Abstract:
Systems, methods and products are described that provide a dock for favorite applications. One aspect includes providing a dock point on a display device of an information handling device; responsive to user input associated with said dock point, launching a utility organizing a sub-set of user applications installed on said information handling device in a predetermined arrangement of launch points; providing an animated movement of said launch points in said utility responsive to user input; and responsive to user input selecting a launch point in said utility, launching an application associated with said launch point on the information handling device. Other embodiments are described.
Abstract:
Devices, methods and products are described that provide removable storage device data protection. One aspect provides a method comprising: ascertaining a protected removable storage device connected to an information handling device, said protected removable storage device having a first partition for storing data according to a first file system type, and a second partition for storing user data according to a second file system type; and responsive to said information handling device recognizing said second file system type, querying for user credentials to decrypt a data encryption key used to encrypt said user data of said second partition. Other embodiments are described.
Abstract:
An exemplary apparatus includes one or more processors; memory; circuitry configured to hash a value associated with core root of trust measurement code and system management code; store the hash in a secure register; load an operating system; validate a certificate associated with the core root of trust measurement code and validate a certificate associated with the system management code; based on the validated certificates, provide an expected hash associated with the core root of trust measurement code and the system management code; decide if the expected hash matches the hash stored in the register; and, if the expected hash matches the hash stored in the register, commence a dynamic root of trust measurement session. Various other apparatuses, systems, methods, etc., are also disclosed.
Abstract:
Systems, methods and products are described that provide a dock for favorite applications. One aspect includes providing a dock point on a display device of an information handling device; responsive to user input associated with said dock point, launching a utility organizing a sub-set of user applications installed on said information handling device in a predetermined arrangement of launch points; providing an animated movement of said launch points in said utility responsive to user input; and responsive to user input selecting a launch point in said utility, launching an application associated with said launch point on the information handling device. Other embodiments are described.
Abstract:
Systems, methods and products are described that provide homepage re-assignment. One aspect includes displaying a default homepage desktop view from among a plurality of scrollable desktop views; receiving user input via a user input device; opening a homepage re-assignment utility responsive to receiving said user input, said homepage re-assignment utility including a display indicating one or more desktop views selectable as a new homepage; and responsive to receiving a user input indicating a selection of a desktop view as a new homepage, changing a default homepage setting to a desktop view selected as a new homepage. Other embodiments are described.
Abstract:
An apparatus, system, and method are disclosed for securely authorizing changes to a transaction restriction. A security module securely stores encryption keys for a payment instrument. The payment instrument electronically transacts payments and includes a transaction restriction. An authentication module receives an authentication from a user of the payment instrument. The security module validates the authentication with a first encryption key. In addition, the security module authorizes a change to the transaction restriction using a second encryption key if the authentication is valid. The security module resides on a computer that the user designates as authorized to validate the authentication.
Abstract:
In one aspect a method includes: detecting an initial input indicating a user selection disabling touch input for a touch input device of an information handling device; providing a dialog box to a user offering an opportunity to provide an appropriate input confirming the initial input; responsive to expiration of a predetermined time, reverting back to a default mode wherein touch input is enabled; and responsive to receiving a confirming input prior to the expiration of the predetermined time, disabling touch input on the touch input device of the information handling device. Other aspects are described and claimed.
Abstract:
Devices, methods and products are described that provide for recording an unauthorized event, such as rooting, on an information handling device. One aspect provides a method comprising determining whether at least one unauthorized event has occurred on an information handling device; setting at least one unauthorized event flag stored on the information handling device responsive to an unauthorized event; and allowing external access to the at least one unauthorized event flag. Other embodiments and aspects are also described herein.
Abstract:
Systems, methods and products are described that provide homepage re-assignment. One aspect includes displaying a default homepage desktop view from among a plurality of scrollable desktop views; receiving user input via a user input device; opening a homepage re-assignment utility responsive to receiving said user input, said homepage re-assignment utility including a display indicating one or more desktop views selectable as a new homepage; and responsive to receiving a user input indicating a selection of a desktop view as a new homepage, changing a default homepage setting to a desktop view selected as a new homepage. Other embodiments are described.
Abstract:
An apparatus, system, and method are disclosed for securely authorizing changes to a transaction restriction. A security module securely stores encryption keys for a payment instrument. The payment instrument electronically transacts payments and includes a transaction restriction. An authentication module receives an authentication from a user of the payment instrument. The security module validates the authentication with a first encryption key. In addition, the security module authorizes a change to the transaction restriction using a second encryption key if the authentication is valid. The security module resides on a computer that the user designates as authorized to validate the authentication.