Abstract:
Devices, methods and products are described that provide for remote authentication of mobile information handling devices. One aspect provides a method comprising configuring an information handling device operating through a mobile operating system to allow communication with least one remote authentication architecture; denying access to a information handling device of the information handling device responsive to a device lock event; and granting access to the display device responsive to an unlock event comprising entry of logon credentials authenticated at the at least one remote authentication architecture. Other embodiments and aspects are also described herein.
Abstract:
Devices, methods and products are described that provide file transfer applications. One aspect provides a method including opening a file transfer application on an information handling device having an internal storage device; providing a source display area indicating a source storage device; providing a destination display area indicating a destination storage device; responsive to movement of one or more file icons a predetermined threshold amount beyond a boundary separating said source display area and said destination display area, change one or more indications to indicate to a user a destination storage device to which one or more files is to be transferred, said changing further comprising modifying screen brightness of the source display area; and responsive to movement of said one or more file icons a predetermined threshold amount beyond said boundary, transferring said one or more files to said destination storage device. Other embodiments are described.
Abstract:
A computer system that may include a trusted platform module (TPM) along with a processor hashes a user-supplied password for a predetermined time period that is selected to render infeasible a dictionary attack on the password. The results of the hash are used to render an AES key, which is used to encrypt an RSA key. The encrypted RSA key along with the total number of hash cycles that were used is stored and the RSA key is provided to the TPM as a security key. In the event that the RSA key in the TPM must be recovered, the encrypted stored version is decrypted with an AES key that is generated based on the user inputting the same password and hashing the password for the stored number of cycles.
Abstract:
A method of use protects a door hinge from splattered paint while allowing movement of the door, because the barrel portion is covered by the non-adhesive central portion of a masking tape. Use of a specialized roll of painter's masking tape includes the steps of having a longitudinal narrow region in the center without adhesive, in between two outer left and right regions which include adhesive. This non-adhesive center region is sized to match the circumference of the pin barrel exposed on the front of the hinge when opened flat. The tape is cut at predetermined lengths to form disposable masks for masking door hinges. The same tape is used for masking at least a portion of both the front butt plates as well as all of the back pin barrel side of the hinge. The front mask does not impede movement of the attached pivotably openable door.
Abstract:
A method of use protects a door hinge from splattered paint while allowing movement of the door, because the barrel portion is covered by the non-adhesive central portion of a masking tape. Use of a specialized roll of painter's masking tape includes the steps of having a longitudinal narrow region in the center without adhesive, in between two outer left and right regions which include adhesive. This non-adhesive center region is sized to match the circumference of the pin barrel exposed on the front of the hinge when opened flat. The tape is cut at predetermined lengths to form disposable masks for masking door hinges. The same tape is used for masking at least a portion of both the front butt plates as well as all of the back pin barrel side of the hinge. The front mask does not impede movement of the attached door, which can be pivotably opened to 180 degrees.
Abstract:
Devices, methods and products are described that provide removable storage device data protection. One aspect provides a method comprising: ascertaining a protected removable storage device connected to an information handling device, said protected removable storage device having a first partition for storing data according to a first file system type, and a second partition for storing user data according to a second file system type; and responsive to said information handling device recognizing said second file system type, querying for user credentials to decrypt a data encryption key used to encrypt said user data of said second partition. Other embodiments are described.
Abstract:
A system and method for sale and use tax collection rate by providing a system and method including a mechanism to incent taxpayers comprising three major components: Merchants (Data Capture devices), Processors/Acquirers and the Aggregator.
Abstract:
A method for providing a secure single sign-on to a computer system is disclosed. Pre-boot passwords are initially stored in a secure storage area of a smart card. The operating system password, which has been encrypted to a blob, is stored in a non-secure area of the smart card. After the smart card has been inserted in a computer system, a user is prompted for a Personal Identification Number (PIN) of the smart card. In response to a correct smart card PIN entry, the blob stored in the non-secure storage area of the smart card is decrypted to provide the operating system password, and the operating system password along with the pre-boot passwords stored in the secure storage area of the smart card are then utilized to log on to the computer system.
Abstract:
Methods and arrangements are disclosed for secure single sign on to an operating system using only a power-on password. In many embodiments modified BIOS code prompts for, receives and verifies the power-on password. The power-on password is hashed and stored in a Platform Configuration Register of the Trusted Platform Module. In a setup mode, the trusted platform module encrypts the operating system password using the hashed power-on password. In a logon mode, the trusted platform module decrypts the operating system password using the hashed power-on password.
Abstract:
A method of use protects a door hinge from splattered paint while allowing movement of the door, because the barrel portion is covered by the non-adhesive central portion of a masking tape. Use of a specialized roll of painter's masking tape includes the steps of having a longitudinal narrow region in the center without adhesive, in between two outer left and right regions which include adhesive. This non-adhesive center region is sized to match the circumference of the pin barrel exposed on the front of the hinge when opened flat. The tape is cut at predetermined lengths to form disposable masks for masking door hinges. The same tape is used for masking at least a portion of both the front butt plates as well as all of the back pin barrel side of the hinge. The front mask does not impede movement of the attached door, which can be pivotably opened to 180 degrees.