Patent classifications
G06F21/30
Certificate based profile confirmation
Disclosed are various embodiments for controlling access to resources in a network environment. Methods may include installing a profile on the device and installing a certificate included in or otherwise associated with the profile on the device. A request to execute an application, and/or access a resource using a particular application, is received and determination is made as to whether the certificate is installed on the device based on an identification of the certificate by the application. If the certificate is installed on the device, then execution of the application and/or access to the resource is allowed. If the certificate is not installed on the device, then the request for execution and/or access is refused.
Certificate based profile confirmation
Disclosed are various embodiments for controlling access to resources in a network environment. Methods may include installing a profile on the device and installing a certificate included in or otherwise associated with the profile on the device. A request to execute an application, and/or access a resource using a particular application, is received and determination is made as to whether the certificate is installed on the device based on an identification of the certificate by the application. If the certificate is installed on the device, then execution of the application and/or access to the resource is allowed. If the certificate is not installed on the device, then the request for execution and/or access is refused.
System for advanced protection of consumable or detachable elements
A method of authenticating a consumable or detachable element of a continuous inkjet printer comprising: the controller of the printer generating a 1.sup.st item of random information that is dispatched to an authentication circuit of the element; encrypting the 1.sup.st item of information by the authentication circuit using a 1.sup.st encryption algorithm and a 1.sup.st secret key to form a 1.sup.st item of encrypted random information; dispatching the 1.sup.st item of information to the controller; encrypting the 1.sup.st item of information by the controller using a 2.sup.nd encryption algorithm and a 2.sup.nd secret key to form a 2.sup.nd item of encrypted random information; comparing the 1.sup.st item of encrypted random information with the 2.sup.nd encrypted item of random information to authenticate the consumable element; and if the consumable element is authenticated, dispatching at least one part of a 3.sup.rd key, termed the shared key, by the element to the printer.
System for advanced protection of consumable or detachable elements
A method of authenticating a consumable or detachable element of a continuous inkjet printer comprising: the controller of the printer generating a 1.sup.st item of random information that is dispatched to an authentication circuit of the element; encrypting the 1.sup.st item of information by the authentication circuit using a 1.sup.st encryption algorithm and a 1.sup.st secret key to form a 1.sup.st item of encrypted random information; dispatching the 1.sup.st item of information to the controller; encrypting the 1.sup.st item of information by the controller using a 2.sup.nd encryption algorithm and a 2.sup.nd secret key to form a 2.sup.nd item of encrypted random information; comparing the 1.sup.st item of encrypted random information with the 2.sup.nd encrypted item of random information to authenticate the consumable element; and if the consumable element is authenticated, dispatching at least one part of a 3.sup.rd key, termed the shared key, by the element to the printer.
Encoding and decoding visual information
A method and computer software for creating an encoded image and which can optionally include a method for decoding the encoded image. The encoded image is preferably formed from at least one symmetric image but can be formed from a plurality of symmetric images. Embodiments of the present invention can be performed with physical paper and writing utensils or can be performed via computer software. Embodiments of the present invention can be used for art authentication based on results obtained by decoding an image. In one embodiment, one or more encoded image elements can be revealed simultaneously. Optionally, however, encoded image elements can be caused to be revealed in a series that gives a sense of motion in a manner similar to that of motion picture animation.
Encoding and decoding visual information
A method and computer software for creating an encoded image and which can optionally include a method for decoding the encoded image. The encoded image is preferably formed from at least one symmetric image but can be formed from a plurality of symmetric images. Embodiments of the present invention can be performed with physical paper and writing utensils or can be performed via computer software. Embodiments of the present invention can be used for art authentication based on results obtained by decoding an image. In one embodiment, one or more encoded image elements can be revealed simultaneously. Optionally, however, encoded image elements can be caused to be revealed in a series that gives a sense of motion in a manner similar to that of motion picture animation.
AUTHENTICATION DEVICE FOR USING THE BASE SEQUENCES OF DNA INCLUDED IN A MEDIUM
The present disclosure relates to an authentication device using base sequence information of DNAs included in a medium, the authentication device including an authentication means provided in a medium, in which the plurality of DNA base sequence information are included in authentication information derived by reading out the authentication means composed of a plurality of DNAs.
DELIVERY VEHICLE
A delivery vehicle includes: a main body portion equipped with a moving mechanism; and a control section provided at the main body portion, wherein the control section includes: an autonomous driving executing section that controls the moving mechanism and makes it possible for the main body portion to travel autonomously; a destination information acquiring section that acquires information relating to a delivery destination or a collection destination of a package; a data transmitting section transmitting predetermined data for authentication to a management system that manages a secure area on a delivery path; and a data acquiring section that, in a case in which the data for authentication is authenticated by the management system, acquires area information including map information of the secure area from the management system.
System and Method for a Workload Management and Scheduling Module to Manage Access to a Compute Environment According to Local and Non-Local User Identity Information
A system, method and computer-readable media for managing a compute environment are disclosed. The method includes importing identity information from an identity manager into a module performs workload management and scheduling for a compute environment and, unless a conflict exists, modifying the behavior of the workload management and scheduling module to incorporate the imported identity information such that access to and use of the compute environment occurs according to the imported identity information. The compute environment may be a cluster or a grid wherein multiple compute environments communicate with multiple identity managers.
BIOS PASSWORDS
In example implementations, a computing device is provided. The computing device includes a basic input/output system (BIOS), a memory, and a controller. The memory is to store a BIOS password, wherein the BIOS password includes a first part and a second part. The controller is to associate a first device with the first part and a second device with the second part.