摘要:
A system and method for encrypting and decrypting information is presented. In some embodiments, an endpoint token management system is provided for facilitating dynamic and random encryption and decryption methods. The system and methods may be employed in virtually any system or network, and may be used to protect virtually any type of data, whether at rest (data storage), in motion (data transfer), or in use. In some embodiments, synchronization points are used as analogs for encryption/decryption keys, enabling the encrypting system and decrypting system to begin randomly altering encryption data in a like-manner, thereby creating a constantly changing encryption field that is virtually impossible to decrypt without authorization.
摘要:
A method of writing data to a memory device and reading data from the memory device includes issuing a challenge to a PUF device during a power-up process in order to derive a PUF response, error correcting the PUF response, providing delinearized addresses via a delinearization algorithm to the memory device using the error corrected PUF response, masking data, which is written to the memory device, via a masking module using the error corrected PUF response, de-masking data, which is read from the memory device, via the masking module (19) using the error corrected PUF response; and performing a check-sum verification of read data such that address delinearization and data masking are used together to obfuscate the memory content.
摘要:
Systems and methods of a personal daemon, executing as a background process on a mobile computing device, for providing personal assistant to an associated user is presented. Also executing on the mobile computing device is a scheduling manager. The personal daemon executes one or more personal assistance actions on behalf of the associated user. The scheduling manager responds to events in support of the personal daemon. More particularly, in response to receiving an event the scheduling manager determines a set of apps that are responsive to the received event and from that set of apps, identifies at least a first subset of apps for execution on the mobile computing device. The scheduling manager receives feedback information regarding the usefulness of the executed apps of the first subset of apps and updates the associated score of each of the apps of the first subset of apps.
摘要:
A method, apparatus and/or system related to discovery and launch system and method. In one embodiment, a method of a mobile device includes accessing a multicast capability of an operating system through an application of the mobile device, determining if there is a similar application locally stored on a networked media device to the application on the mobile device when a multicast message is broadcast to the networked media device communicatively coupled to the mobile device through a local area network, and either populating a table of the operating system of the client device with a list of applications and/or presenting identifiers to the client device to enable a user thereof to select an identifier therethrough.
摘要:
A security framework for a host computer system which allows a host to control access to a compliant security token by ensuring enforcement of established security policies administered by a middleware application. Processing between the host computer system and the security token is performed using one or more modular security application agents. The modular security application agents are counterpart applications to security applications installed in the security token and may be retrieved and installed upon to ensure compatibility between counterpart token and host security applications. The security policies are a composite of host security policies and token security policies which are logically combined by the middleware application at the beginning of a session.
摘要:
The plug part (10) is connectable to a mating part (1), which is used as a connector of a device (50), to form a plug-in connection. The plug part (10) includes at least one non-volatile memory (13), a communication unit (15) and a microprocessor (14). A network having such plug parts (10) can be tested by means of a testing device, which is designed to generate test signals from information stored in the memory (13), which test signals can be laid on the cable wired leading out of the plug part (10) in order to generate measurement signals. The memory (13) preferably contains a list of permissible combinations of hardware and software versions, which can be compared with the current hardware and software combination of the device (50) in order to configure the device (50) and/or authorize the device (50) for normal operation.
摘要:
A method, system and terminal for encrypting and decrypting an application program on a communication terminal are disclosed, including the communication terminal using an identification number of a subscriber identification card as an encryption key, performing encryption processing on an application program to be protected, and obtaining an encrypted application program. The method, system and terminal also include, when a user accesses the encrypted application program, the communication terminal performing matching processing on an identification number of a subscriber identification card inserted currently and the encryption key, and if a processing result is that the identification number of the subscriber identification card inserted currently is matched with the encryption key, performing decryption processing on the encrypted application program for the user to use.
摘要:
Embodiments of the present invention provide approaches for enforcing runtime policies in a networked computing environment (e.g., a cloud computing environment). Specifically, in a typical embodiment, computer code and data of an application is annotated with metadata defining a set of runtime policies for executing the computer code and data. Once a request is received to run the application, a set of parameters (e.g., geographic location) corresponding to the execution of the computer code and data of the application is dynamically determined, and compared to the runtime policies. The runtime policies for executing the computer code and data are then enforced at runtime. This includes either running the application, or preventing the running of the application in the case that the set of parameters corresponding to the execution of the computer code and data of the application do not satisfy the runtime policies.
摘要:
A system for controlling access to computing resources including an authentication device operatively associated with a computing device, the authentication device being configured to transmit an interrogation signal to a predetermined area. A computing device has at least one software application resides thereon. A wireless license device is configured to transmit license information to the authentication device in response to the interrogation signal and to allow the software application to run while the wireless license device is within the predetermined area and to prevent the software application from running when the wireless license device is not within the predetermined area.
摘要:
A computer-implemented method is provided for facilitating a quick login using a mobile computing device having a space-wise limited virtual keyboard. The method includes detecting a response from a server of a website or from an application native to the computing device that includes a login form displayed on a screen of the mobile computing device for authenticating a user, activating an application on the mobile computing device configured to auto fill the login form, and displaying a quick login keyboard, which includes a plurality of boxes configured to hold credential data of the user, wherein the quick login keyboard further includes a plurality of fill buttons, each of which is associated with one of the credential data boxes. The method further includes detecting a tapping on one of the plurality of fill buttons, and populating the login form with the credential data associated with the tapped fill button.