Настройки

Укажите год
-

Небесная энциклопедия

Космические корабли и станции, автоматические КА и методы их проектирования, бортовые комплексы управления, системы и средства жизнеобеспечения, особенности технологии производства ракетно-космических систем

Подробнее
-

Мониторинг СМИ

Мониторинг СМИ и социальных сетей. Сканирование интернета, новостных сайтов, специализированных контентных площадок на базе мессенджеров. Гибкие настройки фильтров и первоначальных источников.

Подробнее

Форма поиска

Поддерживает ввод нескольких поисковых фраз (по одной на строку). При поиске обеспечивает поддержку морфологии русского и английского языка
Ведите корректный номера.
Ведите корректный номера.
Ведите корректный номера.
Ведите корректный номера.
Укажите год
Укажите год

Применить Всего найдено 1124. Отображено 100.
28-06-2012 дата публикации

Object Processing Employing Movement

Номер: US20120163666A1
Принадлежит: Individual

Directional albedo of a particular article, such as an identity card, is measured and stored. When the article is later presented, it can be confirmed to be the same particular article by re-measuring the albedo function, and checking for correspondence against the earlier-stored data. The re-measuring can be performed through us of a handheld optical device, such as a camera-equipped cell phone. The albedo function can serve as random key data in a variety of cryptographic applications. The function can be changed during the life of the article. A variety of other features are also detailed.

Подробнее
20-09-2012 дата публикации

Creation of user digital certificate for portable consumer payment device

Номер: US20120239934A1
Автор: Terence V. Trench
Принадлежит: Individual

A method for creating a digital certificate for a user issued by a reliant party, where the reliant party relies on an established cryptographic infrastructure by a registration or certificate authority is described. The registration authority, typically a large financial or credit institution, has already performed the initial overhead steps necessary for a digital authentication system using a chip card. These steps include minting and distributing the chip card, establishing that the key pair and card are given to the right person, and creating the certificate library. The reliant party leverages this cryptographic infrastructure to issue its own digital certificate and certificate chain to a user already having a chip card from the registration authority. Consequently, a user can have additional digital certificates issued to him and stored at a user-specific memory in a remote certificate library without having the chip card modified.

Подробнее
20-12-2012 дата публикации

Online account authentication service

Номер: US20120323733A1
Принадлежит: Individual

A payment authentication service authenticates the identity of a payer during online transactions. The authentication service allows a card issuer to verify a cardholder's identity using a variety of authentication methods, such as the use of passwords. Also, the only system participant requiring a certificate is the issuing financial institution. Authenticating the identity of a cardholder during an online transaction involves querying an access control server to determine if a cardholder is enrolled in the payment authentication service, requesting a password from the cardholder, verifying the password, and notifying a merchant whether the cardholder's authenticity has been verified. A chip card and the authentication service independently generate cryptograms to match in order for the service to verify that the correct chip card is being used by the cardholder.

Подробнее
09-05-2013 дата публикации

Metrics systems and methods for token transactions

Номер: US20130117138A1
Принадлежит: Verifone Inc

Systems and methods for monitoring token access transactions are provided. In one embodiment, the invention provides receiving transaction records for a plurality of token transactions, wherein the transaction records include transaction information and infrastructure information; determining whether a reportable event has occurred based on the transaction information with the transaction records; and providing an alert representing the reportable event.

Подробнее
22-08-2013 дата публикации

Web Enabled Bank Teller Machine

Номер: US20130218767A1
Принадлежит: JPMorgan Chase Bank NA

A system and method is provided for an ATM having a display, a logic server coupled to the display, and a memory coupled to the logic server. The logic server dynamically controls the content of screens to be displayed on the display. The memory, which is accessible to the logic server, contains a profile of at least one user. In operation, the ATM detects the swipe of a user's card and requests the profile of the user whose card was swiped from a host. The ATM then receives the user's profile and stores the user's profile in the ATM.

Подробнее
19-12-2013 дата публикации

Device

Номер: US20130339732A1
Принадлежит: Toshiba Corp

According to one embodiment, a device includes a cell array including an ordinary area, a hidden area, and an identification information record area in which identification information which defines a condition for accessing the hidden area is recorded. An authentication circuit performs authentication. A sensing circuit recognizes information recorded in the identification information storage area, determines the information recorded in the identification information record area when an access request selects the hidden area, validates an access to the hidden area when determined that the identification information is recorded, and invalidates an access to the hidden area when determined that the identification information is not recorded.

Подробнее
03-01-2019 дата публикации

CARD SHIMMER DETECTION

Номер: US20190005503A1
Автор: Hecker Weston Lee
Принадлежит:

A shim detection device is selectively interfaced to a portion of a chip card reader that is integrated into a terminal. The shim detection device is configured to detect when a shimmer is inserted into the chip card reader during a card transaction at the terminal and take an automated action in response thereto. 1. A system , comprising:a chip card reader; anda shim detection device interfaced to at least a portion of the chip card reader and configured to detect when a shimmer is inserted in the chip card reader during a card transaction at a terminal.2. The system of claim 1 , wherein the shim detection device is integrated into the chip card reader as an integrated component of the chip card reader.325. The system of claim 1 , wherein the chip card reader is attached to a voltage and ground lead from C and C contact leads of the chip card reader.425. The system of claim 1 , wherein shim detection device is coupled to a capacitor/resistance component claim 1 , and the capacitor/resistance component is coupled to a voltage and ground lead from C and C contact leads of the chip card reader.525. The system of claim 1 , wherein the shim detection device is overlaid on the C and C contact leads of the chip card reader.625. The system of claim 1 , wherein shim detection device is configured to power on a device in response to detecting variations in voltage or ground from the C and C contact leads of the chip card reader indicating the shimmer has been inserted into the chip card reader.7. The system of claim 6 , wherein the device is one of: a sensor device claim 6 , a Subscriber Identity Module (SIM) claim 6 , and a microcontroller.8. The system of claim 7 , wherein the SIM is configured to send a Short Message Service (SMS) text when powered on by the shim detection device.9. The system of claim 7 , wherein the sensor device is configured to one or more of: illuminate a Light Emitting Diode and play a distinctive audio tone.10. The system of claim 7 , wherein the ...

