Abstract:
An electronic device is provided. The electronic device includes a first memory unit for storing a non-payment application, a first processor, a fingerprint sensing unit and a security element including a second memory unit and a second processor. The second memory unit stores a payment application and user fingerprint information. When the second processor executes the payment application, the fingerprint sensing unit captures a fingerprint image of a user's finger and the second processor transmits the fingerprint image to the first processor via a secure channel. The first processor calculates biometric characteristics of the fingerprint image to generate to-be-recognized fingerprint information which is transmitted to the second processor via the secure channel. When the second processor determines that the to-be-recognized fingerprint information matches the user fingerprint information, the second processor generates an authentication signal for a payment transaction.
Abstract:
A user verification method and system, a password protection apparatus and a storage medium are disclosed, and the method includes: receiving an operation request containing a user identity of a user sent by the user via a user terminal; generating identity verification information according to the user identity; sending the identity verification information to an NFC terminal through near field communication with the NFC terminal, so that the NFC terminal prompts the user to provide identity acknowledgement; receiving identity acknowledgement information from the NFC terminal, if the identity acknowledgement is provided by the user, where the identity acknowledgement information contains an identifier of the NFC terminal; determining whether the user identity matches the identifier of the NFC terminal according to the identity acknowledgement information; and sending operation response information to the user terminal of the user if the user identity matches the identifier of the NFC terminal.
Abstract:
Methods for configuring and utilizing a configurable data guard (CDG) implemented on a hardware-based programmable logic device are disclosed. The CDG may include integrated circuit portions comprising a plurality of arrays of generic comparison operations and a plurality of arrays of generic action operations. The CDG may receive a data guard configuration. The CDG may perform an authentication and integrity check procedure on the received data guard configuration. The CDG may configure a plurality of guard primitives based on the data guard configuration. Each guard primitive may be configured from at least one generic comparison operation and at least one generic action operation. The guard primitives may be used to enforce the complex data guard rules that correspond to the data guard configuration.
Abstract:
A communication device provides wireless communication between a controller in a motor vehicle and a network having at least one device external to the motor vehicle. The controller includes a computation device with at least two processor cores. Data interchange between the communication device and a first processor core takes place exclusively via a second of the processor cores.
Abstract:
A method, program and/or system reads first data through a first path from a location in a data storage. Second data is read through a second path from the same location in the data storage. The first data is compared to the second data. A match between the first data and the second data indicates that the first path did not encrypt the first data. A mismatch between the first data and the second data indicates that the first path encrypted the first data.
Abstract:
A portable, application-specific USB autorun device, following connection to a computer terminal, automatically initialises or presents itself as a known type of device and then automatically sends to the terminal a sequence of data complying with a standard protocol, that sequence of data automatically causing content to be accessed or a task to be initiated. The device (i) includes a standardised USB module that includes a USB microcontroller, the standardised module being designed to be attached to or embedded in multiple types of different, application specific packages but (ii) excludes mass memory storage for applications or end-user data.
Abstract:
Provided is a USB port locking device including: a blocking member having a blocking coupling part to block access of an external device; an external USB port part connected to the blocking member and to which an external USB connection port is insertively coupled; a signal connection part enabling signal transmission between a terminal inside the USB port of the electronic device and the external USB connecting port; a locking member selectively locked to the electronic device so that the blocking member is not forcedly removed; a stopping member selectively blocking an unauthorized external USB connecting port from being inserted into the external USB port part; and a lock member controlling a locking operation of the locking member and a blocking operation of the stopping member by interfering with the locking member and the stopping member when they are inserted into the blocking member.
Abstract:
A method of authenticating a slave device. The method includes initializing, by a host device, a charge retention circuit of the slave device, and receiving, by the host device, an indication of a discharge time of the charge retention circuit. The host device authenticates the slave device based on the received indication of the discharge time of the charge retention device.
Abstract:
An Internet-of-Things (IoT) device platform to communicate in a trusted portion of an IoT network is disclosed. The trusted IoT platform can include a secure IoT system-on-chip (SoC) and can be integrated into various devices such that each of the devices may implement “roots of trust” to establish a trusted portion, or a trusted backbone, of the IoT network.
Abstract:
The present disclosure relates to a KVM appliance for preventing the passing of status information between a target computer, which is in communication with the KVM appliance, and a peripheral of a user. The KVM appliance may comprise a housing, an indicator supported on the housing, and a main processing unit (MPU) for receiving status information. The MPU monitors status information received by it and determines when the received status information is of a specific type which is used to set the indicator, which in turn apprises the user of a real time status of a feature of the peripheral. When the status information is identi fled as being of the type to set the indicator, it is then used to set the indicator to indicate the real time status of the feature to the user of the peripheral.