摘要:
A graphical authentication identifier is used to facilitate automatic authentication of a user. A graphical identifier authentication system receives a request from an authenticating entity for a onetime use graphical authentication identifier. In response to the received request, a onetime use graphical authentication identifier to be displayed by the authenticating entity is generated. A request for user authentication information by the authenticating entity is encoded in the graphical authentication identifier, which is transmitted to the authenticating entity for display (e.g., on a login screen). The onetime use graphical authentication identifier being displayed by the authenticating entity is captured by a registered user operated computing device. In response, the requested user authentication information is transmitted to the authenticating entity, such that the user is automatically authenticated to the authenticating entity, without the user manually entering the requested user authentication information.
摘要:
A graphical payment identifier is used to facilitate the automatic processing of an electronic payment. A graphical identifier payment system receives a request from a payment processing entity for a onetime use graphical payment identifier. In response, a onetime use graphical payment identifier to be displayed by the payment processing entity is generated. A request for user payment information by the payment processing entity is encoded in the graphical payment identifier, which is transmitted to the payment processing entity for display. The graphical payment identifier being displayed by the payment processing entity is captured by a registered user operated computing device. In response, the requested user payment information is transmitted to the payment processing entity, such that the electronic payment is executed automatically, without the user manually entering the requested payment information or providing a credit card.
摘要:
A graphical payment identifier is used to facilitate the automatic processing of an electronic payment. A graphical identifier payment system receives a request from a payment processing entity for a onetime use graphical payment identifier. In response, a onetime use graphical payment identifier to be displayed by the payment processing entity is generated. A request for user payment information by the payment processing entity is encoded in the graphical payment identifier, which is transmitted to the payment processing entity for display. The graphical payment identifier being displayed by the payment processing entity is captured by a registered user operated computing device. In response, the requested user payment information is transmitted to the payment processing entity, such that the electronic payment is executed automatically, without the user manually entering the requested payment information or providing a credit card.
摘要:
A graphical authentication identifier is used to facilitate automatic authentication of a user. A graphical identifier authentication system receives a request from an authenticating entity for a onetime use graphical authentication identifier. In response to the received request, a onetime use graphical authentication identifier to be displayed by the authenticating entity is generated. A request for user authentication information by the authenticating entity is encoded in the graphical authentication identifier, which is transmitted to the authenticating entity for display (e.g., on a login screen). The onetime use graphical authentication identifier being displayed by the authenticating entity is captured by a registered user operated computing device. In response, the requested user authentication information is transmitted to the authenticating entity, such that the user is automatically authenticated to the authenticating entity, without the user manually entering the requested user authentication information.
摘要:
A graphical checkout identifier is used to facilitate automatic checkout of a user on a webstore. A graphical identifier checkout system receives a request from a webstore for a onetime use graphical checkout identifier. In response to the received request, a onetime use graphical checkout identifier to be displayed by the webstore is generated. A request for checkout completion information by the webstore is encoded in the graphical checkout identifier, which is transmitted to the webstore for display. The onetime use graphical checkout identifier being displayed by the webstore is captured by a registered user operated computing device. In response, the requested checkout completion information is transmitted to the webstore, such that the user is automatically checked out on the webstore, without the user manually logging in to the webstore or entering the requested checkout completion information.
摘要:
Malicious code detection code is executed by an information handling system. The malicious code detection code includes detection routines. The detection routines are applied to executable code under investigation. The detection routines associate weights to respective code under investigation in response to detections of a valid program or malicious code as a function of the detection routines. It is determined whether code under investigation is a valid program or malicious code as a function of the weights associated by the detection routines.
摘要:
A computer-implemented method for generating secure passwords may include 1) displaying a user interface for entering a textual password, 2) receiving user input via the user interface to select a color for at least one character of the textual password, 3) displaying the entered textual password via the user interface by displaying the character in the selected color and by displaying at least one additional character in at least one additional color, and 4) generating a modified textual password by encoding the textual password with information relating the selected color to the character. Various other methods, systems, and computer-readable media are also disclosed.
摘要:
In a first embodiment, an information handling system determines whether a resource is likely misrepresented as a trusted resource within a global computer network. In a second embodiment, the information handling system outputs an indication of whether a resource within a global computer network is recognized as a known trusted resource.
摘要:
A mobile computing device that runs a first mobile operating system scans and decodes an encoded link to a specific page in an app distribution site for a second mobile operating system. The mobile computing device can convert the link into a format usable by the first mobile operating system, and use the converted link to access and display the specific page. Rather than display the page in the app distribution site for the second mobile operating system, one or more links to corresponding apps in the format of the first mobile operating system can be located and displayed. To do so, the decoded link is used to glean relevant search terms, which are used to search an app distribution site for the first mobile operating system. The search results are displayed to the user.
摘要:
From a first information handling system (“IHS”) to a second IHS, in response to a request for initiating an online transaction, a program is downloaded for detecting malicious code on the second IHS.