RU2020101280A3 - - Google Patents
Download PDFInfo
- Publication number
- RU2020101280A3 RU2020101280A3 RU2020101280A RU2020101280A RU2020101280A3 RU 2020101280 A3 RU2020101280 A3 RU 2020101280A3 RU 2020101280 A RU2020101280 A RU 2020101280A RU 2020101280 A RU2020101280 A RU 2020101280A RU 2020101280 A3 RU2020101280 A3 RU 2020101280A3
- Authority
- RU
- Russia
Links
Classifications
-
- G—PHYSICS
- G06—COMPUTING; CALCULATING OR COUNTING
- G06F—ELECTRIC DIGITAL DATA PROCESSING
- G06F21/00—Security arrangements for protecting computers, components thereof, programs or data against unauthorised activity
- G06F21/60—Protecting data
- G06F21/604—Tools and structures for managing or administering access control systems
-
- G—PHYSICS
- G06—COMPUTING; CALCULATING OR COUNTING
- G06F—ELECTRIC DIGITAL DATA PROCESSING
- G06F21/00—Security arrangements for protecting computers, components thereof, programs or data against unauthorised activity
- G06F21/30—Authentication, i.e. establishing the identity or authorisation of security principals
- G06F21/31—User authentication
- G06F21/32—User authentication using biometric data, e.g. fingerprints, iris scans or voiceprints
-
- G—PHYSICS
- G06—COMPUTING; CALCULATING OR COUNTING
- G06F—ELECTRIC DIGITAL DATA PROCESSING
- G06F21/00—Security arrangements for protecting computers, components thereof, programs or data against unauthorised activity
- G06F21/60—Protecting data
- G06F21/62—Protecting access to data via a platform, e.g. using keys or access control rules
- G06F21/6209—Protecting access to data via a platform, e.g. using keys or access control rules to a single file or object, e.g. in a secure envelope, encrypted and accessed using a key, or with access control rules appended to the object itself
-
- G—PHYSICS
- G06—COMPUTING; CALCULATING OR COUNTING
- G06F—ELECTRIC DIGITAL DATA PROCESSING
- G06F21/00—Security arrangements for protecting computers, components thereof, programs or data against unauthorised activity
- G06F21/60—Protecting data
- G06F21/62—Protecting access to data via a platform, e.g. using keys or access control rules
- G06F21/6218—Protecting access to data via a platform, e.g. using keys or access control rules to a system of files or objects, e.g. local or distributed file system or database
- G06F21/6245—Protecting personal data, e.g. for financial or medical purposes
-
- G—PHYSICS
- G06—COMPUTING; CALCULATING OR COUNTING
- G06F—ELECTRIC DIGITAL DATA PROCESSING
- G06F21/00—Security arrangements for protecting computers, components thereof, programs or data against unauthorised activity
- G06F21/70—Protecting specific internal or peripheral components, in which the protection of a component leads to protection of the entire computer
- G06F21/71—Protecting specific internal or peripheral components, in which the protection of a component leads to protection of the entire computer to assure secure computing or processing of information
- G06F21/74—Protecting specific internal or peripheral components, in which the protection of a component leads to protection of the entire computer to assure secure computing or processing of information operating in dual or compartmented mode, i.e. at least one secure mode
-
- G—PHYSICS
- G06—COMPUTING; CALCULATING OR COUNTING
- G06F—ELECTRIC DIGITAL DATA PROCESSING
- G06F21/00—Security arrangements for protecting computers, components thereof, programs or data against unauthorised activity
- G06F21/70—Protecting specific internal or peripheral components, in which the protection of a component leads to protection of the entire computer
- G06F21/82—Protecting input, output or interconnection devices
- G06F21/83—Protecting input, output or interconnection devices input devices, e.g. keyboards, mice or controllers thereof
-
- G—PHYSICS
- G06—COMPUTING; CALCULATING OR COUNTING
- G06V—IMAGE OR VIDEO RECOGNITION OR UNDERSTANDING
- G06V40/00—Recognition of biometric, human-related or animal-related patterns in image or video data
- G06V40/10—Human or animal bodies, e.g. vehicle occupants or pedestrians; Body parts, e.g. hands
- G06V40/16—Human faces, e.g. facial parts, sketches or expressions
- G06V40/161—Detection; Localisation; Normalisation
-
- G—PHYSICS
- G06—COMPUTING; CALCULATING OR COUNTING
- G06F—ELECTRIC DIGITAL DATA PROCESSING
- G06F2221/00—Indexing scheme relating to security arrangements for protecting computers, components thereof, programs or data against unauthorised activity
