PASSWORD ENTRY USING 3D IMAGE WITH SPATIAL ALIGNMENT
    71.
    发明申请
    PASSWORD ENTRY USING 3D IMAGE WITH SPATIAL ALIGNMENT 审中-公开
    密码输入使用3D图像与空间对齐

    公开(公告)号:US20150033329A1

    公开(公告)日:2015-01-29

    申请号:US14505545

    申请日:2014-10-03

    Abstract: A method of controlling access to an electronic device is disclosed. The method comprises: generating a modified first image from a first image, wherein the first image and the modified first image include a first image reference point; generating a modified second image from a second image, wherein the second image and the modified second image include a second image reference point; displaying a three dimensional representation of the modified first image overlaid by the modified second image; authenticating access to the electronic device in response to substantial alignment of the first image reference point in the modified first image with the second image reference point in the modified second image.

    Abstract translation: 公开了一种控制对电子设备的访问的方法。 该方法包括:从第一图像生成经修改的第一图像,其中第一图像和修改后的第一图像包括第一图像参考点; 从第二图像生成修改的第二图像,其中所述第二图像和所述修改的第二图像包括第二图像参考点; 显示经修改的第二图像覆盖的经修改的第一图像的三维表示; 响应于修改的第一图像中的第一图像参考点与修改的第二图像中的第二图像参考点的实质对准,对电子设备进行认证。

    METHOD AND SYSTEM FOR CONTROLLING SYSTEM SETTINGS OF A COMPUTING DEVICE
    72.
    发明申请
    METHOD AND SYSTEM FOR CONTROLLING SYSTEM SETTINGS OF A COMPUTING DEVICE 有权
    用于控制计算设备的系统设置的方法和系统

    公开(公告)号:US20150019857A1

    公开(公告)日:2015-01-15

    申请号:US14339723

    申请日:2014-07-24

    Abstract: Methods and devices for controlling system settings of a computing device are described herein. One example embodiment comprises: determining configuration data associated with a software application, wherein the configuration data identifies one or more new system settings to be temporarily enforced on the computing device during an execution of the software application, and wherein the configuration data is digitally signed; and in response to an initiation of the execution of the software application, reconfiguring system settings on the computing device; wherein the reconfiguring comprises verifying at least one digital signature associated with the digitally signed configuration data; wherein if the at least one digital signature associated with the digitally signed configuration data successfully verifies, then the reconfiguring further comprises temporarily enforcing new system settings for the duration of the execution of the software application.

    Abstract translation: 本文描述了用于控制计算设备的系统设置的方法和设备。 一个示例性实施例包括:确定与软件应用相关联的配置数据,其中所述配置数据识别在所述软件应用的执行期间在所述计算设备上临时执行的一个或多个新的系统设置,并且其中所述配置数据被数字签名; 并且响应于启动所述软件应用的执行,重新配置所述计算设备上的系统设置; 其中所述重新配置包括验证与所述经数字签名的配置数据相关联的至少一个数字签名; 其中如果与所述数字签名的配置数据相关联的所述至少一个数字签名成功地验证,则所述重新配置还包括在所述软件应用的执行期间暂时执行新的系统设置。

    SYSTEM AND METHOD FOR CONTROLLING ACCESS TO SECURE RESOURCES
    73.
    发明申请
    SYSTEM AND METHOD FOR CONTROLLING ACCESS TO SECURE RESOURCES 有权
    用于控制访问安全资源的系统和方法

    公开(公告)号:US20150007310A1

    公开(公告)日:2015-01-01

    申请号:US14485855

    申请日:2014-09-15

    Abstract: A system and method for controlling access to a secure resource in a device are disclosed. In some embodiments, the device may include a processor capable of receiving a first request from a first application of a plurality of applications executable by the processor, where the first request requests access to the secure resource, and the first request identifies the plurality of applications. In response to the first request, the processor is capable of generating a ticket associated with the secure resource and with each of the plurality of applications, and then storing the ticket in a memory. After receiving a second request from a second application requesting access to the secure resource, the processor is capable of granting the second application access to the secure resource, if the ticket associated with the secure resource exists and if the ticket is associated with the second application.

    Abstract translation: 公开了一种用于控制对设备中的安全资源的访问的系统和方法。 在一些实施例中,设备可以包括能够从第一应用接收可由处理器执行的多个应用的​​第一请求的处理器,其中第一请求请求对安全资源的访问,并且第一请求标识多个应用 。 响应于第一请求,处理器能够生成与安全资源和多个应用程序中的每一个相关联的票据,然后将票据存储在存储器中。 在从第二应用程序接收到请求访问安全资源的第二请求之后,如果存在与安全资源相关联的票据,并且如果票据与第二应用程序相关联,则处理器能够授予对安全资源的第二应用访问 。

    Simplified multi-factor authentication
    74.
    发明授权
    Simplified multi-factor authentication 有权
    简化多因素身份验证

    公开(公告)号:US08812864B2

    公开(公告)日:2014-08-19

    申请号:US13738456

    申请日:2013-01-10

    Abstract: A reader element is associated with an identity verification element. The reader element has a biometric input device and is configured, through enrollment of a biometric element is used to encrypt a character sequence associated with the identity verification element. In a verification phase subsequent to the enrollment, a user may be spared a step of providing the character sequence by, instead, providing the biometric element. Responsive to receiving the biometric element, the reader element may decrypt the character sequence and provide the character sequence to the identity verification element.

