Patent classifications
G06F2221/2147
CHASSIS WITH LOCK MECHANISM
An apparatus may include a chassis that can receive a sled and a locking mechanism. The locking mechanism can mechanically lock the sled to the chassis to prevent a sudden power loss that can be caused from an unexpected removal of the sled from the chassis. To avoid a sudden power loss, a voltage-sensing electrical switch lock can be implemented to the chassis to mechanically lock the sled to the chassis until the sled is ready to be removed. The sled may include one or more computing devices that need to be inactive before removing the sled. The apparatus includes a controller that may detect whether at least one of computing devices in the sled are in an active state or in an inactive state. Based on the determination of the state of the computing devices in the sled, the controller may activate the locking mechanism or de-active locking mechanism.
Mobile terminal and controlling method thereof
A mobile terminal and controlling method thereof are disclosed. The present disclosure includes a touchscreen configured to recognize at least one touch point at a same timing point and a controller, if a touch pattern for releasing a lock is received through the touchscreen, releasing a lock state of the touchscreen and outputting a preset screen. And, the touch pattern includes a preset touch pattern corresponding to the number of the at least one touch point recognized at the same timing point. Accordingly, a lock is released in response to a command for releasing a lock screen of a touchscreen, various informations are outputted, and a function is launched, simultaneously.
Mutable encrypted system
Security of network traffic may be increased by utilizing a mutable password to encrypt and decrypt content stored inside an executable utilizing a mutable password (e.g., where a password changes based on an equation when the executable is run). For example, the present password may be associated with a variable, the variable may be modified when the executable is run using the present password, and a subsequent password may be generated based on the modified variable.
SYSTEM AND METHOD FOR DOCUMENT BRANCHING
Disclosed are systems and methods for document branching. In some embodiments, the method includes the steps of: obtaining a branch model associated with a set of related documents, the branch model comprising one or more branches, each branch of the one or more branches comprising a branch type and one or more nodes, the one or more branches comprising a primary branch associated with a primary document, the set of related documents comprising the primary document having a first document identifier; generating a secondary branch based upon a revision of the primary document, the secondary branch associated with a secondary document of the set of related documents, the secondary document having a second document identifier; and adding the secondary branch to the branch model.
CONTROL METHOD AND DEVICE FOR TERMINAL
Embodiments of the present disclosure provide a control method and device for a terminal. The control method for the terminal provided by the embodiments of the present disclosure comprises: acquiring operation information of a user at an edge touch area of the terminal in a screen locking state; and controlling the terminal to execute unlocking operation according to the operation information of the user at the edge touch area of the terminal. With the technical solutions of the present disclosure, when the terminal is controlled to unlock, the operation is simple and convenient, the unlocking efficiency of the terminal is improved. The problem that the unlocking efficiency of the terminal is relatively low due to inconvenient operation when the terminal with a large touch screen is unlocked with one hand in the prior art can be solved.
SEMICONDUCTOR DEVICE MANAGING POWER BUDGET AND OPERATING METHOD THEREOF
A semiconductor device may comprise a plurality of chips coupled in a bidirectional ring structure. The plurality of chips includes a first chip, and the first chip determines whether a token is required to perform a specific operation in the first chip. The first chip further determines whether an amount of an available token in the first chip is equal to or greater than an amount of the required token to perform the specific operation. When the amount of the available token is equal to or greater than the amount of the required token, the first chip performs the specific operation and then the first chip outputs one or both of a first portion of the available token in a first direction and a second portion of the available token in a second direction. The first direction is opposite to the second direction in the bidirectional ring structure.
Providing Low Risk Exceptional Access
A method and system for providing unencrypted access to encrypted data that may be stored on a device, sent as a message, or sent as a real-time communications stream. The method may include using public key cryptography to securely enable accessing the encrypted data stored on a device or communicated by a device. For instance, the method may include using a device vendor's public key to securely enable that vendor to enable only authorized parties to themselves decrypt previously-encrypted device storage, messages, or real-time communications streams.
INFORMATION PROCESSING APPARATUS, NON-TRANSITORY COMPUTER READABLE MEDIUM, AND INFORMATION PROCESSING METHOD
An information processing apparatus includes a processor configured to, when a hierarchical structure of folders is used to manage a file, prohibit creation of a folder belonging to a hierarchical level lower than a specific hierarchical level.
MUTABLE ENCRYPTED SYSTEM
Security of network traffic may be increased by utilizing a mutable password to encrypt and decrypt content stored inside an executable utilizing a mutable password (e.g., where a password changes based on an equation when the executable is run). For example, the present password may be associated with a variable, the variable may be modified when the executable is run using the present password, and a subsequent password may be generated based on the modified variable.
INTEGRATION OF PICTORIAL CONTENT INTO SECURE SIGNATURE DOCUMENTS
A system and a method are disclosed for enabling pictorial content to be added to a secure document. In an embodiment, a secure document tool receives a request, from an administrator of the secure document, to enable modification of a region of the secure document with an addition of pictorial content, the secure document configured to prevent modification of contents of the secure document by a signer, the secure document enabled to accept a signature on the secure document by the signer. The secure document tool receives, from the signer, a command to add pictorial content to the region, and responsively adds the pictorial content to the region. The secure document tool receives from the signer, a signature on the secure document, and responsively disables the secure document from accepting further modifications.