Подробнее
24-01-2019 дата публикации

SECURE DATA PARSER METHOD AND SYSTEM

Номер: US20190026479A1
Принадлежит:

The present invention provides a method and system for securing sensitive data from unauthorized access or use. The method and system of the present invention is useful in a wide variety of settings, including commercial settings generally available to the public which may be extremely large or small with respect to the number of users. The method and system of the present invention is also useful in a more private setting, such as with a corporation or governmental agency, as well as between corporation, governmental agencies or any other entity. 132.-. (canceled)33. A method for securely storing data , the method comprising:receiving, using an electronic computing system, a request to store primary data; distributing the primary data into a plurality of shares, wherein each of the shares comprises less than all of the primary data,', 'encrypting each of the shares with a respective one of a plurality of distinct encryption keys, and', 'including data indicative of at least one of the distinct encryption keys with the shares; and, 'generating a plurality of secondary data, such that the primary data can be reconstructed using at least a subset of the of the plurality of secondary data, wherein generating the secondary data comprisesstoring the plurality of secondary data on a plurality of different storage devices.34. The method of claim 33 , wherein including data indicative of at least one of the distinct encryption keys with the shares comprises including data indicative of one of the distinct encryption keys with each of the shares.35. The method of claim 33 , wherein including data indicative of at least one of the distinct encryption keys with the shares comprises including data indicative of at least one of the distinct encryption keys in the shares.36. The method of claim 33 , wherein including data indicative of at least one of the distinct encryption keys with the shares comprises including claim 33 , with a particular share of the plurality of shares ...

Подробнее
24-01-2019 дата публикации

SECURE DATA PARSER METHOD AND SYSTEM

Номер: US20190026480A1
Принадлежит:

The present invention provides a method and system for securing sensitive data from unauthorized access or use. The method and system of the present invention is useful in a wide variety of settings, including commercial settings generally available to the public which may be extremely large or small with respect to the number of users. The method and system of the present invention is also useful in a more private setting, such as with a corporation or governmental agency, as well as between corporation, governmental agencies or any other entity. 132.-. (canceled)33. A method for securely storing data , the method comprising:receiving, using an electronic computing system, a request to store primary data; generating a random or pseudorandom value;', 'distributing the primary data into a plurality of shares, wherein each of the shares comprises less than all of the primary data,', 'encrypting each of the shares with a respective one of a plurality of distinct encryption keys, wherein the plurality of shares is generated based on the random or pseudorandom value, and', 'including with the shares data indicative of at least one of the distinct encryption keys; and, 'generating a plurality of secondary data, such that the primary data can be reconstructed using at least a subset of the of the plurality of secondary data, wherein generating the secondary data comprisesstoring the plurality of secondary data on a plurality of different storage devices.34. The method of claim 33 , wherein including data indicative of at least one of the distinct encryption keys with the shares comprises including data indicative of one of the distinct encryption keys with each of the shares.35. The method of claim 33 , wherein including data indicative of at least one of the distinct encryption keys with the shares comprises including data indicative of at least one of the distinct encryption keys in the shares.36. The method of claim 33 , wherein including data indicative of at least one ...

Подробнее
11-02-2016 дата публикации

Authenticated remote pin unblock

Номер: US20160044027A1
Принадлежит: ActivCard SA, ASSA ABLOY AB

This invention provides a simple and secure PIN unblock mechanism for use with a security token. A set of one or more passphrases are stored on a remote server during personalization. Likewise, the answers to the passphrases arc hashed and stored inside the security token for future comparison. A local client program provides the user input and display dialogs and ensures a secure communications channel is provided before passphrases are retrieved from the remote server. Retrieval of passphrases and an administrative unblock secret from the remote server are accomplished using a unique identifier associated with the security token, typically the token's serial number. A PIN unblock applet provides the administrative mechanism to unblock the security token upon receipt of an administrative unblock shared secret. The remote server releases the administrative unblock shared secret only after a non-forgeable confirmatory message is received from the security token that the user has been properly authenticated. The administrative unblock shared secret is encrypted with the token's public key during transport to maximize security.

Подробнее
07-02-2019 дата публикации

SECURE DATA PARSER METHOD AND SYSTEM

Номер: US20190042776A1
Принадлежит:

The present invention provides a method and system for securing sensitive data from unauthorized access or use. The method and system of the present invention is useful in a wide variety of settings, including commercial settings generally available to the public which may be extremely large or small with respect to the number of users. The method and system of the present invention is also useful in a more private setting, such as with a corporation or governmental agency, as well as between corporation, governmental agencies or any other entity. 132.-. (canceled)33. A method for securely storing data , the method comprising:receiving, using an electronic computing system, a request to store primary data;distributing the primary data into a plurality of secondary data, such that the primary data can be reconstructed using at least a subset of the of the plurality of secondary data, and such that each of the secondary data comprises less than all of the primary data;encrypting each of the plurality of secondary data with a different encryption key; andstoring the plurality of secondary data together with data indicative of at least one of the different encryption keys, wherein the plurality of secondary data is stored on a plurality of different storage devices.34. The method of claim 33 , wherein storing the plurality of secondary data together with data indicative of at least one of the different encryption keys comprises storing claim 33 , together with a particular secondary data of the plurality of secondary data claim 33 , data indicative of an encryption key that was used to encrypt a different secondary data of the plurality of secondary data.35. The method of claim 33 , wherein distributing the primary data into the plurality of secondary data comprises using a random technique or pseudorandom technique.36. The method of claim 33 , wherein distributing the primary data into the plurality of secondary data comprises using a deterministic technique.37. The ...

Подробнее
07-02-2019 дата публикации

MULTIMODE RETAIL SYSTEM

Номер: US20190043300A1
Принадлежит: Wayne Fueling Systems LLC

A multimode system for receiving data in a retail environment includes: a secure input module for receiving high security input and low security input from a customer, the high security input to be communicated by the secure input module in cipher text, and the low security input to be communicated by the secure input module in plaintext. The multimode system is adapted to operate in a high security mode and a low security mode. The multimode system is adapted to enter the low security mode upon detection by the multimode system of a security breach condition. In the high security mode, the secure input module accepts low security input and high security input. In the low security mode, the secure input module accepts the low security input and does not accept the high security input. 118-. (canceled)19. A method , comprising:detecting a security breach in a system that includes a card reader; andin response to the detection of the breach, transitioning the card reader from functioning in a first security mode to functioning in a second security mode;wherein in the first security mode the card reader is enabled to read a customer card to accept input of secure information and unsecure information, data received via the card reader is encrypted, and the encrypted data is used to process payment for at least one of a good and a service; andwherein in the second security mode the card reader is enabled to read a customer card to accept unsecure information and is disabled from accepting input of secure information, data received via the card reader is encrypted, and the encrypted data is used to process payment for at least one of a good and a service.20. The method of claim 19 , wherein in the first security mode a keypad is enabled to accept manual input of unsecure information from a customer and to accept manual input of secure information from a customer claim 19 , and in the second security mode the keypad is enabled to accept the manual input of unsecure ...

