G06F21/88

Wearable device having high security and stable blood pressure detection
11580205 · 2023-02-14 · ·

A wearable device including a skin sensor and a processor is provided. The processor is configured to receive an authentication data for authenticating a user when a wearing state of the wearable device is adjacent to a skin surface of the user, execute a predetermined function in response to a request when the authentication data matches a pre-stored data and the skin sensor determines that the wearable device does not leave the skin surface after the authentication data is received, and reject or ignore the request when the skin sensor determines that the wearable device leaves the skin surface before the predetermined function is executed. The processor further calculates blood pressures according to PPG signals detected by a PPG sensor of the skin sensor.

METHOD FOR CONTROLLING TERMINAL, AND ELECTRONIC DEVICE
20230038326 · 2023-02-09 ·

A method for controlling includes activating a virtual subscriber identity module (SIM) card in a terminal such as a mobile phone in response to determining that the terminal is in a lost state; receiving a control instruction through the virtual SIM card; and controlling the terminal based on the control instruction. A mobile phone or an electronic device incorporating the method and a non-transitory computer readable storage medium are also described.

Anti-theft mobile terminal and method for controlling the extraction of a memory card out from a mobile terminal
11558748 · 2023-01-17 · ·

The disclosed technology relates to a mobile terminal adapted to receive a memory card comprising a processing unit, an input interface and a card locking actuator configured to lock the memory card into the mobile terminal. The card locking actuator is controlled by the processing unit. In one aspect, the card locking actuator is configured to be locked when the mobile terminal is switched on. In another aspect, the processing unit is configured to lock the screen until a screen unlocking authentication procedure is performed by a user at the input interface and is configured to command unlocking of the card locking actuator after detecting that a predetermined authentication procedure is performed by a user at the input interface.

Anti-theft mobile terminal and method for controlling the extraction of a memory card out from a mobile terminal
11558748 · 2023-01-17 · ·

The disclosed technology relates to a mobile terminal adapted to receive a memory card comprising a processing unit, an input interface and a card locking actuator configured to lock the memory card into the mobile terminal. The card locking actuator is controlled by the processing unit. In one aspect, the card locking actuator is configured to be locked when the mobile terminal is switched on. In another aspect, the processing unit is configured to lock the screen until a screen unlocking authentication procedure is performed by a user at the input interface and is configured to command unlocking of the card locking actuator after detecting that a predetermined authentication procedure is performed by a user at the input interface.

Security apparatus for a tablet

A security apparatus comprises a support assembly and a keyboard retainer. The support assembly comprises a first retaining portion, a second retaining portion pivotally coupled to the first retaining portion, and a lock assembly defining a locked state and an unlocked state. The keyboard retainer comprises at least one base member pivotally coupled to the first and second retaining portions and included a top surface extending along a top surface plane, and an opposing bottom surface. The at least one base member comprises one or more securing members extending from the bottom surface of the first base, and one or more retainers extending above the top surface plane of the first and each retainer comprising a retaining member extending away from the first base.

Anti-theft recovery tool

An anti-theft protection disablement solution is provided to authorized users and authorized customer service representatives. An anti-theft protection disablement request message from a recovery application on a user device may be received via a cloud messaging service or a binary messaging service. In turn, an anti-theft protection disablement message may be transmitted to the user device via the cloud messaging service or the binary messaging service when the anti-theft protection disablement request message is authenticated. The anti-theft protection disablement message may disable an anti-theft protection function on the user device that calls for an input of an anti-theft protection authentication credential for a factory reset of the user device.

Anti-theft recovery tool

An anti-theft protection disablement solution is provided to authorized users and authorized customer service representatives. An anti-theft protection disablement request message from a recovery application on a user device may be received via a cloud messaging service or a binary messaging service. In turn, an anti-theft protection disablement message may be transmitted to the user device via the cloud messaging service or the binary messaging service when the anti-theft protection disablement request message is authenticated. The anti-theft protection disablement message may disable an anti-theft protection function on the user device that calls for an input of an anti-theft protection authentication credential for a factory reset of the user device.

Shippable data transfer device with anti-tamper casing

A shippable data transfer device includes a data storage medium encased in a chamber surrounded by an anti-tamper casing. The anti-tamper casing includes an anti-tamper layer with identifying elements arranged in a unique or otherwise identifiable pattern. The anti-tamper layer is configured to actively re-arrange, alter, or obscure the identifying elements in response to a breach of the anti-tamper casing.

Shippable data transfer device with anti-tamper casing

A shippable data transfer device includes a data storage medium encased in a chamber surrounded by an anti-tamper casing. The anti-tamper casing includes an anti-tamper layer with identifying elements arranged in a unique or otherwise identifiable pattern. The anti-tamper layer is configured to actively re-arrange, alter, or obscure the identifying elements in response to a breach of the anti-tamper casing.

SYSTEM AND METHOD FOR ADMINISTERING PHYSICAL SECURITY ACCESS TO COMPONENTS OF A PROCESS CONTROL SYSTEM
20180012043 · 2018-01-11 ·

A system for restricting physical access to at least one component process control system component has a locking device that is integrated with process control system security administration data. The locking device accesses the process control system security data when authenticating a user. Upon authentication of a user for physical access to the particular process control component, the user may directly access the component for which the user is authorized. The system provides tracking of all authenticated users and attempts to access the various control system components.