Abstract:
Secure communication of user inputs is achieved by isolating part of an endpoint device such that certificates and encryption keys are protected from corruption by malware. Further, the communication is passed through a trusted data relay that is configured to decrypt and/or certify the user inputs encrypted by the isolated part of the endpoint device. The trusted data relay can determine that the user inputs were encrypted or certified by the protected certificates and encryption keys, thus authenticating their origin within the endpoint device. The trusted data relay then forwards the inputs to an intended destination. In some embodiments, the isolated part of the endpoint device is configured to detect input created by auto-completion logic and/or spell checking logic.
Abstract:
Secure communication of user inputs is achieved by isolating part of an endpoint device such that certificates and encryption keys are protected from corruption by malware. Further, the communication is passed through a trusted data relay that is configured to decrypt and/or certify the user inputs encrypted by the isolated part of the endpoint device. The trusted data relay can determine that the user inputs were encrypted or certified by the protected certificates and encryption keys, thus authenticating their origin within the endpoint device. The trusted data relay then forwards the inputs to an intended destination. In some embodiments, the isolated part of the endpoint device is configured to detect input created by auto-completion logic and/or spell checking logic.
Abstract:
Secure communication of user inputs is achieved by isolating part of an endpoint device such that certificates and encryption keys are protected from corruption by malware. Further, the communication is passed through a trusted data relay that is configured to decrypt and/or certify the user inputs encrypted by the isolated part of the endpoint device. The trusted data relay can determine that the user inputs were encrypted or certified by the protected certificates and encryption keys, thus authenticating their origin within the endpoint device. The trusted data relay then forwards the inputs to an intended destination. In some embodiments, the isolated part of the endpoint device is configured to detect input created by auto-completion logic and/or spell checking logic.
Abstract:
Secure communication of user inputs is achieved by isolating part of an endpoint device such that certificates and encryption keys are protected from corruption by malware. Further, the communication is passed through a trusted data relay that is configured to decrypt and/or certify the user inputs encrypted by the isolated part of the endpoint device. The trusted data relay can determine that the user inputs were encrypted or certified by the protected certificates and encryption keys, thus authenticating their origin within the endpoint device. The trusted data relay then forwards the inputs to an intended destination. In some embodiments, the isolated part of the endpoint device is configured to detect input created by auto-completion logic and/or spell checking logic.
Abstract:
Secure communication of user inputs is achieved by isolating part of an endpoint device such that certificates and encryption keys are protected from corruption by malware. Further, the communication is passed through a trusted data relay that is configured to decrypt and/or certify the user inputs encrypted by the isolated part of the endpoint device. The trusted data relay can determine that the user inputs were encrypted or certified by the protected certificates and encryption keys, thus authenticating their origin within the endpoint device. The trusted data relay then forwards the inputs to an intended destination. In some embodiments, the isolated part of the endpoint device is configured to detect input created by auto-completion logic and/or spell checking logic.
Abstract:
Secure communication of user inputs is achieved by isolating part of an endpoint device such that certificates and encryption keys are protected from corruption by malware. Further, the communication is passed through a trusted data relay that is configured to decrypt and/or certify the user inputs encrypted by the isolated part of the endpoint device. The trusted data relay can determine that the user inputs were encrypted or certified by the protected certificates and encryption keys, thus authenticating their origin within the endpoint device. The trusted data relay then forwards the inputs to an intended destination. In some embodiments, the isolated part of the endpoint device is configured to detect input created by auto-completion logic and/or spell checking logic.
Abstract:
A durable holographically imaged paper, plastic film or other product is produced by embossing the image into a thermoplastic coating thereon which comprises plastic pigment particles. The plastic pigment particles are preferably hollow but may be solid. The coating preferably also comprises a thermoplastic polymer or copolymer, for example a copolymer of vinyl acetate and versatic acid, an acrylic polymer, a styrene-acrylic or other acrylic copolymer, a vinyl chloride-vinyl acetate-ethylene terpolymer, a polyvinyl acetate or a polyvinyl alcohol. Preferably, the polymer or copolymer has a glass transition temperature (Tg value) in the range 20° C. to 110° C. The thermoplastic coating may also contain inorganic pigments, for example precipitated calcium carbonate (PCC), ground natural calcium carbonate, or kaolin or other clays, and/or a starch binder. Embossing is preferably carried out directly on the thermoplastic coating by means of a holographically engraved shim.
Abstract:
The present invention encompasses compounds of Formula I: or pharmaceutically acceptable salts or hydrates thereof, which are useful as selective glucocorticoid receptor ligands for treating a variety of autoimmune and inflammatory diseases or conditions. Pharmaceutical compositions and methods of use are also included.
Abstract:
Paper coated uniformly with discrete dots of remoistenable adhesive, especially based on starch or polyvinyl alcohol, has curl stability comparable with particle gum coated papers. Preferably, the dots are less than 0.3 mm in diameter and typically spaced 0.5 to 1 mm (centers) apart. The product is made by screen coating dots of aqueous adhesive mix onto base paper.