Подробнее
18-02-2021 дата публикации

SYSTEM AND METHOD TO PROTECT PRIVACY OF PERSONAL-IDENTIFICATION-NUMBER ENTRY ON CONSUMER MOBILE DEVICE AND COMPUTING APPARATUS

Номер: US20210049605A1
Принадлежит:

A system for accepting the input of a PIN comprises a first device receiving a randomized PIN layout derived on a fourth device. The randomized PIN layout is displayed on a display of the first device. A second device comprises an input for accepting a series of key presses to produce a PIN token. The PIN token indicating each of the series of key presses. A third device is in communication with the second device. The third device derives the randomized PIN layout and receives the PIN token from the second device without the PIN token being present on the first device. The third device combines the PIN layout and the PIN token to produce a PIN. The PIN is used to authenticate a transaction. The fourth and third devices each store a shared secret used to independently derive the randomized PIN layout on the fourth and third devices. 1. A plurality of devices to enable a user to enter a personal identification number (PIN) to authenticate a transaction , wherein: 'a veracity of a point of sale terminal is authenticated by the first and the second device based on the transaction;', 'the plurality of devices comprises a first, second, third and fourth device, wherein'}the first device receives a randomized PIN layout derived by the fourth device, and displays the randomized PIN layout on a first display of the first device to enable the user to enter a series of key presses at the second device;the second device accepts the series of key presses from the user to produce a PIN token indicating each of the series of key presses; and derive the randomized PIN layout,', 'receive the PIN token from the second device without the PIN token being present on the first device,', 'combine the randomized PIN layout and the PIN token to produce the PIN., 'the third device is coupled to the second device to2. A method for authenticating a transaction using a plurality of devices comprising a first , second , third and fourth device , the method comprising: the first device receiving ...

Подробнее
13-02-2020 дата публикации

DEVICES WITH ON-BOARD PHYSICALLY UNCLONABLE FUNCTIONS

Номер: US20200051062A1
Принадлежит: Square, Inc.

An electronic device may include a printed circuit board having a physically unclonable function (PUF) source. The electronic device may also include an integrated circuit (IC) chip positioned on the printed circuit board, and the first PUF source may be embedded in or formed on the printed circuit board external to the IC chip. The IC chip has processing circuitry that is configured to determine PUF data based on the PUF source. The processing circuitry is further configured to determine a cryptographic key or authentication token based on the PUF data and to perform at least one secure operation using the cryptographic key or authentication token. 124-. (canceled)25. A payment reader , comprising:an interface configured to receive payment data from a payment device;a physically unclonable function (PUF) source for providing PUF data, the PUF source comprising an anti-tamper device having a physical characteristic that changes in response to a tamper attempt, wherein the PUF data is based on the physical characteristic; andcircuitry configured to process a payment transaction based on the payment data and to detect the tamper attempt based on a change to the physical characteristic, the circuitry configured to acquire the PUF data and to perform at least one secure operation based on the PUF data, the circuitry further configured to perform at least one action for protecting the payment reader against the tamper attempt in response to detection of the tamper attempt, wherein the change to the physical characteristic changes the PUF data provided by the PUF source such that the circuitry is prevented from using the changed PUF data to perform the at least one secure operation after the detection of the tamper attempt.26. The payment reader of claim 25 , wherein the circuitry comprises at least one processor and an anti-tamper circuit claim 25 , wherein the at least one processor is configured to process the payment transaction based on the payment data and the PUF ...

Подробнее
15-03-2018 дата публикации

ONLINE PAYER AUTHENTICATION SERVICE

Номер: US20180075452A1
Принадлежит:

A payment authentication service authenticates the identity of a payer during online transactions. The authentication service of the present invention allows a card issuer to verify a cardholder's identity using a variety of authentication methods, such as the use of passwords. Also, the only system participant requiring a certificate is the issuing financial institution. One embodiment of the invention for authenticating the identity of a cardholder during an online transaction involves querying an access control server to determine if a cardholder is enrolled in the payment authentication service, requests a password from the cardholder, verifies the password, and notifies a merchant whether the cardholder's authenticity has been verified. In another aspect of the invention, a chip card and the authentication service independently generate cryptograms that must match in order for the service to verify that the correct chip card is being used by the cardholder. 122.-. (canceled)23. A method including authenticating a cardholder during an online transaction with a requesting party , the method comprising:receiving a chip authentication request from an access control server at a cardholder computer in response to receipt of a cardholder authentication request by the access control server; andtransmitting a chip authentication response from the cardholder computer to the access control server that includes a cryptogram and a cardholder authentication password, the cryptogram being generated by a chip card and application in communication with the cardholder computer, the access control server thereafter generates a second cryptogram and compares the second cryptogram to the cryptogram, and determines that the cardholder authentication password matches a stored password that corresponds to a cardholder account identifier based on a first comparison, and determines that the cryptograms match based on a second comparison, whereby the access control server authenticates ...

