G06F21/123

USAGE CONTROL METHOD AND SYSTEM FOR MEDICAL DETECTION DEVICE, AND MEDICAL DETECTION DEVICE
20170316170 · 2017-11-02 ·

A usage control method for a medical detection device, a system and a medical detection device. The method includes: receiving, by the medical detection device, an operation instruction inputted by an operator, and prompting the operator to input an authorization file when the operation instruction instructs to perform configuration authorization; receiving an authorization file inputted by the operator, and displaying an operation interface corresponding to the operation instruction when the authorization file passes authentication; where the authorization file is generated by a dongle inserted into the medical detection device according to the number of available times and the device identification; executing, by the medical detection device, configuration content inputted by the operator on the operation interface. Since the authorization file is unique to the medical detection device and an unauthorized operator cannot easily obtain the authorization file, the operation security of medical detection device can be greatly improved.

Electronic access-protection system, method of operating a computer system, chip card and firmware component

An electronic access protection system for a computer system includes an access-protected apparatus having a firmware component and a data processing device that executes program code of the firmware component; a reading device coupled to the apparatus that reads chip cards; and at least one chip card having at least one chip-card-specific access procedure, wherein a predetermined memory area of the at least one chip card stores first information concerning the at least one chip-card-specific access procedure; and the at least one firmware component has executable program code that reads in and evaluates data from the at least one chip card and performs the at least one chip-card-specific access procedure for the at least one chip card on the basis of the first information stored in the first memory area.

INFORMATION PROTECTION METHOD AND DEVICE BASED ON A PLURALITY OF SUB-AREAS FOR MCU CHIP

An information protection method and device based on a plurality of sub-areas for an MCU chip, the MCU chip comprises an instruction bus, a data bus, a flash controller and a user area of a flash memory, the method comprises: determining a preceding sub-area when the instruction bus accesses the user area; entering corresponding preceding sub-area working state; determining the current sub-area when the instruction bus accesses the user area; when the preceding sub-area is inconsistent with the current sub-area, entering the transition state; determining whether the duration of the transition state reaches the preset waiting time; if yes, entering the corresponding current sub-area working state. The information protection method and device prevent the cooperative companies which develop the program together from stealing program from each other.

Apparatus and method for managing gaming engine file in a mobile platform

The present invention relates to managing a UNITY file in a mobile platform in order to forestall a UNITY library executable in a mobile platform from being analyzed by reverse engineering and decompiling and provides an apparatus for managing a UNITY file in a mobile platform comprising a file extracting section that extracts a UNITY library file from a UNITY application; an encrypting section that encrypts a programming library file in the UNITY library file thus extracted and creates an encrypted programming library file; a file creating section that creates a decrypting library to decrypt the encrypted programming library file and creates a secured UNITY application using the decrypting library and the encrypted programming library file; and a file executing section that, upon request to execute the secured UNITY application, executes the secured application by decrypting the encrypted programming library file using the decrypting library.

ADD-ON MODEM FOR WIRELESS DEVICES AND METHODS USEFUL IN CONJUNCTION THEREWITH

System for ex post facto upgrading of at least one Legacy personal communication device including a legacy modem and lacking at least one desired wireless communication feature, the system comprising an up-graded communication device including an auxiliary modem physically connected via an ex post facto physical connection to a Legacy personal communication device having at least one legacy wireless output channel which has been neutralized or disabled.

Enabling program code on target data processing devices

A method of enabling program code stored on target data processing devices, the method comprising: receiving an in encrypted value of a permitted number of target data processing devices that are permitted to have program code stored on them enabled, and using a security data processing device to decrypt the encrypted value and store the decrypted value on the security data processing device; and for each target data processing device, using the security data processing device to: determine whether the value of the permitted number of target data processing devices is greater than zero; if so, obtain a device identifier from the target data processing device; generate a license key from the device identifier; store the license key on the target data processing device; and decrement the value of the permitted number of target data processing devices.

Forensic investigation tool

Methods and systems are disclosed a digital investigation tool capable of recovering and decrypting content. The tool combines digital techniques with decryption capability for a wide range of encryption algorithms. In one implementation, the tool identifies the type and/or vendor of the encryption algorithm used to protect the content. The tool then automatically obtains the decryption information needed to decrypt the content. Depending on the encryption algorithm used, the information may include a master key, user-specific keys, user IDs, passwords, and the like. The decryption information may be accumulated in a local or remote storage location accessible by the tool, or it may be acquired in real time on an as-needed basis from a third-party encryption vendor, a key server, and the like. Such an arrangement allows law enforcement agencies as well as corporate security personnel to quickly recover and decrypt content stored on a computer system.

MULTIMODE SMART CARD SYSTEM WITH EMBEDDED USB CONNECTIVITY
20170270399 · 2017-09-21 · ·

Techniques are disclosed for systems and methods to conduct transactions using a Multi-mode Card. A Multi-mode Card may include various components of a Smart Card and be configured to interface directly with a personal electronic device (e.g., a smart phone, a tablet computer, a personal computer, and/or other personal electronic devices) to confirm presence of the Multi-mode Card in an unattended digital transaction, such as for e-commerce and Internet purchases. A transaction system may include a logic device and an interface embedded in or on the Card, a client device such as a personal electronic device, and a server configured to provide a sales interface to a user through the client device. The logic device in the Card may be configured to authorize, encrypt, and/or otherwise facilitate a transaction involving a sale and/or other type of communication between the client device and the server.

Transparent execution of secret content

The present application is directed to transparent execution of secret content. A device may be capable of downloading content that may include at least one secret portion, wherein any secret portions of the content may be directed to a secure workplace in the device not accessible to device operating system components, applications, users, etc. The device may then present the content in a manner that allows secret portions of the content to be executed without direct access. For example, the device may download content, and a director module in the device may direct any secret portions of the downloaded content to a secure workspace. During execution of the content, any inputs required by the secret portions may be provided to the secure workspace, and any resulting outputs from the secret portions may then be used during content presentation.

Incentive-based app execution

Systems and methods of a personal daemon, executing as a background process on a mobile computing device, for providing personal assistant to an associated user is presented. Also executing on the mobile computing device is a scheduling manager. The personal daemon executes one or more personal assistance actions on behalf of the associated user. The scheduling manager responds to events in support of the personal daemon. More particularly, in response to receiving an event the scheduling manager determines a set of apps that are responsive to the received event and from that set of apps, identifies at least a first subset of apps for execution on the mobile computing device. The scheduling manager receives feedback information regarding the usefulness of the executed apps of the first subset of apps and updates the associated score of each of the apps of the first subset of apps.