摘要:
A method for secure text-to-speech conversion of text using speech or voice synthesis that prevents the originator's voice from being used or distributed inappropriately or in an unauthorized manner is described. Security controls authenticate the sender of the message, and optionally the recipient, and ensure that the message is read in the originator's voice, not the voice of another person. Such controls permit an originator's voiceprint file to be publicly accessible, but limit its use for voice synthesis to text-based content created by the sender, or sent to a trusted recipient. In this way a person can be assured that their voice cannot be used for content they did not write.
摘要:
A smart card reader is adapted to extract and store authentication data from a response APDU received from a smart card before generating a filtered response APDU, wherein the filtered response APDU does not include the authentication data. Beneficially, when the smart card reader transmits the filtered response APDU toward a destination, the biometric template data is less susceptible to interception, thereby providing a more secure solution.
摘要:
Methods and apparatus to provision payment services are disclosed. An example method includes receiving an indication of a service to be provisioned to a mobile device, generating a token indicative of the service, wherein the token includes a cryptographically signed portion that was cryptographically signed by a secure element of the mobile device, sending the token to an entity for verification, and provisioning the service when the token is verified.
摘要:
An apparatus, and an associated method, facilitates security at a wireless device, such as a wireless device comprising a mobile computing platform. A security decision engine is provided that monitors for an event necessitating a security decision. When a security decision is required, request is made of a knowledge fetcher, provided by a trusted third-party, installed at the wireless device for the security decision. The knowledge fetcher obtains the security decision, such as by obtaining the security decision from a remote, trusted third-party server, and provides the security decision to the decision engine. Use is made of the security decision pursuant to a setting for which the security decision is needed.
摘要:
A mobile wireless communications device may include a near field communications (NFC) device, a microphone, a memory configured to store access information for each of a plurality of payment accounts, and a processor cooperating with the NFC device, the microphone, and the memory. The processor may be configured to capture a sound using the microphone, determine a given payment account from among the plurality thereof based upon the sound, and send the corresponding access information for the given payment account to a transaction terminal via the NFC device.
摘要:
A method and apparatus for unlocking a mobile communication device are provided, the mobile communication device comprising an input device, and a display device (128), the mobile communication device enabled to initiate emergency calls in a locked state. Password input data is received via the input device, when the mobile communication device is in the locked state, the password input data for unlocking the mobile communication device, the password input data comprising at least a sequence of characters for initiating an emergency call. In response to receiving the sequence of characters for initiating the emergency call, the display device (128) is controlling to provide a representation of instructions to initiate the emergency call upon receipt of emergency call initiate data from the input device.
摘要:
The described embodiments relate generally to devices, methods and systems for managing access to a memory card, such as a smart card, by a plurality of accessing devices. Certain embodiments relate to a smart card reader (SCR) (110) for managing concurrent access to a smart card (120) by a plurality of accessing devices (130). Other embodiments cause an existing session with one accessing device to be terminated to allow establishment of a session with another accessing device.
摘要:
A method of authenticating a user of a computing device is proposed, together with computing device on which the method is implemented. In the method a modified base image is overlaid with a modified overlay image on a display and at least one of the modified base image and modified overlay image is moved by the user. In addition to the moving, a change in orientation of at least one of the modified base image and the modified overlay image is required. Positive authentication is indicated in response to the base image reference point on the modified base image being aligned with the overlay image reference point on the modified overlay image and the change in orientation matching a pre-selected orientation criterion.
摘要:
Methods and devices for storing sent message data are described. The sent message data corresponds to a message sent to a destination by a communication device (201) via a server. The method includes compiling (305) a first portion of the message which has a plurality of components; applying (310) security encoding to the first portion; and storing (315) the first portion. The first portion includes at least one but not all of the plurality of components in the message, and pointers to the components not included in the first portion.