Подробнее
15-03-2018 дата публикации

SYSTEM AND METHOD FOR A MULTIPLE MERCHANT STORED VALUE CARD

Номер: US20180075472A1
Автор: Antonucci Donna A.
Принадлежит:

The loyalty system allows a consumer to accumulate general loyalty points from one or more merchants, and convert any desired subset of general points to loyalty dollars associated with a specific merchant. The system stores, for each consumer, the merchant loyalty dollars (or monetary equivalent) by merchant within a remotely-accessible host database or within a smart card database. Upon conducting a purchase at a particular merchant, the consumer may utilize a code key to facilitate access to the consumer's own loyalty dollars for the particular merchant. The loyalty dollars are then applied to the purchase transaction as a discount or rebate. The consumer may also re-load the merchant loyalty dollar accounts. 120.-. (canceled)21. A method for conducting a transaction using a single code key , comprising:storing, by a computer system, consumer information of a consumer, wherein the consumer information includes a single code key associated with the consumer;receiving, by the computer system, offer information from a first merchant, wherein the offer information includes one or more criteria for earning general loyalty points with a plurality of merchants and a conversion ratio for converting general loyalty points to merchant-specific loyalty points;receiving, by the computer system, information indicative of a first transaction between the consumer and a merchant of the plurality of merchants, wherein the information includes the single code key;authenticating, by the computer system, the single code key against a plurality of single code keys stored in a database of the computer system;assigning, by the computer system, a first number of general loyalty points to an account of the consumer, wherein the first number is based on the first transaction;receiving, by the computer system, an electronic request to process a second transaction with a second merchant using merchant-specific loyalty points specific to the second merchant, wherein the electronic request ...

Подробнее
19-06-2014 дата публикации

System for structured encryption of payment card track data

Номер: US20140172597A1
Принадлежит: Voltage Security LLC

A system may include a point-of-sale system that gathers payment card track data from a payment card and a payment card gateway that processes the track data to authorize purchase transactions. The point-of-sale system may remove sensitive data such as a portion of a primary account number from the track data and may compress the removed data. The compressed version of the data may be appended to a discretionary field in the track data. The discretionary field may be encrypted following insertion of the compressed data. Track data that has been modified in this way may be conveyed to the payment gateway for processing.

Подробнее
29-03-2018 дата публикации

METHOD FOR USING AND MAINTAINING USER DATA STORED ON A SMART CARD

Номер: US20180091502A1
Автор: DE JONG EDUARD K.
Принадлежит:

In a method for using and maintaining user data stored on a smart card, a smart card receives a user data request for the user data stored on the smart card. The smart card determines whether the user data request is a data maintenance request or a data use request. A data maintenance request is for modifying user data stored on the smart card. A data use request is for read only access to user data stored on the smart card. The smart card uses a first process to determine whether to allow the user data request when the user data request is determined to be a data maintenance request. The smart card uses a second process, different from the first method, to determine whether to allow the user data request when the user data request is determined to be a data use request. 1. A method for maintaining and using user data stored on a smart card , including: 'wherein said data includes information relating to an individual end-user of said smart card;', 'receiving, by a smart card from a terminal, a data request for data stored on said smart card,'}determining, by said smart card, whether said data request was from a home terminal and an authorized end user; andauthorizing, by said smart card, said data request if said data request is from said home terminal and from said authorized user.2. The method of further comprising:receiving, by said smart card from said terminal, instructions to make said terminal a home terminal; andproviding, by said smart card, said terminal with data indicating that said terminal is said home terminal.3. The method of wherein said determining further comprising:determining whether said data request is a maintenance request or a data use request; anddetermining, upon finding said data request is a maintenance request, whether said terminal comprises a home terminal for said smart card.4. The method of wherein said determining whether said terminal comprises a home terminal includes a cryptographic terminal recognition interaction.5. The ...

Подробнее
05-05-2016 дата публикации

User authentication system and method

Номер: US20160127134A1
Принадлежит: BARCLAYS BANK PLC

A computer-implemented method and system are provided for authenticating the identity of a user registered with a computer system. The authentication method comprises generating a multi-dimensional array of elements that are addressable by respective sets of indices, generating a challenge code comprising a linear array of elements for addressing a first set of indices of the array of elements, transmitting the multi-dimensional array of elements and challenge code to at least one computing device associated with the user, receiving a response code from the user, and verifying the user's identity when the received response code matches a derived code obtained by retrieving elements from the multi-dimensional array at locations addressed by elements taken from the challenge code and a personal code stored at the computer system, wherein the personal code comprises a linear array of elements for addressing a different set of indices of the array of elements.

Подробнее
23-04-2020 дата публикации

SYSTEM AND METHOD TO PROTECT PRIVACY OF PERSONAL-IDENTIFICATION-NUMBER ENTRY ON CONSUMER MOBILE DEVICE AND COMPUTING APPARATUS

Номер: US20200126081A1
Принадлежит:

A system for accepting the input of a PIN comprises a first device receiving a randomized PIN layout derived on a fourth device. The randomized PIN layout is displayed on a display of the first device. A second device comprises an input for accepting a series of key presses to produce a PIN token. The PIN token indicating each of the series of key presses. A third device is in communication with the second device. The third device derives the randomized PIN layout and receives the PIN token from the second device without the PIN token being present on the first device. The third device combines the PIN layout and the PIN token to produce a PIN. The PIN is used to authenticate a transaction. The fourth and third devices each store a shared secret used to independently derive the randomized PIN layout on the fourth and third devices. 1. A system to enable a user to enter a personal identification number (PIN) to authenticate a transaction , the system comprising:a plurality of devices comprising a first, second, third and fourth device;the first device receives a randomized PIN layout derived by the fourth device, and displays the randomized PIN layout on a first display of the first device to enable the user to enter a series of key presses at the second device;the second device accepts the series of key presses from the user to produce a PIN token indicating each of the series of key presses; and derive the randomized PIN layout,', 'receive the PIN token from the second device without the PIN token being present on the first device, and', 'combine the PIN layout and the PIN token to produce the PIN., 'the third device is coupled to the second device to2. A method for authenticating a transaction using a plurality of devices comprising a first , second , third and fourth device , the method comprising: the first device receiving the randomized PIN layout from the fourth device,', 'the fourth device deriving the randomized PIN layout, and', 'the first device ...

