摘要:
A method for authorizing access to a first computing device is provided. The method comprises the first computing device forming a challenge, encoding the challenge into a symbol, and displaying the symbol. The first computing device receives a request for access from a user. Access to the first computing device is allowed in response to provision of an access code to the first computing device by the user. The access code is formed by a server in response to capturing the symbol, decoding the symbol into the challenge, forming a request from the challenge, and providing the request to the server. The server forms a decision to allow access by the user to the first computing device.
摘要:
A method for authorizing access to a first computing device is provided. The method comprises the first computing device forming a challenge, encoding the challenge into a symbol, and displaying the symbol. The first computing device receives a request for access from a user. Access to the first computing device is allowed in response to provision of an access code to the first computing device by the user. The access code is formed by a server in response to capturing the symbol, decoding the symbol into the challenge, forming a request from the challenge, and providing the request to the server. The server forms a decision to allow access by the user to the first computing device.
摘要:
A method for authorizing access to a first computing device is provided. The method comprises the first computing device forming a challenge, encoding the challenge into a symbol, and displaying the symbol. The first computing device receives a request for access from a user. Access to the first computing device is allowed in response to provision of an access code to the first computing device by the user. The access code is formed by a server in response to capturing the symbol, decoding the symbol into the challenge, forming a request from the challenge, and providing the request to the server. The server forms a decision to allow access by the user to the first computing device.
摘要:
Methods and apparatus for presenting confidential presentations are presented. For example, a method for providing a confidential presentation includes providing a data stream by a stream server of a provider of the confidential presentation to a participant client, providing virtual world elements from a virtual world provider to the participant client, and forming, by the participant client, virtual world display data comprising the data stream and the virtual world elements. The virtual world provider is distinct from the provider of the confidential presentation.
摘要:
A method for authorizing access to a first computing device is provided. The method comprises the first computing device forming a challenge, encoding the challenge into a symbol, and displaying the symbol. The first computing device receives a request for access from a user. Access to the first computing device is allowed in response to provision of an access code to the first computing device by the user. The access code is formed by a server in response to capturing the symbol, decoding the symbol into the challenge, forming a request from the challenge, and providing the request to the server. The server forms a decision to allow access by the user to the first computing device.
摘要:
A method for providing e-token based access control to virtual world (VW) spaces includes intercepting a request from a first VW member to invite a second VW member to a VW space within a VW network, the request intercepted outside of the VW network. The access controls also include using a secret code associated with the first member to generate an e-token that includes an identifier of the second member and the space. The access controls further include sending the e-token inside the network. In response to a request for access to the space, the access controls include sending the e-token outside of the network for verification. Upon successful verification of the e-token, the access controls include accessing the network and controlling a guard bot inside the network to grant access for the second member to the space. The guard bot adds the second member to an access control list.
摘要:
A method for tracking a plurality of containers each joined to an electronic tracking device having routing capabilities and a WPAN-enabled radio receiver/transmitter configured to attempt to connect to a pre-configured WPAN upon being activated comprises activating the radio receiver/transmitter of each tracking device joined to a container being loaded onto a cargo vessel; receiving an indication from each tracking device that fails to connect to the WPAN; intermittently performing a network scan to locate each WPAN-connected tracking device; intermittently configuring the WPAN to include each WPAN-connected tracking device in a hybrid tree-mesh network topology; intermittently configuring routing information stored on each WPAN-connected tracking device to maintain mutual communication with each WPAN-connected tracking device and enable mutual communication between each WPAN-connected tracking device; receiving transport-related data from each WPAN-connected tracking device; transmitting the transport-related data to a control station through a LAN on the vessel; broadcasting a request to be routed between the WPAN-connected tracking devices in a depth-first traversal of the network topology that directs each WPAN-connected tracking device to enter a low-power mode when the depth-first traversal backtracks from the tracking device; and receiving an acknowledgment of the request communicated from each WPAN-connected tracking device when the tracking device enters the low-power mode.
摘要:
This invention concerns methods for the protection of resources in an open digital communication system, which resources are residing in or owned by physically and organizationally distributed, independent entities connected through that system, e.g. the Internet. Since, in such an open system, any entity can in principle access any resource of any other entity, precautions must be taken to avoid or minimize the danger of resource corruption and destruction, to maintain privacy and, where necessary, confidentiality. Thus, protection of resources is of ultimate importance to warrant integrity and function of an entity. For the intelligent protection of such resources, in particular against unauthorized access, a variable-grained control of the name space (consisting of all names an entity provides) and/or the provision of attachable and detachable guards accompanying each call for a file and/or service is provided.
摘要:
A smart card, (a type of credit card containing storage capacity and processing ability preferably in the form of a microprocessor), is used to store an electronic ticket provided from the service provider's computer system to the customer's computer over an insecure communications line. Upon the request for a ticket from the customer's computer, the service provider's system transmits a ticket loading request token TLR to the customer's computer to be loaded into a smart card of the customer. The smart card responds to the ticket loading request token TLR by producing a ticket loading token TL containing a hash of the ticket loading request token TLR; the smart card's identifier TID; a secret number GC and ticket loading token TL′ from the previous transaction of the smart card. The hash signal is attached to the ticket loading token TL′ from the previous transaction and shipped back to the ticket provider. The ticket provider's system then creates the electronic ticket containing the ticket information and a new hash or signature TS number, formed by hashing the ticket information with the hash number received from the customer, and returns it to the customer's computer. The smart card checks the signature TS of the ticket and if it matches its own calculation of TS, accepts and stores the ticket. Once the ticket is entered, the smart card changes TL′ to TL in preparation for the next transaction.