摘要:
The present invention relates to a communication method, device, and system. The communication method include using low-frequency alternating magnetic field signals to control a communication distance between a first radio frequency (RF) device and second RF device. The communication device receives and uses a first low-frequency alternating magnetic field signal transmitted from a second RF device to control the communication distance to the second RF device. The communication system includes a first RF device and a second RF device. The first RF device generates and transmits a first low-frequency alternating magnetic field signal and receives a second low-frequency alternating magnetic field signal, and the second RF device generates and transmits the second low-frequency alternating magnetic field signal and receives the first low-frequency alternating magnetic field signal. The first RF device and the second RF device control the communication distance using the first and second low-frequency alternating magnetic field signals.
摘要:
A computer-implemented method, carried out by one or more processors, for utilizing one or more input methods for passwords. In an embodiment, the method comprises the steps of determining, by one or more processors, one or more input methods supported for a password entry, wherein the password entry verifies a user's credentials; receiving, by one or more processors, a candidate password through the one or more input methods, wherein each character of the candidate password has an associated input method; and storing, by one or more processors, the candidate password as the password entry, along with the associated input method for each character of the candidate password.
摘要:
A method for managing, by device, a matrix of keys, including at least one line and at least two columns, each key making short circuiting a line and a column when pressed. The method includes a sweeping phase, including, for each line: writing a predetermined logic value in the line; and for each column, reading a logic value in the column and comparing the read logic value and the predetermined logic value. For each line processed: the writing step is carried out during a predetermined time interval. For each column, the reading step is carried out during a first portion of the time interval. The sweeping phase further includes, for each column, writing the predetermined logic value in the column during a second portion of the predetermined time interval. The predetermined time interval is equal to the sum of the durations of the first and second portions.
摘要:
The solution provides a method of secret information entering into an electronic digital device by a user via the input/output device, when the electronic digital device assigns a multimedia information designed for interaction containing the elements (1) is such a way that their relation to control elements of the electronic digital device is variable between individual displays. Then, the user selects elements (1) of multimedia information designed for interaction assigned to elements (2) of secret information in an order corresponding with the order of elements (2) of secret information, so by selecting the elements (1) of multimedia information designed for interaction the user selects the elements (2) of secret information in given order.
摘要:
A secure keypad including a housing, a keymat within the housing defining a plurality of depressible keys and including at least one conductive trace traversing at least some of the depressible keys, a key contact board within the housing and being cooperative with the keymat for providing data entry inputs responsive to depression of the depressible keys and a tamper detection circuit coupled to the conductive trace for providing an output indication of tampering with the keypad responsive to a change in the electrical characteristics of the conductive trace resulting from the tampering.
摘要:
In general, the invention provides a computer architecture designed for enhanced data security. In embodiments, the architecture comprises two sub-systems, each with their own processing units and memories, and a defined set of interfaces that interconnect the two sub-systems and the external world. One sub-system is designed to provide a familiar environment for running computer applications. The other sub-system is designed to provide a secure bridge between the first sub-system and users via input and output devices.
摘要:
An identity verification device comprises a cellular telecommunications modem and a fingerprint scanner coupled to the modem, the verification device being configured for storing first fingerprint data in an enrollment process and being operable, in response to the modem receiving a verification command via a cellular telecommunications network, to perform a verification process in which the fingerprint scanner scans a fingerprint to obtain second fingerprint data, the first and second fingerprint data are compared with each other, and in the event of a match between the first and second fingerprint data, the modem transmits a response signal to a predetermined destination via the telecommunications network. The device may be used in a networked telecommunications system in which the electronic transactions may be initiated by smart cards and other devices.
摘要:
A system/method for preventing a computer virus from accessing message addresses is described. The system comprises an interception component or client plug-in that communicates with a messaging client and a messaging server. The interception component alters messages from the server and destined for the client. The interception component replaces message addresses in incoming messages with a unique identifier. The interception component also alters messages from the client destined for the server. The interception component replaces a unique identifier with a message addresses. A system/method for preventing keyboard sniffer programs from intercepting input, a system for preventing a computer virus from activating a send confirmation of a messaging client and a method for altering displayed objects to show encrypted data in decrypted form are also described and claimed. A system/method for reducing the impact of keyboard sniffer programs by altering keyboard input.
摘要:
An authentication channel is established between a mobile device and a transaction terminal that uses a keypad for access control. The terminal keypad is assumed to be untrusted, whereas the mobile device has a trusted interface that only the device user can access and use. The transaction terminal includes a short-range communication device, and a keypad interface application configured to communicate with an external keypad device in lieu of the transaction terminal's own keypad. The mobile device includes a mobile app. In response to detecting a user access request, a handshake protocol is performed between the keypad interface application in the transaction terminal and the keypad interface function in the mobile device. If the handshake protocol succeeds, the user is notified that the transaction terminal is trusted. The user then enters his or her password and/or PIN on the mobile device in lieu of direct entry via the terminal keypad.
摘要:
An authentication channel is established between a mobile device and a transaction terminal that uses a keypad for access control. The terminal keypad is assumed to be untrusted, whereas the mobile device has a trusted interface that only the device user can access and use. The transaction terminal includes a short-range communication device, and a keypad interface application configured to communicate with an external keypad device in lieu of the transaction terminal's own keypad. The mobile device includes a mobile app. In response to detecting a user access request, a handshake protocol is performed between the keypad interface application in the transaction terminal and the keypad interface function in the mobile device. If the handshake protocol succeeds, the user is notified that the transaction terminal is trusted. The user then enters his or her password and/or PIN on the mobile device in lieu of direct entry via the terminal keypad.