摘要:
The present invention discloses a method and an apparatus for processing an authentication of a mobile terminal, wherein the method includes: a network side receiving an image identity message from a mobile terminal, wherein the image identity message carries current image feature information and a user identifier of the mobile terminal; and searching image feature information which is saved previously in a database by the user identifier of the mobile terminal, performing a corresponding algorithm match between the current image feature information and the image feature information according to a preset security level, and performing an authentication on the mobile terminal based on the result of the match. By means of the technical solution of the present invention applying, the image information collected by photo shooting is used as an identity identification password, therefore, the identity authentications of different security levels can be provided, and the security and the expansibility of the identity authentication of the mobile terminal is increased greatly.
摘要:
The present invention provides a device and method for controlling screen brightness. The method comprises: a light sensor acquiring a brightness signal intensity value of external environment and transmitting the brightness signal intensity value to a comparator; the comparator comparing the received brightness signal intensity value with a stored brightness signal intensity value and outputting a comparison result to an integrator; if the comparison result is that the received brightness signal intensity value is greater than the stored brightness signal intensity value, the integrator increasing the stored brightness signal intensity value by a fixed value according to the comparison result; and if the comparison result is that the received brightness signal intensity value is less than the stored brightness signal intensity value, the integrator decreasing the stored brightness signal intensity value by a fixed value according to the comparison result.
摘要:
A system to manage and control usage rights for cryptographic keys. A kernel process is provided with secure and exclusive authorization to access certain keys in a key hierarchy. Special authorization is required for other processes or users to access keys used by the kernel. A persistent storage area is used to hold a Kernel Authorization Data field for the root key and/or other keys used by the kernel or other specialized processes. The authorization data, and the keys it protects, can be used to protect other portions of, or the entire, key structure. The persistent storage area is reserved in a TPM or similar security hardware.
摘要:
A preferred embodiment of the invention uses local or internal public and private keys for signatures. The keys are obtained and managed internally by a kernel process having access to a secure key storage area. The kernel process is booted within a trusted platform and is the only process that is allowed to access the key storage area. The internal keys can be used in addition to external keys for both internal key-based and external key-based signatures on a single digital item. In a preferred embodiment, the kernel process also maintains revocation lists and is synchronized with other entities by having the same criteria (e.g., time-based) for revoking or expiring known internal keys
摘要:
A system to manage and control usage rights for cryptographic keys. A kernel process is provided with secure and exclusive authorization to access certain keys in a key hierarchy. Special authorization is required for other processes or users to access keys used by the kernel. A persistent storage area is used to hold a Kernel Authorization Data field for the root key and/or other keys used by the kernel or other specialized processes. The authorization data, and the keys it protects, can be used to protect other portions of, or the entire, key structure. The persistent storage area is reserved in a TPM or similar security hardware.
摘要:
A trusted platform in a digital processing system is maintained even when modules, or other processes or data, are loaded after a boot sequence. A configuration file is used to include measurements (e.g., hash values, signatures, etc.) of modules to be loaded. After secure boot-up the operating system kernel uses the configuration file to check module integrity prior to loading and executing. If a module does not verify against the configuration file data then the system can prevent further operation, restrict certain operations, indicate the non-trusted nature of the system or take other actions. In one embodiment, if a module does not pass the integrity check then the failed measurement is extended into a specific Platform Configuration Register (PCR) within a Trusted Platform Manager (TPM) process. Subsequently, client applications can determine if the platform is trustable based on the return of the PCR value. A local application (application running in the same platform) can “seal” secrets to a trusted platform. The operation of the application relies on the secrets, which can only be revealed in a trusted platform.
摘要:
The present invention discloses a method for buffering a cell by a crossbar switching matrix, which includes: sending a jitter timestamp to a switching port connected to the crossbar switching matrix through a link, and receiving a cell that is sent by the switching port and carries the jitter timestamp, in which the jitter timestamp indicates a jitter of the link itself; and using a sum of the jitter timestamp carried in the cell and a relative delay timestamp of the corresponding link as a total timestamp, and storing the cell in a buffering unit corresponding to the total timestamp in a cell buffer of the link, in which the relative delay timestamp indicates a difference of a delay of the link relative to a delay of a lowest link.
摘要:
The present invention provides a data transmission method including: sending, by a transmitter, a source data frame to a receiver, and saving, the source data frame; sending, by the transmitter, other data frames to the receiver, and saving the other data frames; receiving, by the transmitter, a data retransmission notification which is related to the source data frame and sent by the receiver; and retrieving, by the transmitter, the source data frame and other data frames from a storage space, where the other data frames are sent by the transmitter to the receiver in a time period from sending the source data frame by the transmitter to receiving the data retransmission notification by the transmitter, and retransmitting the source data frame and the other data frames to the receiver.
摘要:
A method and apparatus for authorizing a file to use stored information for executing a process in a Linux operating system. The file includes an executable linking format, an application authorization data, and other attributes for the application.
摘要:
The present invention provides a device and method for controlling screen brightness. The method comprises: a light sensor acquiring a brightness signal intensity value of external environment and transmitting the brightness signal intensity value to a comparator; the comparator comparing the received brightness signal intensity value with a stored brightness signal intensity value and outputting a comparison result to an integrator; if the comparison result is that the received brightness signal intensity value is greater than the stored brightness signal intensity value, the integrator increasing the stored brightness signal intensity value by a fixed value according to the comparison result; and if the comparison result is that the received brightness signal intensity value is less than the stored brightness signal intensity value, the integrator decreasing the stored brightness signal intensity value by a fixed value according to the comparison result.