Настройки

Укажите год
-

Небесная энциклопедия

Космические корабли и станции, автоматические КА и методы их проектирования, бортовые комплексы управления, системы и средства жизнеобеспечения, особенности технологии производства ракетно-космических систем

Подробнее
-

Мониторинг СМИ

Мониторинг СМИ и социальных сетей. Сканирование интернета, новостных сайтов, специализированных контентных площадок на базе мессенджеров. Гибкие настройки фильтров и первоначальных источников.

Подробнее

Форма поиска

Поддерживает ввод нескольких поисковых фраз (по одной на строку). При поиске обеспечивает поддержку морфологии русского и английского языка
Ведите корректный номера.
Ведите корректный номера.
Ведите корректный номера.
Ведите корректный номера.
Укажите год
Укажите год

Применить Всего найдено 2. Отображено 2.
12-07-2017 дата публикации

Content-based authentication

Номер: GB0002546156A
Принадлежит:

A method of user authentication comprises presenting, to a user 340 of a device, one or more content items 310 that are familiar to an authorised user of the device, and one or more content items 320 that are unfamiliar to the authorised user. The method further comprises receiving a response from the user, and authenticating the user based on the response. The response may involve the user identifying the familiar content items. The items comprising the recognisable and decoy content may be images, music, documents, movies, a list of installed or frequently used applications, or a list of partial contact information. Successful authentication may allow the user access to data stored on the device, i.e. by unlocking the device. The content items known to the user may be stored locally on the device, while the unknown content items may be downloaded over a network.

Подробнее
30-11-2016 дата публикации

Trans-locality based fixed storage security

Номер: GB0002538869A
Принадлежит:

Trans-locality based fixed storage security includes storing in the memory of a fixed (but moveable) disk (140) (e.g. hard disk drive or solid state disk drive) a key (130) received from a key source (160) (e.g. a server) over a computer communications network (120). The data (150) stored within the fixed storage may be encrypted using the key. A request (190) to access the encrypted data stored in the disk is received by its firmware from a physically coupled computer (170) by way of a drive interface cable (110) and the key received from the key source is retrieved (e.g. in response to the request) and the keys validity is determined. The encrypted data is decrypted and returned (180) to the computer if the retrieved key is valid, but otherwise the request is denied. The key may expire after a certain time has elapsed necessitating the receipt of a new key. The stored data may be encrypted and decrypted both by using the key retrieved from the key source, and also using a second key present ...

Подробнее