摘要:
A digital memory system comprises: a mobile recording device having a first docking structure, a recording equipment for recording a voice message and a data storage for storing the recorded voice message; and a docking station having a second docking structure corresponding to the first docking structure of the recording device and a connection structure for connecting the docking station to an end device The first docking structure of the mobile recording device, the second docking structure of the docking station and the connection structure of the docking station are arranged to transmit the voice message stored in the data memory of the mobile recording device to the end device. The docking station comprises a temporary data storage in which the voice message transmitted from the data storage of the mobile recording device is storable before being transmitted to the end device. The digital memory system according to the invention makes a convenient and efficient gathering of notes in the form of voice messages possible. Particularly providing the temporary data storage within the docking station allows for a fast and comfortable transfer of the voice messages recorded on and stored in the mobile recording device.
摘要:
A computer implemented multi-factor authentication method for authenticating a user of a secured component (21, 31; 216; 217; 218; 219), comprises the user requesting access to the secured component (21, 31; 216; 217; 218; 219) via a client device (2); the client device (2) providing a first authentication factor (22; 226; 227, 237; 228; 229) to the user; the user providing the first authentication factor (22; 226; 227, 237; 228; 229) to a personal device (5; 56; 57; 58; 59) which is associated to the user at an authentication component (51, 61; 526, 527, 528, 529), wherein the client device (2) and the personal device (5; 56; 57; 58; 59) are physically distinct units; the user providing a second authentication factor to the personal device; the personal device (5; 56; 57; 58; 59) forwarding the first authentication factor (22; 226; 227, 237; 228; 229) and the second identification factor to the authentication component (51, 61; 526, 527, 528, 529); the authentication component (51, 61; 526, 527, 528, 529) verifying identity of the user and providing an access token (62) to the secured component (21, 31; 216; 217; 218; 219); and the secured component (21, 31; 216; 217; 218; 219) providing the user access to the secured component (21, 31; 216; 217; 218; 219) on the client device (2) in accordance with the access token (62). The method according to the invention allows for completely separating the authentication process from the application or usage of the secured component. Thereby, it can be prevented that any user credentials or authentication information of the user are to be inputted or provided to the client device. Such a separation of the authentication process allows for increasing security of the authentication process. Also, blocking the system, e.g. by applying a brute force attack, can be prevented.
摘要:
A computer implemented multi-factor authentication method for authenticating a user of a secured component (21, 31; 216; 217; 218; 219), comprises the user requesting access to the secured component (21, 31; 216; 217; 218; 219) via a client device (2); the client device (2) providing a first authentication factor (22; 226; 227, 237; 228; 229) to the user; the user providing the first authentication factor (22; 226; 227, 237; 228; 229) to a personal device (5; 56; 57; 58; 59) which is associated to the user at an authentication component (51, 61; 526, 527, 528, 529), wherein the client device (2) and the personal device (5; 56; 57; 58; 59) are physically distinct units; the user providing a second authentication factor to the personal device; the personal device (5; 56; 57; 58; 59) forwarding the first authentication factor (22; 226; 227, 237; 228; 229) and the second identification factor to the authentication component (51, 61; 526, 527, 528, 529); the authentication component (51, 61; 526, 527, 528, 529) verifying identity of the user and providing an access token (62) to the secured component (21, 31; 216; 217; 218; 219); and the secured component (21, 31; 216; 217; 218; 219) providing the user access to the secured component (21, 31; 216; 217; 218; 219) on the client device (2) in accordance with the access token (62). The method according to the invention allows for completely separating the authentication process from the application or usage of the secured component. Thereby, it can be prevented that any user credentials or authentication information of the user are to be inputted or provided to the client device. Such a separation of the authentication process allows for increasing security of the authentication process. Also, blocking the system, e.g. by applying a brute force attack, can be prevented.
摘要:
A method of controlling a computer being operatively connected to a keyboard (13) and a screen (11), comprises the steps of: displaying on the screen (11) a graphical user interface (14) having a control symbol (141), moving the control symbol (141) of the graphical user interface (14) on the screen (11), and detecting a click signal together with an associated click position of the control symbol (141). The method further comprises the steps of: providing a camera (12) being operatively connected to the computer, capturing a sequence of image frames of a predefined area by means of the camera (12), detecting a movement (221) of a predefined part of a body (22) of a user in two dimensions inside the predefined area by analyzing the sequence of image frames, and moving the control symbol (141) of the graphical user interface (14) on the screen (11) in accordance with the detected movement (221) of the predefined part of the body (22). The method according to the invention allows for a convenient precise moving of the control signal (141) by means of the predefined part of the body (22) of the user wherein the hands of the user can be kept on or above the keyboard. This makes it possible to efficiently change between typing on the keyboard and moving the control symbol (141) on the screen (11) or providing the click signal, respectively. Further, the method according to the invention allows for a sophisticated control of the computer by people having certain handicaps.