Looking for breakthrough ideas for innovation challenges? Try Patsnap Eureka!

Data verification via the device's independent processor

A technology of processors and electronic equipment, applied in data processing applications, digital data protection, instruments, etc., can solve problems such as surge

Active Publication Date: 2021-09-24
APPLE INC
View PDF5 Cites 0 Cited by
  • Summary
  • Abstract
  • Description
  • Claims
  • Application Information

AI Technical Summary

Problems solved by technology

[0002] Unfortunately, the rise of digital development has been accompanied by a surge in malware, spoofing, phishing and other cybersecurity threats

Method used

the structure of the environmentally friendly knitted fabric provided by the present invention; figure 2 Flow chart of the yarn wrapping machine for environmentally friendly knitted fabrics and storage devices; image 3 Is the parameter map of the yarn covering machine
View more

Image

Smart Image Click on the blue labels to locate them in the text.
Viewing Examples
Smart Image
  • Data verification via the device's independent processor
  • Data verification via the device's independent processor
  • Data verification via the device's independent processor

Examples

Experimental program
Comparison scheme
Effect test

Embodiment Construction

[0011] In some embodiments, the physical architecture can be configured such that a first (eg, primary) operating system is executable by a first processor of the device, and a separate secure operating system is executable by a second processor of the device. The first processor may control output of first data to a first display of the device, and the second processor may control output of second data to a second display of the device. In some cases, the first display may be configured such that presentation at the first display may not be controlled, initiated, and / or modified by the second processor, and / or the second processor may be configured such that presentation at the second display The presentation of may not be controlled, initiated and / or modified by the first processor. Thus, in some implementations, a display, eg, the second display, may only be controlled by a corresponding processor, eg, the second processor. The first data and the second data may relate to ...

the structure of the environmentally friendly knitted fabric provided by the present invention; figure 2 Flow chart of the yarn wrapping machine for environmentally friendly knitted fabrics and storage devices; image 3 Is the parameter map of the yarn covering machine
Login to View More

PUM

No PUM Login to View More

Abstract

The present invention relates to data verification via an independent processor of a device. A content request communication generated, for example using the device's first processor, may be transmitted to the web server. A response communication including content identifying the first value may be received from the web server. The first processor can facilitate presentation of content on a first display of the device. Communications can be received from the remote server at the second processor of the device. The communication may include data representative of the second value and may be generated at the remote server using information received from the web server. Additionally, the second processor can generate a security verification output representing at least a second value that can be presented on a separate second display. The presentation on the first display may at least partially overlap in time with the presentation on the second display.

Description

technical field [0001] The present disclosure relates generally to a system and method for facilitating information security via verification of data, including involving each of a plurality of processors of a device independently receiving and processing a different signal to facilitate verification of the processor A displayed display at the controlled display, wherein each signal represents a corresponding one or more pieces of data. Background technique [0002] Unfortunately, the rise of digital development has been accompanied by a surge in malware, spoofing, phishing and other cybersecurity threats. For example, link manipulation and / or website forgery may lead a user to believe that a given web page is associated with a trusted source, when in reality it may be hosted by another entity attempting to gain access to data associated with the user. The web page may include one or more fields that request input from the user. These fields may be associated with field de...

Claims

the structure of the environmentally friendly knitted fabric provided by the present invention; figure 2 Flow chart of the yarn wrapping machine for environmentally friendly knitted fabrics and storage devices; image 3 Is the parameter map of the yarn covering machine
Login to View More

Application Information

Patent Timeline
no application Login to View More
Patent Type & Authority Patents(China)
IPC IPC(8): G06Q20/40G06Q20/38
CPCG06Q20/3825G06Q20/4014G06Q20/40145G06F21/74G06F21/84G06F21/64G06F21/71H04L63/123H04L63/166H04L67/10
Inventor G·法索利M·C·百英顿C·沙普A·K·戴德里奇N·J·希勒R·G·叶佩兹P·科斯塔G·巴比尔瑞A·古普塔
Owner APPLE INC
Who we serve
  • R&D Engineer
  • R&D Manager
  • IP Professional
Why Patsnap Eureka
  • Industry Leading Data Capabilities
  • Powerful AI technology
  • Patent DNA Extraction
Social media
Patsnap Eureka Blog
Learn More
PatSnap group products