    Abstract translation: 读取器元件与身份验证元件相关联。 读取器元件具有生物特征输入设备,并且被配置为通过注册生物特征元素来加密与身份验证元件相关联的字符序列。 在注册之后的验证阶段中,用户可以不用提供生物特征元素来提供字符序列的步骤。 响应于接收生物特征元素,读取器元件可以解密字符序列并将字符序列提供给身份验证元件。

    SYSTEM AND METHOD FOR PROCESSING ENCODED MESSAGES FOR EXCHANGE WITH A MOBILE DATA COMMUNICATION DEVICE
    75.
    发明申请
    SYSTEM AND METHOD FOR PROCESSING ENCODED MESSAGES FOR EXCHANGE WITH A MOBILE DATA COMMUNICATION DEVICE 有权
    用移动数据通信设备处理用于交换的编码消息的系统和方法

    公开(公告)号:US20130318344A1

    公开(公告)日:2013-11-28

    申请号:US13957574

    申请日:2013-08-02

    Abstract: A system and method are provided for pre-processing encrypted and/or signed messages at a host system before the message is transmitted to a wireless mobile communication device. The message is received at the host system from a message sender. There is a determination as to whether any of the message receivers has a corresponding wireless mobile communication device. For each message receiver that has a corresponding wireless mobile communication device, the message is processed so as to modify the message with respect to one or more encryption and/or authentication aspects. The processed message is transmitted to a wireless mobile communication device that corresponds to the first message receiver. The system and method may include post-processing messages sent from a wireless mobile communications device to a host system. Authentication and/or encryption message processing is performed upon the message. The processed message may then be sent through the host system to one or more receivers.

    Abstract translation: 提供了一种用于在将消息发送到无线移动通信设备之前在主机系统处理加密和/或签名消息的系统和方法。 消息在主机系统从消息发送方接收。 确定任何消息接收机是否具有相应的无线移动通信设备。 对于具有相应的无线移动通信设备的每个消息接收机,处理消息以便相对于一个或多个加密和/或认证方面修改消息。 经处理的消息被发送到对应于第一消息接收器的无线移动通信设备。 该系统和方法可以包括从无线移动通信设备发送到主机系统的后处理消息。 对消息执行认证和/或加密消息处理。 经处理的消息然后可以通过主机系统发送到一个或多个接收器。

    Device And Method For Improving Efficiency Of Entering A Password Using A Key-Limited Keyboard
    76.
    发明申请
    Device And Method For Improving Efficiency Of Entering A Password Using A Key-Limited Keyboard 有权
    使用键盘有限键盘提高输入密码效率的设备和方法

    公开(公告)号:US20130305180A1

    公开(公告)日:2013-11-14

    申请号:US13947522

    申请日:2013-07-22

    CPC classification number: G06F3/0484 G06F3/0233 G06Q20/206

    Abstract: A method is provided for reducing a number of keys that a user is required to depress on a device having a keyboard with a limited number of keys when the user enters a password. The method comprising the following steps. A subset of characters used to define the password is determined. A filter to apply to the keyboard is determined in accordance with the determined subset of characters. The filter is applied when the user depresses the keys. Devices: and computer readable medium for implementing the method arc also provided.

    Abstract translation: 提供了一种方法,用于当用户输入密码时减少用户需要按下具有键盘数量有限的键盘的设备的键数量。 该方法包括以下步骤。 确定用于定义密码的字符的子集。 根据确定的字符子集来确定应用于键盘的滤波器。 当用户按下键时,应用滤镜。 还提供了用于实现方法弧的装置和计算机可读介质。

    Stored image privacy violation detection method and system

    公开(公告)号:US11625495B2

    公开(公告)日:2023-04-11

    申请号:US16669927

    申请日:2019-10-31

    Abstract: Methods and systems for detecting a privacy violation in an image file. A policy to be used by a master imaging application is obtained and a file system is monitored for a digital image modified by a monitored imaging application. It is then determined that the digital image file includes at least some content in violation of a defined setting for the master imaging application and, based on the determination that the digital image file includes at least some content in violation of the defined setting for the master imaging application, taking an action.

    Communication system with digital wallet having blank user card and related methods

    公开(公告)号:US11562343B2

    公开(公告)日:2023-01-24

    申请号:US16186093

    申请日:2018-11-09

    Abstract: A mobile wireless communications device communicates with a terminal including a first NFC device, the terminal being capable of receiving data from a provisioning server. The mobile wireless communications device includes a housing, a wireless transceiver carried by the housing, a second NFC device carried by the housing, a memory carried by the housing, a display carried by the housing, and a processor carried by the housing and coupled to the wireless transceiver, the second NFC device, the memory, and the display. The processor is configured to implement a digital wallet including user cards, receive from the terminal, via the second NFC device, a blank user card including user data fields, and fill the user data fields of the blank user card to define a completed user card and send the completed user card to the provisioning server.

    Shared image sanitization method and system

    公开(公告)号:US11418545B2

    公开(公告)日:2022-08-16

    申请号:US16669858

    申请日:2019-10-31

    Abstract: Methods and systems for removing sensitive information from a digital image. An instruction to share a digital image is received. It is then determined that the digital image contains a depiction of a corporate display medium that is classified as sensitive based on a policy and, based on the determination that the digital image contains the depiction of the corporate display medium that is classified as sensitive based on the policy, the digital image is processed to modify the depiction. The digital image is shared.

Patent Agency Ranking