摘要:
A token is transmitted to a certification computing system, and a piece of information is received in association with the token from a source computing system. The piece of information is accepted according to the token, which provides a certification relating to the piece of information being granted by a transmission of the token from the certification computing system to the source computing system.
摘要:
Techniques are disclosed for validating a ticket based on biometric data provided by a ticket holding user. A ticket controller device broadcasts an inquiry frame specifying a request for authentication data for a ticket user requesting access to a service hosted by the ticket controller. A mobile device may receive the inquiry frame and generate a response frame encapsulating a ticket identifier and biometric data associated with a user. The ticket controller receives the response frame including the ticket identifier and the biometric data. Upon determining that the ticket identifier and the biometric data encapsulated in the response frame matches a stored ticket identifier and biometric data, the ticket controller grants the user access to the service.
摘要:
A method, computer program product, and system identify a low-cost time to re-boot a system. The method includes a processor obtaining a request for a re-boot of a system. The processor obtains identifiers of uncompleted tasks executing in the system. Based on obtaining the identifiers, the processor obtains a task cost of each task of the uncompleted tasks, where a value of the task cost of each task relates to a portion of each task completed by the processor at a given time. The processor determines, based on the task costs associated with the uncompleted tasks, a re-boot cost for re-booting the system at the given time. The processor determined a system cost for not re-booting the system at the given time. The processor compares the re-boot cost to the system cost to determine whether to re-boot the system at the given time in response to the request.
摘要:
According to one aspect of the present disclosure, a method and technique for caller authentication is disclosed. The method includes: responsive to initiation of a telephone call by a caller from a first telephone unit to a second telephone unit, retrieving an identification object comprising identification information corresponding to the caller; encrypting the identification object using an encryption key stored on the first telephone unit; and transmitting, as part of the telephone call, the encrypted caller identification object to a telephone network destined for the second telephone unit.
摘要:
A solution for locating unprotected access points is provided. Particularly, a wireless network access point providing an access to a network over a wireless connection maintains a location structure comprising an indication of a geographical position of each one of a set of unprotected access points in proximity of the access point, each unprotected access point providing the access to the network at least partially unconditionally. A mobile station submits a request to access the network to the access point when the mobile station is within a transmission range thereof, receives the indication of the geographical position of at least part of the unprotected access points in response to a denial of the access from the access point, and outputs directions towards one of the unprotected access points according to the corresponding geographical position.
摘要:
Access is temporarily allowed to selected enterprise resources. A request to carry out an action is received from a private device. The private device is associated with an enterprise device, which has one or more enterprise policies in place. One or more steps for carrying out the requested action are defined, and it is determined that at least one policy from the enterprise policies is required for at least one of the steps. It is also determined that the at least one policy is in place on the private device. The private device is then allowed to carry out the requested action according to the at least one policy.
摘要:
Access is temporarily allowed to selected enterprise resources. A request to carry out an action is received from a private device. The private device is associated with an enterprise device, which has one or more enterprise policies in place. One or more steps for carrying out the requested action are defined, and it is determined that at least one policy from the enterprise policies is required for at least one of the steps. It is also determined that the at least one policy is in place on the private device. The private device is then allowed to carry out the requested action according to the at least one policy.
摘要:
A method, and associated computer program product and mobile computing device, for backing-up information stored in the mobile computing device. The mobile computing device detects one or more support computing devices located within a corresponding communication range and being available to support the mobile computing device for backing-up the information stored in the mobile computing device. The mobile computing device detects a dangerous condition indicative of a risk of inoperability of the mobile computing device. The mobile computing device sends back-up information corresponding to selected information stored in the mobile computing device to at least one of the support computing devices in response to the detection of the dangerous condition to cause the at least one support computing device to upload the back-up information to a back-up computing system.
摘要:
A method, computer program product, and system identify a low-cost time to re-boot a system. The method includes a processor obtaining a request for a re-boot of a system. The processor obtains identifiers of uncompleted tasks executing in the system. Based on obtaining the identifiers, the processor obtains a task cost of each task of the uncompleted tasks, where a value of the task cost of each task relates to a portion of each task completed by the processor at a given time. The processor determines, based on the task costs associated with the uncompleted tasks, a re-boot cost for re-booting the system at the given time. The processor determined a system cost for not re-booting the system at the given time. The processor compares the re-boot cost to the system cost to determine whether to re-boot the system at the given time in response to the request.
摘要:
Provided are a computer program, method, and system for determining and assigning a default value to a current server response if the current server response is not received from the server within a time-limit. An indication of a submission of a request is transmitted to the server for receiving a current server response. A default value is assigned to the current server response if the current server response is not received from the server within a time-limit with respect to the current submission of the request. A set of operations being performed from the assignment of the default value to the current server response is logged. An actual value of the current server response is received from the server and the logged operations are rolled-back and the current server response reset to the actual value if the actual value is different from the default value.