G06F21/83

Method for providing autofill function and electronic device including the same

An electronic device and method are disclosed, the method including a communication circuitry, a memory storing an application, a display, and a processor operatively connected with the communication circuitry, the memory, and the display. The processor executes the method, including: receiving a request to execute the application, outputting an information input screen relevant to executing the application on the display based on the request, receiving at least one piece of input information to be entered into the information input screen, from a specific external electronic device via the communication circuitry, and automatically entering the at least one piece of input information into the information input screen.

SYSTEM FOR SECURE MULTI-PROTOCOL PROCESSING OF CRYPTOGRAPHIC DATA
20230144774 · 2023-05-11 ·

A general computing environment (GCE) determines request data comprising payload data and instruction data to use cryptographic functions in a secure computing environment (SCE). The SCE provides secure input and output devices, allowing secure presentation to a user and acquisition of user input. The SCE receives the request data and processes the payload data using the instructions in the instruction data to produce cryptographic output data. The request data may be determined using schemas that specify the formatting, grammar, and other attributes of data associated with a transaction that utilizes cryptographic functions. By using schemas and the request data, the SCE may support any protocol that uses the cryptographic functions supported by that SCE to compose cryptographic output. To enhance user comprehensibility and security, the SCE may securely replace some data with human readable text or images and present this as abstracted request data.

SYSTEM FOR SECURE MULTI-PROTOCOL PROCESSING OF CRYPTOGRAPHIC DATA
20230144774 · 2023-05-11 ·

A general computing environment (GCE) determines request data comprising payload data and instruction data to use cryptographic functions in a secure computing environment (SCE). The SCE provides secure input and output devices, allowing secure presentation to a user and acquisition of user input. The SCE receives the request data and processes the payload data using the instructions in the instruction data to produce cryptographic output data. The request data may be determined using schemas that specify the formatting, grammar, and other attributes of data associated with a transaction that utilizes cryptographic functions. By using schemas and the request data, the SCE may support any protocol that uses the cryptographic functions supported by that SCE to compose cryptographic output. To enhance user comprehensibility and security, the SCE may securely replace some data with human readable text or images and present this as abstracted request data.

Encrypting touch screen
11645429 · 2023-05-09 · ·

In accordance with an example embodiment there is disclosed herein a method for authenticating a touch screen layout. A file containing the touch screen layout is signed by a key known to the device that is to deploy the touch screen layout, such as, for example an automated banking machine and/or a point of sale system. Before the touch screen is used by the device's user interface, the device validates the touch screen.

Encrypting touch screen
11645429 · 2023-05-09 · ·

In accordance with an example embodiment there is disclosed herein a method for authenticating a touch screen layout. A file containing the touch screen layout is signed by a key known to the device that is to deploy the touch screen layout, such as, for example an automated banking machine and/or a point of sale system. Before the touch screen is used by the device's user interface, the device validates the touch screen.

DISPLAY DEVICE
20170364727 · 2017-12-21 · ·

A display device, including a display panel and a transparent cover plate disposed on the display panel, a first side of the transparent cover plate close to the display panel is provided with a full-screen fingerprint sensor and a fingerprint identification alarm circuit. The full-screen fingerprint sensor is configured to acquire fingerprint information at a surface of a second side of the transparent cover plate opposite to the first side, including a receiving unit, an extracting unit, a comparison unit and an alarming unit which are connected successively.

METHOD FOR SENDING SECURITY INFORMATION
20170364907 · 2017-12-21 ·

A method and apparatus for sending security information are disclosed. The method is performed by a terminal that performs operations, which may include: during a current transaction, receiving first transaction data coming from an electronic device with which the terminal is co-operating; detecting an event encountered by the terminal during the current transaction; generating a transaction message including an indicator indicating that the first data is included in a field of the message; inserting security information in the field of the transaction message as a replacement for the first transaction data, the security information being representative of the event; and sending the transaction message including the security information to a remote server.

TECHNOLOGIES FOR SECURE INPUT/OUTPUT DEVICE ACTIVATION
20170364712 · 2017-12-21 ·

Technologies for secure input/output device activation include a compute device to identify an attempt to activate an input/output device of the compute device, notify a controller of the compute device of the attempt to activate the input/output device via a communication channel that is out-of-band relative to an operating system of the compute device, determine whether to authorize activation of the input/output device based on a security policy, and allow the input/output device to resume activation in response to a determination that the security policy authorizes the activation. The security policy indicates whether one or more applications are authorized to access the input/output device.

TECHNOLOGIES FOR SECURE INPUT/OUTPUT DEVICE ACTIVATION
20170364712 · 2017-12-21 ·

Technologies for secure input/output device activation include a compute device to identify an attempt to activate an input/output device of the compute device, notify a controller of the compute device of the attempt to activate the input/output device via a communication channel that is out-of-band relative to an operating system of the compute device, determine whether to authorize activation of the input/output device based on a security policy, and allow the input/output device to resume activation in response to a determination that the security policy authorizes the activation. The security policy indicates whether one or more applications are authorized to access the input/output device.

Key entry device

A key entry device including a housing, a keypad array disposed within the housing and including a plurality of keys, a key contact array disposed within the housing below the keypad array and including a plurality of contact pairs, a dome array underlying the keypad array and the key contact array and including a plurality of domes, and a protrusion array underlying the dome array and including a plurality of protrusions, whereby depression of one of the plurality of keys of the keypad array causes a corresponding one of the domes of the dome array to be displaced downwardly and to be deformed by pushing engagement with a corresponding one of the protrusions of the protrusion array into contact with at least one of the contact pairs of the key contact array.