Подробнее
28-05-2020 дата публикации

RING TYPE WEARABLE TERMINAL AND METHOD FOR MANUFACTURING THE RING TYPE WEARABLE TERMINAL

Номер: US20200163422A1
Автор: CHILDS Stuart, McLear John
Принадлежит:

A ring type wearable terminal includes: a first ring that has a recessed portion formed on a side surface thereof; a second ring that is bonded to the first ring and that covers the recessed portion; and a communication unit that is housed in the recessed portion. The recessed portion is filled with an adhesive agent. The adhesive agent filling the recessed portion bonds the first ring and the second ring and also fixes the communication unit to the recessed portion so as to protect the communication unit. This allows the strength of the ring type wearable terminal to be improved. 1. A ring type wearable terminal comprising:a first ring that has a recessed portion formed on a side surface thereof;a second ring that is bonded to the first ring and that covers the recessed portion; anda communication unit that is housed in the recessed portion,wherein the recessed portion is filled with an adhesive agent, andwherein a notch that is filled with the adhesive agent is formed on a side edge portion of at least one of the first ring and the second ring.2. The ring type wearable terminal according to claim 1 , wherein an outer peripheral surface of the adhesive agent filling the notch is smoothly continuous with respective outer peripheral surfaces of the first ring and the second ring.3. A method for manufacturing a ring type wearable terminal comprising:forming a notch that is filled with the adhesive agent on a side edge portion of at least one of a first ring and a second ring;putting a communication unit in a recessed portion formed on a side surface of the first ring;applying an adhesive agent to the recessed portion in a heaped manner;bonding the second ring covering the recessed portion to the first ring; andperforming polishing such that respective outer peripheral surfaces of the first ring and the second ring become smoothly continuous. This application is a Continuation of co-pending application Ser. No. 16/533,260, filed on Aug. 6, 2019, which is a Continuation ...

Подробнее
06-06-2019 дата публикации

HYBRID PHYSICAL AND LOGICAL LOCKING DEVICE AND MECHANISM

Номер: US20190169876A1
Принадлежит:

In an approach, a locking device comprises a lock cylinder, a first solenoid valve and a second solenoid valve, a barcode scanner adjacent to the lock cylinder, a spring-loaded interface adjacent to the lock cylinder, and a logical circuit comprising a first disc and a second disc. In an approach for using a hybrid security key in a non-networked device, a locking device of the non-networked device authenticates logical and physical attributes of a hybrid security key, determines authorizations of the hybrid security key, and audits use of hybrid security key while in the locking device of the non-networked device. 1. A locking device comprising:a lock cylinder; the first solenoid valve, when engaged, prevents the lock cylinder from rotating around a central axis of the lock cylinder, and', 'the second solenoid valve, when engaged, prevents the lock cylinder from moving horizontally along the central axis of the locking device;, 'a first solenoid valve and a second solenoid valve, whereina barcode scanner adjacent to the lock cylinder;a spring-loaded interface adjacent to the lock cylinder, wherein upon insertion of a key, the spring-loaded interface physically contacts a portion of the key; anda logical circuit comprising a first disc and a second disc, wherein the first disc is adjacent to the lock cylinder on a first side and the second disc on a second side.2. The locking device of claim 1 , further comprising a third disc.3. The locking device of claim 2 , further comprising a shaft oriented through an opening through a central axis of the first disc claim 2 , the second disc claim 2 , and the third disc.4. A method comprising:responsive to a key being inserted into a front face of a lock cylinder of a locking device, determining whether a physical groove etched into the key arranges a set of locking pins of the locking device in an arrangement that enables rotation of the lock cylinder;responsive to determining that the physical groove arranges the set of ...

Подробнее
21-06-2018 дата публикации

MULTIMODE RETAIL SYSTEM

Номер: US20180174391A1
Принадлежит:

A multimode system for receiving data in a retail environment includes: a secure input module for receiving high security input and low security input from a customer, the high security input to be communicated by the secure input module in cipher text, and the low security input to be communicated by the secure input module in plaintext. The multimode system is adapted to operate in a high security mode and a low security mode. The multimode system is adapted to enter the low security mode upon detection by the multimode system of a security breach condition. In the high security mode, the secure input module accepts low security input and high security input. In the low security mode, the secure input module accepts the low security input and does not accept the high security input. 118-. (canceled)19. A system , comprising:a card reader;a keypad;a processor configured to encrypt data manually input to the keypad and to encrypt information read by the card reader; anda controller configured to transition the system between a high security mode and a low security mode, determine when security of the system has been breached, and transition the system from the high security mode to the low security mode in response to determining that the security of the system has been breached;wherein in the high security mode the card reader is enabled to read a customer card, the keypad is enabled to accept manual input of unsecure information and to accept manual input of secure information, the controller is enabled to receive the encrypted data and the encrypted information, and the controller is enabled to process a retail transaction using the encrypted data and the encrypted information; andwherein in the low security mode the card reader is enabled to read a customer card, the keypad is enabled to accept manual input of unsecure information and is disabled from accepting the manual input of secure information, the controller is enabled to receive the encrypted data and ...

Подробнее
06-06-2019 дата публикации

Systems and methods for programming a credential reader

Номер: US20190171434A1
Автор: John D. Menzel
Принадлежит: XceedId Corp

A credential reader update system includes a server operable to provide a credential reader update via a cellular telephone interface, and a plurality of credential readers. Each credential reader communicates with a presented credential at a credential reader frequency, wherein each credential reader has a credential reader interface having a range. A portable update device is movable into and out of the range, and is operable to receive the credential reader update via the cellular telephone interface. A credential reader update application is included in the portable update device, and is operable to uniquely identify the particular credential reader to be updated. The portable update device transfers the credential reader update to the credential reader via the credential reader interface, and the credential reader update includes firmware instructions that cause the credential reader to perform communications with the presented credential at a second frequency different than the credential reader frequency.

Подробнее
05-07-2018 дата публикации

TRANSACTION DEVICE

Номер: US20180190061A1
Автор: Sakai Hiroyuki
Принадлежит: OKI ELECTRIC INDUSTRY CO., LTD.

A transaction device includes an input section, a determination unit, a recording section, and a transaction processor. The input section includes plural keys. The determination unit monitors for one out of a simultaneous-pressing state in which plural of the keys are pressed at the same time or an extended-pressing state in which one of the keys is pressed continuously for a predetermined duration or longer, and determines that improper input has been performed in cases in which either a simultaneous-pressing state or an extended-pressing state has been detected. The recording section records setting information indicating processing contents for when the determination unit has determined that improper input has been performed. The transaction processor performs transaction processing with a customer using the input section, and performs an action according to setting information recorded in the recording section when the determination unit has determined that improper input has been performed. 1. A transaction device comprising:an input section including a plurality of keys;a determination means that monitors for at least one out of a simultaneous-pressing state in which a plurality of the keys are pressed at the same time or an extended-pressing state in which one of the keys is pressed continuously for a predetermined duration or longer, and that determines that improper input has been performed in cases in which either a simultaneous-pressing state or an extended-pressing state has been detected;a recording section that records setting information indicating processing contents for cases in which the determination means has determined that improper input has been performed; anda transaction processing means that performs transaction processing with a customer using the input section, and that performs an action according to setting information recorded in the recording section in cases in which the determination means has determined that improper input has been ...

