摘要:
A password recovery technique for access to a system includes receiving a request from a first party to recover the first party's password to access the system, receiving a selection of a second party from the first party, sending a message to the second party requesting that the second party authorize the request to recover the first party's password, receiving authorization from the second party for the request to recover the first party's password, and resetting the first party's password responsive to receiving authorization from the second party.
摘要:
Disclosed herein are systems, computer-implemented methods, and tangible computer-readable media for matching faces. The method includes receiving an image of a face of a first person from a device of a second person, comparing the image of the face of the first person to a database of known faces in a contacts list of the second person, identifying a group of potential matching faces from the database of known faces, and displaying to the second person the group of potential matching faces. In one variation, the method receives input selecting one face from the group of potential matching faces and displays additional information about the selected one face. In a related variation, the method displays additional information about one or more face in the displayed group of potential matching faces without receiving input.
摘要:
Apparatus, methods and/or computer program products are provided that facilitate entering secure passwords into a user device. A user requested image is displayed via a display or monitor of a user device. The image is zoomable to one or more higher resolution levels beyond an initial display resolution, and the image is displayed at higher resolution levels in response to a user activating a zoom function via the user device. The coordinates of a user selected feature within a displayed higher resolution level image are obtained and translated into a password. The password is then entered into the requesting application.
摘要:
Encryption with keys that form an Abelian group are used in combination with a semi-trusted party that converts queries that are encrypted with the key of a querier to queries that are encrypted with the key of the encrypted database, without knowing the actual keys. In an illustrative embodiment, encryption is done with Bloom filters that employ Pohlig-Hellman encryption. Since the querier's key is not divulged, neither the semi-trusted party nor the publisher of the database can see the original queries. Provision can be made for fourth party “warrant servers”, as well as “censorship sets” that limit the data to be shared.
摘要:
Apparatus, methods and/or computer program products are provided that facilitate entering secure passwords into a user device. A user requested image is displayed via a display or monitor of a user device. The image is zoomable to one or more higher resolution levels beyond an initial display resolution, and the image is displayed at higher resolution levels in response to a user activating a zoom function via the user device. The coordinates of a user selected feature within a displayed higher resolution level image are obtained and translated into a password. The password is then entered into the requesting application.
摘要:
A method and system for controlling display of multimedia content. A request to display a multimedia program is received, a motion state of a display enablement device (DED) is determined, and based on the motion state of the DED, a determination is made whether to respond to the display request by providing the multimedia program for display. A determination may be made to provide the multimedia program for display for so long as the motion state of the DED is continually changed. A determination may also be made to provide the multimedia content for so long as the motion state of the DED is continually changed in accordance with a selected pattern. A determination may also be made to provide the multimedia content if a relatively constant motion state of the DED is maintained for a selected time period.
摘要:
A system for secure data transfer using a dual-access disk drive. The disk drive is connected to a first computer and a second computer. The first computer may be connected to a first network and the second computer may be connected to a second network. Each of the first computer and the second computer has write access to a portion of the disk drive, different from the portion to which the other computer has write access, and read access to the entire disk drive. The first computer transfers data to the second computer by placing data on the disk to be read by the second computer. Similarly, the second computer transfers data to the first computer by placing data on the disk to be read by the first computer. The first computer and the second computer can transfer data without any direct physical connection or communication. The disk drive is adapted to control access, preventing conflicting attempts at access by the first disk drive and the second disk drive.
摘要:
Methods, systems, and computer-readable media for providing contextual feedback to a user of a computer system upon detection of an invasion of the computer system are provided herein. An invasion of the computer system is detected and a contextually appropriate alert is selected from a set of alerts. The alert is played immediately upon detection of the invasion so that the user is alerted to the invasion within close temporal proximity to the user's action that resulted in the invasion of the computer system. In addition, details of the invasion are logged to a diagnostic log file for later use by support personnel in repairing the computer system.
摘要:
Encryption with keys that form an Abelian group are used in combination with a semi-trusted party that converts queries that are encrypted with the key of a querier to queries that are encrypted with the key of the encrypted database, without knowing the actual keys. In an illustrative embodiment, encryption is done with Bloom filters that employ Pohlig-Hellman encryption. Since the querier's key is not divulged, neither the semi-trusted party nor the publisher of the database can see the original queries. Provision can be made for fourth party “warrant servers”, as well as “censorship sets” that limit the data to be shared.
摘要:
Apparatus, methods and/or computer program products are provided that facilitate entering secure passwords into a user device. A user requested image is displayed via a display or monitor of a user device. The image is zoomable to one or more higher resolution levels beyond an initial display resolution, and the image is displayed at higher resolution levels in response to a user activating a zoom function via the user device. The coordinates of a user selected feature within a displayed higher resolution level image are obtained and translated into a password. The password is then entered into the requesting application.