摘要:
The invention is a method for restoring to a factory state a secure element which is embedded in a first device and which comprises a set of data. The method comprises the steps of: classifying data of the set in three independent categories, retrieving from a second device a first entity configured to provide factory value of data of the first category, restoring all current data of the first category (C1) by factory value, retrieving from a third device a second entity configured to provide factory value of data of the second category, restoring factory value of data of the second category.
摘要:
An apparatus and a method for displaying information required to be secured in a wireless communication terminal are provided. The method includes recognizing generation of notification information of one or more processes activated in a first operation mode among a plurality of operation modes including the first operation mode and a second operation mode; and notifying a user of a part of the notification information when a current operation mode is the second operation mode.
摘要:
In an automated data storage library, selective encryption for data stored or to be stored on removable media is provided. One or more encryption policies are established, each policy including a level of encryption, one or more encryption keys and the identity of one or more data cartridges. The encryption policies are stored in a policy table and the encryption keys are stored in a secure key server. A host requests access to a specified data cartridge and the cartridge is transported from a storage shelf in the library to a storage drive. Based on the identity of the specified cartridge, the corresponding encryption policy is selected from the table and the appropriate encryption key is obtained from the key server. The storage drive encrypts data in accordance with the key and stores the data on the media on an encryption table within the specified data cartridge.
摘要:
Particular embodiments described herein provide for a wearable electronic device, such as a bracelet, watch, wristband or armband. One particular example implementation of a wearable electronic device may include a first display screen, a second display screen, and logic. At least a portion of the logic is implemented in hardware. The logic is configured to receive a communication over a wireless network, and to display, in the first display screen, a communication alert. The communication alert can be a graphic design. The logic is also configured to receive input data indicative of a screen transition input to view information associated with the communication, and to display, in the second display screen, the information associated with the communication. In further embodiments, the graphic design includes a notification pattern indicating one or more attributes of the communication. In further embodiments, the first and second display screens form a single display screen.
摘要:
A system for limiting access to confidential information including storage circuitry for storing the confidential information. An access enabling circuit allows access to the storage circuitry in response to a first level of an enabling signal. A processor generates the enabling signal for a predetermined amount of time in response to sensing of a change of a predetermined value that is produced in response to an act by a person responsible for the confidentiality of the confidential information. The enabling signal assumes a second level after the predetermined amount of time to block access to the storage circuitry.
摘要:
Access to content may be administered by storing content, the content comprising one or more selections, accessing a passive optical out-of-band token associated with the content, determining an access right for the content based on the passive optical out-of-band token, and enabling access to the content in accordance with the access right.
摘要:
A method of executing an algorithm includes protecting an electronic device by affine masking. The electronic device executes operations on secret variables x, the secret variables x being binary vectors of a given size N other than zero. The method further includes replacing the secret variables x using an affine masking operation, by the following affine function: m(x)=R.x+r, where R is a random invertible binary matrix with N rows and N columns and r is a random binary vector of size N.
摘要:
A point of sale computer system that allows a customer to select and consummate a sale himself. The system may include graphics storage media configured to store two- and three-dimensional graphics data relating to the sale, as well as business rules storage media, configured to store business rules that specify the graphics that should be displayed during the selection and consummation process based on input received from the customer. The technology allows a presentation to be made to the customer that is entertaining and that maintains the attention of the customer throughout the sale selection and consummation process.
摘要:
In an automated data storage library, selective encryption for data stored or to be stored on removable media is provided. One or more encryption policies are established, each policy including a level of encryption one or more encryption keys and the identity of one or more data cartridges. The encryption policies are stored in a policy table and the encryption keys are stored in a secure key server. A host requests access to a specified data cartridge and the cartridge is transported from a storage shelf in the library to a storage drive. Based on the identity of the specified cartridge the corresponding encryption policy is selected from the table and the appropriate encryption key is obtained from the key server. The storage drive encrypts data in accordance with the key and stores the data on the media within the specified data cartridge.
摘要:
A group of devices are fabricated based on a common design, each device having a corresponding plurality of measurable characteristics that is unique in the group to that device, each device having a measurement module for measuring the measurable characteristics. Authentication of one of the group of devices is enabled by selective measurement of one or more of the plurality of measurable characteristics of the device.