Подробнее
27-07-2017 дата публикации

Authenticated remote pin unblock

Номер: US20170214528A1
Принадлежит: ActivCard SA, ASSA ABLOY AB

This invention provides a simple and secure PIN unblock mechanism for use with a security token. A set of one or more passphrases are stored on a remote server during personalization. Likewise, the answers to the passphrases are hashed and stored inside the security token for future comparison. A local client program provides the user input and display dialogs and ensures a secure communications channel is provided before passphrases are retrieved from the remote server. Retrieval of passphrases and an administrative unblock secret from the remote server are accomplished using a unique identifier associated with the security token, typically the token's serial number. A PIN unblock applet provides the administrative mechanism to unblock the security token upon receipt of an administrative unblock shared secret. The remote server releases the administrative unblock shared secret only after a non-forgeable confirmatory message is received from the security token that the user has been properly authenticated. The administrative unblock shared secret is encrypted with the token's public key during transport to maximize security.

Подробнее
13-08-2015 дата публикации

Data card verification system

Номер: US20150228144A1
Автор: Scott A. Vanstone
Принадлежит: Certicom Corp

A method of verifying a pair of correspondents in electronic transaction, the correspondents each including first and second signature schemes and wherein the first signature scheme is computationally more difficult in signing than verifying and the second signature scheme is computationally more difficult in verifying than signing. The method comprises the step of the first correspondent signing information according to the first signature scheme and transmitting the first signature to the second correspondent, the second correspondent verifying the first signature received from the first correspondent, wherein the verification is performed according to the first signature scheme. The second correspondent then signs information according to the second signature scheme and transmits the second signature to the first correspondent, the first correspondent verifies the second signature received from the second correspondent, wherein the verification is performed according to the second signature algorithm; the transaction is rejected if either verification fails. The method thereby allows one of the correspondents to participate with relatively little computing power while maintaining security of the transaction.

Подробнее
09-07-2020 дата публикации

DEVICE SECURITY WITH PHYSICALLY UNCLONABLE FUNCTIONS

Номер: US20200219085A1
Принадлежит: Square, Inc.

An electronic device may include a printed circuit board having a physically unclonable function (PUF) source. The electronic device may also include an integrated circuit (IC) chip positioned on the printed circuit board, and the first PUF source may be embedded in or formed on the printed circuit board external to the IC chip. The IC chip has processing circuitry that is configured to determine PUF data based on the PUF source. The processing circuitry is further configured to determine a cryptographic key or authentication token based on the PUF data and to perform at least one secure operation using the cryptographic key or authentication token. 1. A payment reader device , comprising:an interface configured to receive payment information from a payment card;processing circuitry configured to process the payment information and to transmit the processed payment information to a payment server for approval of a payment transaction based on the processed payment information, the processing circuitry configured to perform at least one secure payment operation for the payment transaction based on physically unclonable function (PUF) data; anda PUF source configured to generate the PUF data, the PUF source comprising memory configured to store a set of bits in a default state, wherein values of the bits in the default state define a pattern based on a physical structure of the memory, and wherein the PUF source is configured to generate the PUF data by triggering a return of the bits to the default state and defining the PUF data based on the values exhibited by the bits in the default state.2. The payment reader device of claim 1 , wherein the PUF source is configured to trigger the return of the bits to the default state by removing an operational voltage to the memory.3. The payment reader device of claim 1 , wherein the PUF source is configured to trigger the return of the bits to the default state by applying an operational voltage to the memory.4. An electronic ...

Подробнее
10-09-2015 дата публикации

Method for reading attributes from an id token

Номер: US20150256531A1
Принадлежит: BUNDESDRUCKEREI GMBH

The invention relates to a method for reading at least one attribute stored in an ID token, wherein the ID token is assigned to a user, comprising the following steps: authenticating the user with respect to the ID token, authenticating a first computer system with respect to the ID token, after successful authentication of the user and the first computer system with respect to the ID token, read-access by the first computer system to the at least one attribute stored in the ID token for transfer of the at least one attribute to a second computer system.

Подробнее
08-09-2016 дата публикации

DEVICE, SYSTEM AND METHOD FOR REDUCING AN INTERACTION TIME FOR A CONTACTLESS TRANSACTION

Номер: US20160260092A1
Принадлежит:

Methods, devices, and systems are described for sending and receiving messages between a terminal reader and a payment device, such as a credit card. A dynamic signature is calculated on the payment device from an application transaction counter, a terminal unpredictable number, and a transaction amount, and it is sent with an application file locator (AFL) to the reader. The reader then sends a read record command to the payment device to get records associated with the AFL, among other normal processing. While the normal processing is occurring for the transaction, the dynamic signature can be recalculated and compared with that from the payment device in order to assure that nothing has surreptitiously changed the values in the messages. 1. A method comprising:sending from a reader to a payment device a terminal unpredictable number and a transaction amount;receiving from the payment device a message with a dynamic signature generated based on an application transaction counter (ATC), the terminal unpredictable number, and the transaction amount, the dynamic signature sent with an application file locator (AFL); and thentransmitting from the reader to the payment device a command message to request one or more records indicated in the AFL from the payment device;receiving at the reader from the payment device the requested one or more records requested by the command message; andcausing a recalculation of the dynamic signatur+e in order to authorize a transaction if the dynamic signature received from the payment device matches the recalculated dynamic signature.2. The method of claim 1 , further comprising:terminating communication between the reader and payment device prior to performing an online transaction.3. The method of claim 2 , further comprising:receiving a cryptogram that is based on the application transaction counter, the terminal unpredictable number, and the transaction amount; andrequesting the transaction be processed online with the cryptogram ...

