Abstract: A process including: displaying icons used for password entry into an electronic system, in such a way that a hand movement associated with entry of the password into the system is randomized.
Abstract: A process including: displaying icons used for password entry into an electronic system, in such a way that a hand movement associated with entry of the password into the system is randomized.
Abstract: A method for users of devices including mobile phones and computers to engage in encrypted communications with other devices using asymmetrical key exchange technology, involving the user of a device first creating a password and then at a later time re-entering that password on the device, with the result that when the password is re-entered the device is able to decrypt a set of software components that are required for a fresh session of encrypted communications.
Abstract: A method for users of devices including mobile phones and computers to engage in encrypted communications with other devices using asymmetrical key exchange technology, involving the user of a device first creating a password and then at a later time re-entering that password on the device, with the result that when the password is re-entered the device is able to decrypt a set of software components that are required for a fresh session of encrypted communications.
Abstract: A method for users of devices including mobile phones and computers to engage in encrypted communications with other devices using asymmetrical key exchange technology, involving the user of a device first creating a password and then at a later time re-entering that password on the device, with the result that when the password is re-entered the device is able to decrypt a set of software components that are required for a fresh session of encrypted communications.
Abstract: A machine-readable medium encoded with instructions to execute steps comprising: authorizing access to a system using a location of a portable communications device.
Abstract: There is provided a computing device for authentication. The computing device comprises a processor for processing digital data; a memory device for storing digital data including computer program code and being coupled to the processor; and an interface for sending and receiving digital data and being coupled to the processor. The processor is controlled by the computer program code to receive, via the interface, image selection data representing an image selection from a set of candidate images; and authenticate in accordance with the image selection data.