摘要:
Techniques and tools are described which provide control access mechanisms for contents made available by a service provider to a user. The user, after a registration process, uses a mobile application on a mobile device to generate a one-time content key. The content key is input into a set-top box which validates the key and provides access to the protected content. The mobile application allows for password protection for the user, as well as a recharging ability when its one-time content keys are exhausted.
摘要:
A communication system and method are disclosed for establishing a secure communication channel including: a server for generating and storing a first instance of a unique personalized client application associated with a first-time user on the server, a client terminal for the user to communicate with the server over a communication channel and a standalone computing device having a second instance of the unique personalized application. The user authenticates the server based on a first dynamic identifier (DI-1) generated by the first instance of the unique personalized client application and the server authenticates the user based on a second dynamic identifier (DI-2) generated by the second instance of the unique personalized client application.
摘要:
A method, non-transitory computer readable medium, and apparatus that authenticates a user without personal information includes obtaining at a secure authentication computing apparatus a context identifier, a registration identifier of one of a plurality of string generator modules assigned to a client computing device requesting access, and a client string generated by the client computing device requesting access from an agent computing device associated with the client computing device requesting access. An authentication string is generated with the secure authentication computing apparatus based on the obtained context identifier and a corresponding one of the plurality of string generator modules provided to the client computing device requesting access based on the registration identifier. The requested access by the client computing device is granted with the secure authentication computing apparatus when the client string matches the authentication string.
摘要:
Methods and systems to control a license for a software application are disclosed. The methods and systems can include requesting a central licensing server for initial verification and authentication of at least one user of a software application and sending a identification application from the central licensing server to at least one of the first device or the second device. A license identifier can be generated in the first device or the second device and sent to the central licensing server. The central licensing server can respond by sending a license key generator program to generate a dynamic key. The dynamic key can be input in the second device to execute the software application.
摘要:
A method for processing information fed by a user via an inputting means is provided. The method enables, firstly, receiving a set of directional elements via a user interface. The set of directional elements represent textual or non-textual information fed by the user. Secondly, the method enables interpreting the set of directional elements. The set of directional elements are identified as a combination of motion of the inputting means on the user interface and one or more inputs from the inputting means. Further, the method enables converting the directional elements into a sequence and translating the sequence into the textual or non-textual information using a mapping format. The mapping format corresponds to a predetermined mapping format or a new mapping format. Finally, the method enables rendering the textual or non-textual information on the user interface in the form of one or more symbols.
摘要:
Embodiments of a system and method to perform a secure deletion of a set of data from a remote cloud computing system are described. As described, in some embodiments, a user of a cloud computing service that provides data storage may securely delete his stored set of data by acquiring elevated access privileges to the stored set of data, designating at least one most significant bit in at least one data block therein as a sentinel and recording its value and position, updating the value of the sentinels and thereby rendering the data unusable, and verifying the success of the operation by checking the new value of the sentinels against the original value. In some embodiments, the verification process may be repeated in order to ensure that the data has been rendered useless across all nodes of the remote cloud platform.
摘要:
The invention describes a method, firmware, and computer program product for generating one or more One Time Passwords (OTPs) for one or more applications. The firmware embedded in a computational device receives one or more registration details corresponding to an application from a user. Thereafter, the firmware generates a Dynamic Information Number (DIN) based on at least one of the registration details and an application identifier (SIID). The user registers with the application with the DIN and at least one of the registration details. Further, the user may access the application using an OTP generated by the firmware based on the DIN and the application identifier.
摘要:
The subject disclosure pertains to systems and methods for facilitating item retrieval and/or ranking. An original ranking of items can be modified and enhanced utilizing a Markov Random Field (MRF) approach based upon item similarity. Item similarity can be measured utilizing a variety of methods. An MRF similarity model can be generated by measuring of similarity between items. An original ranking of items can be obtained, where each document is evaluated independently based upon a query. For example, the original ranking can be obtained using a keyword search. The original ranking can be enhanced based upon similarity of items. For example, items that are deemed to be similar should have similar rankings. The MRF model can be used in conjunction with original rankings to adjust rankings to reflect item relationships.
摘要:
A method & system for human interactive proof (HIP) is provided. A user is provided to respond a query linked to a logical captcha object or an analytical captcha object. Upon receiving inputs from the user, the correct information of the said captcha & the user's input is compared. If the user's input and the correct information of the captcha object matches then the user is authenticated as human, else the user is authenticated as not a human.
摘要:
The present invention provides a method and system for automated test for human presence at a client device capable of receiving touch sensitive response. At a server, the method includes receiving and storing user profile information. Receiving request from client device to access a resource on a server. Generating a query based on the user profile information and the query requiring user to generate a touch sensitive response. Receiving the user generated response and authenticating the user if the touch sensitive response matches a predefined response for the query stored on the server.