (en) | Cloud computing resource access method and device, service line service and gateway | |
CN105208115B (en) | A kind of network-based file separation storage and transmission and management system and method | |
US10078747B2 (en) | Resumption of logon across reboots |