Abstract:
The present disclosure generally pertains to systems and methods for protecting information for use by mobile devices. In one exemplary embodiment, a system comprises a mobile device, a base, and a memory device. The mobile device has a user input interface, and the base is secured to a user. The mobile device is configured to receive data manually input via the user input interface by the user and to wirelessly transmit the data. The mobile device is further configured to wirelessly transmit a retrieval request in response to a user input. The memory device is mounted on the base. The memory device is configured to receive and store the data wirelessly transmitted by the mobile device. The memory device is further configured to retrieve the data and to wirelessly transmit the data to the mobile device in response to the retrieval request.
Abstract:
A method (100) comprises authenticating (100) a wireless communication device, receiving (114) an authentication ticket from a server if the wireless communication device is successfully authenticated, and providing (124) the authentication ticket by the wireless communication device to a computer to enable the computer complete an initialization process.
Abstract:
A method (100) comprises authenticating (100) a wireless communication device, receiving (114) an authentication ticket from a server if the wireless communication device is successfully authenticated, and providing (124) the authentication ticket by the wireless communication device to a computer to enable the computer complete an initialization process.
Abstract:
A system comprises a processor which executes an operating system and an application. The system also comprises a keyboard coupled to the processor. The keyboard and application share a shared secret that is used to encode keyboard data provided from the keyboard to the application. The shared secret is not known or accessible to the operating system.