Abstract:
Examples associated with presence identification are described. One example includes detecting a presence identifier broadcast by a mobile device. The mobile device belongs to a user. A portion of the presence identifier is generated based on a one-time password seed. The portion of the presence identifier is provided to an identification server. Identifying information associated with the user is received from the identification server. The identification server uses the portion to identify the user based on the one-time password seed. An action is performed based on the identifying information.
Abstract:
In one example of the disclosure, an encrypted document and an encryption key for decrypting the encrypted document are received from a computer. Presence data for a printer is received via a first wireless network. A user instruction to print the encrypted document at the printer is received. A credential is received from the printer via the first wireless network, where the credential for communication with the printer via a second wireless network with greater bandwidth than the first wireless network. The encrypted document and the encryption key are sent to the printer, where the printer is to utilize the encryption key to decrypt the encrypted document and is to print the document following decryption.
Abstract:
An environment manager in a computer executes multiple environments concurrently. A user management framework (UMF) virtual machine on the computer runs an authentication domain that supports user profile management of the multiple environments.
Abstract:
An environment manager in a computer executes multiple environments concurrently. A user management framework (UMF) virtual machine on the computer runs an authentication domain that supports user profile management of the multiple environments.
Abstract:
In one example of the disclosure, an encrypted document and an encryption key for decrypting the encrypted document are received from a computer. Presence data for a printer is received via a first wireless network. A user instruction to print the encrypted document at the printer is received. A credential is received from the printer via the first wireless network, where the credential for communication with the printer via a second wireless network with greater bandwidth than the first wireless network. The encrypted document and the encryption key are sent to the printer, where the printer is to utilize the encryption key to decrypt the encrypted document and is to print the document following decryption.