- G06F2221/21—Indexing scheme relating to G06F21/00 and subgroups addressing additional information or applications relating to security arrangements for protecting computers, components thereof, programs or data against unauthorised activity
- G06F2221/2101—Auditing as a secondary aspect
-
- G—PHYSICS
- G06—COMPUTING; CALCULATING OR COUNTING
- G06F—ELECTRIC DIGITAL DATA PROCESSING
- G06F2221/00—Indexing scheme relating to security arrangements for protecting computers, components thereof, programs or data against unauthorised activity
- G06F2221/21—Indexing scheme relating to G06F21/00 and subgroups addressing additional information or applications relating to security arrangements for protecting computers, components thereof, programs or data against unauthorised activity
- G06F2221/2105—Dual mode as a secondary aspect
-
- G—PHYSICS
- G06—COMPUTING; CALCULATING OR COUNTING
- G06F—ELECTRIC DIGITAL DATA PROCESSING
- G06F2221/00—Indexing scheme relating to security arrangements for protecting computers, components thereof, programs or data against unauthorised activity
- G06F2221/21—Indexing scheme relating to G06F21/00 and subgroups addressing additional information or applications relating to security arrangements for protecting computers, components thereof, programs or data against unauthorised activity
- G06F2221/2107—File encryption
-
- G—PHYSICS
- G06—COMPUTING; CALCULATING OR COUNTING
- G06F—ELECTRIC DIGITAL DATA PROCESSING
- G06F2221/00—Indexing scheme relating to security arrangements for protecting computers, components thereof, programs or data against unauthorised activity
- G06F2221/21—Indexing scheme relating to G06F21/00 and subgroups addressing additional information or applications relating to security arrangements for protecting computers, components thereof, programs or data against unauthorised activity
- G06F2221/2141—Access rights, e.g. capability lists, access control lists, access tables, access matrices
-
- G—PHYSICS
- G06—COMPUTING; CALCULATING OR COUNTING
- G06F—ELECTRIC DIGITAL DATA PROCESSING
- G06F2221/00—Indexing scheme relating to security arrangements for protecting computers, components thereof, programs or data against unauthorised activity
- G06F2221/21—Indexing scheme relating to G06F21/00 and subgroups addressing additional information or applications relating to security arrangements for protecting computers, components thereof, programs or data against unauthorised activity
- G06F2221/2147—Locking files
-
- G—PHYSICS
- G06—COMPUTING; CALCULATING OR COUNTING
- G06F—ELECTRIC DIGITAL DATA PROCESSING
- G06F2221/00—Indexing scheme relating to security arrangements for protecting computers, components thereof, programs or data against unauthorised activity
- G06F2221/21—Indexing scheme relating to G06F21/00 and subgroups addressing additional information or applications relating to security arrangements for protecting computers, components thereof, programs or data against unauthorised activity
- G06F2221/2149—Restricted operating environment
Landscapes
- Engineering & Computer Science (AREA)
- Theoretical Computer Science (AREA)
- Computer Security & Cryptography (AREA)
- Computer Hardware Design (AREA)
- Physics & Mathematics (AREA)
- General Physics & Mathematics (AREA)
- Software Systems (AREA)
- General Engineering & Computer Science (AREA)
- Health & Medical Sciences (AREA)
- General Health & Medical Sciences (AREA)
- Bioethics (AREA)
- Automation & Control Theory (AREA)
- Oral & Maxillofacial Surgery (AREA)
- Human Computer Interaction (AREA)
- Mathematical Physics (AREA)
- Medical Informatics (AREA)
- Databases & Information Systems (AREA)
- Multimedia (AREA)
- Telephone Function (AREA)
- User Interface Of Digital Computer (AREA)
- Collating Specific Patterns (AREA)
Applications Claiming Priority (3)
Application Number | Priority Date | Filing Date | Title |
---|---|---|---|
EP17176421.0A EP3416079A1 (de) | 2017-06-16 | 2017-06-16 | Computerimplementiertes verfahren und computerprogrammprodukt zur zugangssteuerung eines endgeräts |
EP17176421.0 | 2017-06-16 | ||
PCT/EP2018/065931 WO2018229246A1 (de) | 2017-06-16 | 2018-06-15 | Computerimplementiertes verfahren und computerprogrammprodukt zur zugangssteuerung eines endgeräts |
Publications (2)
Publication Number | Publication Date |
---|---|
RU2020101280A RU2020101280A (ru) | 2021-07-16 |
RU2020101280A3 true RU2020101280A3 (ru) | 2021-07-16 |
Family
ID=59215483
Family Applications (1)
Application Number | Title | Priority Date | Filing Date |
---|---|---|---|
