摘要:
A method of authenticating a user of a computing device is proposed, together with computing device on which the method is implemented. In the method, an authentication video is displayed on a display. In response to receiving an input at a point in time in the video that matches a pre-selected time reference point, positive authentication is indicated.
摘要:
A method of authenticating a user of a computing device is proposed, together with computing device on which the method is implemented. In the method a modified base image is overlaid with a modified overlay image on a display. At least one of the modified base image and modified overlay image is moved by the user. Positive authentication is indicated in response a first point relative to the base image reference point being aligned with a second point relative to the overlay image reference point.
摘要:
A method of authenticating a user of a computing device is proposed, together with computing device on which the method is implemented. In the method a modified base image is overlaid with a modified overlay image on a display and movement of either the modified base image or modified overlay image is permitted if a criterion for movement is met. Positive authentication is indicated in response to the base image reference point on the modified base image being aligned with the overlay image reference point on the modified overlay image.
摘要:
A system and method of signing a message to be sent from a first communication device to a destination via a second communication device. The message includes a first portion on the first communication device and a second portion on the second communication device. The method includes receiving at the second communication device the first portion of the message and a first signature for the first portion from the first communication device; combining the first portion and the second portion to form the message; obtaining a second signature for the message; and sending the first signature, the second signature and the message from the second communication device to the destination.
摘要:
A device and method are provided for a device that communicates security informaiotn to a user entering content into the device. In an aspect, the device may access content from a server over a connection through the network. The device displays the content on a user interface of the device. The device detects information entered into a field of the displayed content and evaluates a security state of the device. If the security state is below a security threshold and, if the entered information is identified as protected information based on stored criteria, the device displaying a visual indication on the user interface.
摘要:
A system and method of sending an e-mail message associated with a wireless device is provided. A request to forward or reply to an original e-mail message is sent from the wireless device to a server. The request contains one or more recipients and includes a message identifier of an original e-mail message. A portion indicator is provided for retrieving portions of the original e-mail message identified by the message identifier. An e-mail message is sent to the one or more recipients comprising any added user text and the one or more retrieved portions of the original e-mail message such that text of the original message that the user may not be aware is not forwarded to new recipients.
摘要:
A method for handling an encrypted message received on an electronic device (100) that has not been encrypted using a current public key. The portable electronic device (100) automatically generates a reply message (308) to the sender in response to determining (204) that the message has not been encrypted with the current public key. The reply message (208) may contain the current public key of the recipient device (100), and may request the sender to resend the message encrypted with the current public key.
摘要:
An apparatus, and an associated method, facilitates security relating to installation of, such as downloading of, and application at a wireless device. When selection is made to install the application, a security decision is required of a trusted, third-party to install the application. A request is made of a trusted, third-party entity for the security decision. Responsive to the security decision, the application is either allowed to be downloaded to the wireless device or prohibited from being downloaded to the wireless device.
摘要:
The invention relates to a card reader device (110) for managing access to a memory card (120) by a plurality of accessing devices (130,140) and comprising a processor, a wireless communication interface responsive to the processor for communicating with the plurality of accessing devices, and a memory card interface for enabling communication between the processor and the memory card. When a first secure session is open between a first accessing device and the memory card and the card reader device receives an open session command from a second accessing device, the processor is configured to terminate the first secure session and to allow the second accessing device to open a second secure session between the memory card and the second accessing device in response to the open session command.
摘要:
In one embodiment, a scheme is provided for securing a personalized indicium assigned to a mobile communications device (116). Upon detecting at a network node (502) that an address associated with the mobile communications device (116) has changed, a challenge-and-response procedure (516, 518) is negotiated between the mobile communications device (116) and the network node (502) for authenticating the personalized indicium using a shared authentication key.