Подробнее
24-09-2015 дата публикации

USER TERMINAL SYSTEM AND METHOD

Номер: US20150269805A1
Автор: Korala Aravinda
Принадлежит:

A user terminal comprises an encryption apparatus, a tamper detection system associated with the encryption apparatus and means for triggering the tamper detection system in response to tampering with the encryption apparatus, at least one further component, and further means for triggering the tamper detection system, wherein the further means for triggering the tamper detection system is configured to trigger the tamper detection system in response to tampering with the at least one further component. 1. A user terminal comprising:an encryption apparatus;a tamper detection system associated with the encryption apparatus and comprising a triggering system configured to trigger the tamper detection system in response to tampering with the encryption apparatus;at least one further component; anda further triggering system configured to trigger the tamper detection system, wherein the further triggering system is configured to trigger the tamper detection system in response to tampering with the at least one further component.2. A user terminal according to claim 1 , wherein the encryption apparatus comprises an encrypting PIN pad (EPP).3. A user terminal according to wherein the further triggering system comprises at least one detector for detecting tampering with the at least one further component.4. A user terminal according to claim 1 , wherein the further triggering system comprises an arrangement that provides a trigger signal to an input of the tamper detection system.5. A user terminal according to claim 1 , wherein the encryption apparatus is within a housing claim 1 , the at least one further component is outside the housing claim 1 , and the tamper detection system associated with the encryption apparatus is configured in operation to be triggered by tampering with the housing.6. A user terminal according to claim 1 , wherein the at least one further component comprises a further housing claim 1 , and the encryption apparatus is located within the further ...

Подробнее
19-10-2017 дата публикации

Smartcard

Номер: US20170300799A1

Card including a substrate, at least one biometric data entry device on the substrate to receive biometric data about an individual holding the substrate, a memory component on the substrate and containing biometric data about an individual possessing the card and at least one private key, and a processor configured to compare biometric data received via the biometric data entry device to biometric data contained in the memory component to determine whether they match. When there is a biometric data match, a process requiring use of the private key(s) is initiated for authorized use of the card. A chassis intrusion detector system detects tampering with the card and upon such detection, causes deletion of the private key(s) to thereby prevent unauthorized use of the card. 1. A card , comprising:a substrate,at least one biometric data entry device on said substrate to receive biometric data about an individual holding said substrate;at least one memory component on said substrate and containing biometric data about an individual possessing the card and at least one private key;a processor configured to compare biometric data received via said at least one biometric data entry device to biometric data contained in said at least one memory component to determine whether they match and when they match, initiate a process requiring use of the at least one private key for authorized use of the card; anda chassis intrusion detector system that detects tampering with the card and upon such detection, causes erasure or deletion of the at least one private key in said at least one memory component to thereby prevent unauthorized use of the card.2. The card of claim 1 , wherein said processor is configured to initiate the process claim 1 , when the biometric data received via said at least one biometric data entry device matches the biometric data contained in said at least one memory component claim 1 , which includes transmission of an identification number associated with ...

Подробнее
17-10-2019 дата публикации

Systems and methods for point-to-point encryption compliance

Номер: US20190319989A1
Принадлежит: Verifone Inc

Systems and methods for point-to-point encryption compliance are disclosed. In one embodiment, in a point of interaction device comprising at least one computer processor, a method for point-to-point encryption compliance may include: (1) receiving card data from a card reading device; (2) determining an error with the card data; (3) generating substitute data by replacing at least a portion of the card data with substitute data; and (4) communicating the substitute data to a payment server. The card data may be received from a magnetic stripe reader, from an EMV card reader, or from a contactless card reader. The error may include comprises the card data not being compliant with ISO-7813.

Подробнее
08-12-2016 дата публикации

Online payer authentication service

Номер: US20160358175A1
Принадлежит: Individual

A payment authentication service authenticates the identity of a payer during online transactions. The authentication service of the present invention allows a card issuer to verify a cardholder's identity using a variety of authentication methods, such as the use of passwords. Also, the only system participant requiring a certificate is the issuing financial institution. One embodiment of the invention for authenticating the identity of a cardholder during an online transaction involves querying an access control server to determine if a cardholder is enrolled in the payment authentication service, requests a password from the cardholder, verifies the password, and notifies a merchant whether the cardholder's authenticity has been verified. In another aspect of the invention, a chip card and the authentication service independently generate cryptograms that must match in order for the service to verify that the correct chip card is being used by the cardholder.

Подробнее
05-12-2019 дата публикации

BIOMETRIC ACCOUNT CARD

Номер: US20190370446A1
Принадлежит:

A card can include a processor; memory accessible to the processor; and instructions stored in the memory and executable by the processor to: decrypt a private key of a payor stored in memory of the card, where the private key is associated with digital cryptocurrency; use the decrypted private key to generate a signed message to transfer the digital cryptocurrency to an address of a payee; and output the signed message. 1. A card comprising:a processor;memory accessible to the processor; and decrypt a private key of a payor stored in memory of the card, wherein the private key is associated with digital cryptocurrency;', 'use the decrypted private key to generate a signed message to transfer the digital cryptocurrency to an address of a payee; and', 'output the signed message., 'instructions stored in the memory and executable by the processor to2. The card of claim 1 , comprising instructions stored in the memory and executable by the processor to restrict the digital cryptocurrency of the signed message to a single use.3. The card of wherein the digital cryptocurrency comprises a single use account and wherein the instructions to restrict the digital cryptocurrency of the signed message to a single use comprise instructions to delete at least a portion of information of the single use account from the memory of the card.4. A method comprising:via a processor of a card, decrypting a private key of a payor stored in memory of the card, wherein the private key is associated with digital cryptocurrency;using the decrypted private key, generating a signed message to transfer the digital cryptocurrency to an address of a payee; andvia circuitry of the card, outputting the signed message.5. The method of comprising claim 4 , via circuitry of the card claim 4 , restricting the digital cryptocurrency of the signed message to a single use.6. The method of wherein the digital cryptocurrency comprises a single use account and wherein restricting the digital cryptocurrency of ...