RU2020101280A RU2020101280A (ru) | 2017-06-16 | 2018-06-15 | Реализуемый компьютером способ и компьютерный программный продукт управления доступом к оконечному устройству |
Country Status (5)
Country | Link |
---|---|
US (1) | US20200184088A1 (ru) |
EP (2) | EP3416079A1 (ru) |
CN (1) | CN110998573A (ru) |
RU (1) | RU2020101280A (ru) |
WO (1) | WO2018229246A1 (ru) |
Families Citing this family (13)
Publication number | Priority date | Publication date | Assignee | Title |
---|---|---|---|---|
EP3484164B1 (en) * | 2017-11-13 | 2023-08-16 | Nagravision Sàrl | A method to control the display of at least one content on a screen |
US11450069B2 (en) | 2018-11-09 | 2022-09-20 | Citrix Systems, Inc. | Systems and methods for a SaaS lens to view obfuscated content |
US11201889B2 (en) | 2019-03-29 | 2021-12-14 | Citrix Systems, Inc. | Security device selection based on secure content detection |
CN109978698B (zh) * | 2019-04-02 | 2021-06-15 | 国任财产保险股份有限公司 | 一种基于物联网的财富保险管理数据安全系统 |
EP3793159A1 (de) | 2019-09-10 | 2021-03-17 | Connexcom Ag | Zugangssteuerung für private nachrichten |
CN111079112B (zh) * | 2019-12-06 | 2022-06-03 | 北京小米移动软件有限公司 | 应用控制方法、应用控制装置及存储介质 |
US11544415B2 (en) | 2019-12-17 | 2023-01-03 | Citrix Systems, Inc. | Context-aware obfuscation and unobfuscation of sensitive content |
US11539709B2 (en) | 2019-12-23 | 2022-12-27 | Citrix Systems, Inc. | Restricted access to sensitive content |
US11582266B2 (en) | 2020-02-03 | 2023-02-14 | Citrix Systems, Inc. | Method and system for protecting privacy of users in session recordings |
US11361113B2 (en) | 2020-03-26 | 2022-06-14 | Citrix Systems, Inc. | System for prevention of image capture of sensitive information and related techniques |
WO2021237383A1 (en) * | 2020-05-23 | 2021-12-02 | Citrix Systems, Inc. | Sensitive information obfuscation during screen share |
WO2022041058A1 (en) | 2020-08-27 | 2022-03-03 | Citrix Systems, Inc. | Privacy protection during video conferencing screen share |
WO2022041163A1 (en) | 2020-08-29 | 2022-03-03 | Citrix Systems, Inc. | Identity leak prevention |
Family Cites Families (13)
Publication number | Priority date | Publication date | Assignee | Title |
---|---|---|---|---|
EP1687753A1 (en) * | 2003-11-21 | 2006-08-09 | Koninklijke Philips Electronics N.V. | System and method for extracting a face from a camera picture for representation in an electronic system |
JP2006259930A (ja) * | 2005-03-15 | 2006-09-28 | Omron Corp | 表示装置およびその制御方法、表示装置を備えた電子機器、表示装置制御プログラム、ならびに該プログラムを記録した記録媒体 |
US8370639B2 (en) | 2005-06-16 | 2013-02-05 | Sensible Vision, Inc. | System and method for providing secure access to an electronic device using continuous facial biometrics |
US20100124363A1 (en) * | 2008-11-20 | 2010-05-20 | Sony Ericsson Mobile Communications Ab | Display privacy system |
WO2012133982A1 (ko) * | 2011-03-25 | 2012-10-04 | 엘지전자 주식회사 | 영상처리장치 및 영상처리장치의 제어 방법 |
US8660322B2 (en) | 2011-08-25 | 2014-02-25 | King Saud University | Passive continuous authentication method |
CN102833383A (zh) * | 2012-07-20 | 2012-12-19 | 上海华勤通讯技术有限公司 | 电子设备的多用户管理方法 |
JP6481249B2 (ja) * | 2013-07-29 | 2019-03-13 | オムロン株式会社 | プログラマブル表示器、制御方法、およびプログラム |
US9710566B2 (en) * | 2013-12-16 | 2017-07-18 | Google Inc. | User interface for webpage permission requests |
US9495520B2 (en) * | 2014-04-04 | 2016-11-15 | 2236008 Ontario Inc. | System and method for preventing observation of password entry using face detection |
EP2981063B1 (en) * | 2014-07-31 | 2020-03-04 | Samsung Electronics Co., Ltd | Method of modifying image including photographing restricted element, and device for performing the method |
US20170046507A1 (en) * | 2015-08-10 | 2017-02-16 | International Business Machines Corporation | Continuous facial recognition for adaptive data restriction |
CN106055949A (zh) * | 2016-05-26 | 2016-10-26 | 宇龙计算机通信科技(深圳)有限公司 | 一种系统访问授权方法及装置 |
-
2017
- 2017-06-16 EP EP17176421.0A patent/EP3416079A1/de not_active Withdrawn
-
2018
- 2018-06-15 RU RU2020101280A patent/RU2020101280A/ru unknown
- 2018-06-15 CN CN201880052874.8A patent/CN110998573A/zh active Pending
- 2018-06-15 US US16/623,359 patent/US20200184088A1/en active Pending
- 2018-06-15 EP EP18729709.8A patent/EP3639178A1/de active Pending
- 2018-06-15 WO PCT/EP2018/065931 patent/WO2018229246A1/de active Application Filing
Also Published As
Publication number | Publication date |
---|---|
CN110998573A (zh) | 2020-04-10 |
RU2020101280A (ru) | 2021-07-16 |
EP3416079A1 (de) | 2018-12-19 |
US20200184088A1 (en) | 2020-06-11 |
EP3639178A1 (de) | 2020-04-22 |
WO2018229246A1 (de) | 2018-12-20 |