摘要:
A method of authenticating a user of a computing device is proposed, together with computing device on which the method is implemented. In the method a modified base image is overlaid with a modified overlay image on a display. At least one of the modified base image and modified overlay image is moved by the user. Positive authentication is indicated in response to the base image reference point on the modified base image being aligned, at least one of the base image reference point and the overlay image reference point having coordinates in three dimensions.
摘要:
Often, for reasons of wireless bandwidth conservation, incomplete messages are provided to wireless messaging devices. Employing cryptography, for confidentiality or authentication purposes, when including a received message that has been incompletely received can lead to lack of context on the receiver's end. By automatically obtaining the entirety of the message to be included, an outgoing message that includes the received message can be processed in a manner that securely and accurately represents the intended outgoing message. Alternatively, a server can assemble a composite message from a new message and an original message and, in cooperation with a wireless messaging device, construct a cryptographic message syntax message.
摘要:
Often, for reasons of wireless bandwidth conservation, incomplete messages are provided to wireless messaging devices. Employing cryptography, for secrecy or authentication purposes, when including a received message that has been incompletely received can lead to lack of context on the receiver's end. By automatically obtaining the entirety of the message to be included, an outgoing message that includes the received message can be processed in a manner that securely and accurately represents the intended outgoing message. Alternatively, a server can assemble a composite message from a new message and an original message and, in cooperation with a wireless messaging device, encrypt and sign the composite message. Conveniently, security considerations are maintained even in view of bandwidth optimization measures.
摘要:
A system and method of forwarding an e-mail from a wireless device is provided. The wireless device receives the e-mail message in portions as needed, the portions having the attachments contained therein. The portions of the e-mail message containing only a subset of attachments associated with the e-mail message in the user mailbox. When a wireless device forwards the e-mail message to one or more recipients a message identifier and an attachment indicator is provided for identifying the number of attachments in the e-mail message to be forwarded. The identified e-mail message is retrieved and the attachments are extracted from the retrieved e-mail message based on the attachment indicator. The e-mail message is forwarded to the one or more recipients and the extracted attachments.
摘要:
An apparatus, and an associated method, facilitates security at a wireless device, such as a wireless device comprising a mobile computing platform. A security decision engine is provided that monitors for an event necessitating a security decision. When a security decision is required, request is made of a knowledge fetcher, provided by a trusted third-party, installed at the wireless device for the security decision. The knowledge fetcher obtains the security decision, such as by obtaining the security decision from a remote, trusted third-party server, and provides the security decision to the decision engine. Use is made of the security decision pursuant to a setting for which the security decision is needed.
摘要:
Embodiments of the systems and methods described herein facilitate the transmitting, receiving, and processing of encoded messages wherein the header fields in the message header are protected. In one embodiment, the contents of the header fields to be protected are inserted into the message body as one or more additional lines of text, for example, prior to encoding and transmitting the message to a message recipient. Upon receipt of the message, the message recipient processes the encoded message such that the contents of the protected header fields can be extracted from the message body. Accordingly, by inserting the contents of the header fields to be protected into the message body, the header fields may be protected using existing standards and protocols for facilitating secure message communication.
摘要:
In one embodiment, a scheme is provided for managing secure registration of a mobile communications device (116). Upon being provided with an upgraded registration process that requires encryption, the mobile communications device (116) has the option of continuing to register with a network node (216) using a downgraded registration process within a specified time window which involves unencrypted registration requests and responses. Thereafter, the mobile communications device (116) is operable to select between the upgraded and downgraded registration processes.
摘要:
A mobile wireless communications device may include a near field communications (NFC) device, a microphone, a memory configured to store access information for each of a plurality of payment accounts, and a processor cooperating with the NFC device, the microphone, and the memory. The processor may be configured to capture a sound using the microphone, determine a given payment account from among the plurality thereof based upon the sound, and send the corresponding access information for the given payment account to a transaction terminal via the NFC device.