Despite the astronomical growth of smartphones and tablets, and the rise in applications allowing consumers to purchase both virtual and real goods from their mobile devices, mobile commerce still ...
I’m still on my quest to find good user authentication techniques that can supplement or replace the old username and password scheme. In this age of spoofing, phishing and stolen IDs, we need strong ...
Passwords are notoriously problem-filled as a security measure, with everything from rampant re-use across accounts to poor choices like “password1” plaguing their effectiveness at keeping out hackers ...
In this week’s case of the week, the Federal Circuit held patent claims eligible under 35 U.S.C. § 101 solely based on its analysis of Alice step two. Under Alice, patent eligibility requires ...
The government has revealed plans for a national proof-of-identity scheme that privacy campaigners say has echoes of the ID card project that was scrapped less than six months ago. The identity ...
Are passwords passé? A couple of weeks ago, the “Seattle Post-Intelligencer” ran an Associated Press story that described various multi-factor authentication schemes, such as password-plus-biometric ...
Some results have been hidden because they may be inaccessible to you
Show inaccessible results