Подробнее
03-05-1995 дата публикации

Transaction processing system

Номер: GB2283349A
Принадлежит: International Business Machines Corp

Подробнее
03-04-1996 дата публикации

Data copyright management system

Номер: EP0704785A2
Принадлежит: Mitsubishi Corp

A data copyright management system comprises a database for storing original data, a key control center for managing crypt keys, copyright management center for managing data copyrights, and a communication network for connecting these sections each other; data supplied from the database to users is encrypted and distributed, and the users decrypting the encrypted data by crypt keys obtained from the key control center or copyright management center to use the data. To supply data to users, there are the following two methods: one for one-way supplying encrypted data to users by means of broadcasting or the like, and the other for two-way supplying encrypted data to users corresponding to users' requests. A crypt key system used for encrypting data uses a secret-key cryptosystem, a public-key cryptosystem or a cryptosystem combining a secret-key and a public-key and moreover, uses a copyright management program for managing data copyrights. When a user stores, copies, or transfers data, the data is encrypted by a crypt key different from a crypt key used for supplying the data. The former crypt key is supplied from the key control center or from the copyright management center, or generated by the copyright management program. Moreover, the present invention can be applied to a data copyright management system for using not only signal data but also a plurality of data supplied from a single database or a plurality of data supplied from a plurality of databases. Furthermore, an apparatus to be used by the user to perform data copyright management is also proposed.

Подробнее
05-06-1996 дата публикации

Apparatus for data copyright management system

Номер: EP0715241A2
Принадлежит: Mitsubishi Corp

A data copyright management apparatus is used with a user terminal and comprises a CPU, a CPU bus, ROM, EEPROM, and RAM. The CPU, ROM, EPROM, and RAM are connected to the CPU bus, and a system bus of a device which utilizes the data can be connected to the CPU bus. A data copyright management system program, crypt algorithm, and user information are stored in the ROM, and a second private-key, a permit key, a second secret-key, and copyright information are stored in the EEPROM. A first public-key, a first private-key, a second public-key, and a first secret-key are transmitted to the RAM during the operation. The data copyright management apparatus may be configured in the form of a monolithic or hybrid IC, a thin IC card, PC card, and insertion board which have a unique terminal. If a copyright management program is supplied from the external, the it is stored in the EEPROM, otherwise it is stored in the ROM. In addition to a microprocessor of user terminal which decrypts encrypted data for displaying and processing and re-encrypts the decrypted data for storing, copying, or transferring, at least one microprocessor, desirably two microprocessors, are added for decrypting and re-encrypting data which is encrypted and supplied. The microprocessors to be added may be connected to a system bus of the microprocessor of the user terminal, it is desirable that a multiprocessor configuration is implemented by using a SCSI bus, PCI bus, or SCI bus. Apparatus for decryption and re-encryption may be configured separately or as a unit. Device which is used to input and output encrypted data may be connected directly to the apparatus for decryption and re-encryption. The data copyright management apparatus may be implemented in the form of a monolithic IC, a hybrid IC, or a built-in subboard, and the apparatus in these forms is incorporated in a computer, television set, set-top box, digital video tape recorder, digital video disk recorder, digital audio tape apparatus, or ...

Подробнее
11-11-2004 дата публикации

Gerät für Dateiurheberrechte-Verwaltungssystem

Номер: DE69532434T2
Принадлежит: Mitsubishi Corp

Подробнее
23-07-2002 дата публикации

Digital content management system and apparatus

Номер: US6424715B1
Автор: Makoto Saito
Принадлежит: Mitsubishi Corp

There are provided a digital content management apparatus which further embodies a digital content management apparatus used with a user terminal, and a system which protects the secrets of a digital content. The system and the apparatus are a real time operating system using a microkernel, which is incorporated in the digital content management apparatus as an interruption process having high priority. When a user uses the digital content, whether there is an illegitimate usage or not, is watched by interrupting the usage process. In the case where illegitimate usage is carried out, a warning is given or the usage is stopped. The decryption/re-encryption functions of the digital content management apparatus having the decryption/re-encryption functions are not restricted to the inside of the user apparatus. By providing the decryption/re-encryption functions between the networks, the exchange of secret information between different networks is secured. By using this apparatus for converting a crypt algorithm, information exchange is made possible between systems which adopt different algorithms.

Подробнее
21-10-2004 дата публикации

Method and system for secure authentication

Номер: WO2004091170A2

A System and method configured to provide secure Personal Identification Number (PIN) based authentication is disclosed. A passcode or PIN associated with a customer value card can be securely authenticated by an issuer prior to authorizing payment. An Access Control Server (ACS) can receive the PIN or passcode from a customer via a secure connection over a public network. The ACS can generate an encrypted PIN and can communicate the encrypted PIN to a remote issuer for authentication. The ACS can use one or more hardware security modules to generate the encrypted PIN. The hardware security modules can be emulated in software or implemented in hardware. The system can be configured such that the PIN is not exposed in an unencrypted form in a communication link or in hardware other than the originating customer terminal.

Подробнее
29-12-2022 дата публикации

DEVICE SECURITY WITH PHYSICALLY UNCLONABLE FUNCTIONS

Номер: US20220414646A1
Принадлежит: Block, Inc.

An electronic device may include a printed circuit board having a physically unclonable function (PUF) source. The electronic device may also include an integrated circuit (IC) chip positioned on the printed circuit board, and the first PUF source may be embedded in or formed on the printed circuit board external to the IC chip. The IC chip has processing circuitry that is configured to determine PUF data based on the PUF source. The processing circuitry is further configured to determine a cryptographic key or authentication token based on the PUF data and to perform at least one secure operation using the cryptographic key or authentication token. 120-. (canceled)21. A method , comprising:receiving, with circuitry, first physically unclonable function (PUF) data from a first PUF source of a payment reader, the first PUF data generated by the first PUF source in response to a first challenge;receiving, with the circuitry, second PUF data from the first PUF source or a second PUF source, the second PUF data generated by the first PUF source or the second PUF source in response to a second challenge;comparing, with the circuitry, the first PUF data and the second PUF data;determining, with the circuitry based on the comparing, a degree of randomness of the first PUF source in generating the first PUF data; andcontrolling whether the payment reader uses PUF values from the first PUF source to perform a secure operation for a payment transaction based on the degree of randomness that was determined.22. The method of claim 21 , wherein the determining comprises determining a value indicating the degree of randomness claim 21 , wherein the method further comprises comparing claim 21 , with the circuitry claim 21 , a threshold to the value indicating the degree of randomness claim 21 , and wherein the controlling is based on the comparing the threshold to the value indicating the degree of randomness.23. The method of claim 21 , wherein the second PUF data is received ...

Подробнее
15-12-1993 дата публикации

Transaction processing system

Номер: GB9322360D0
Автор: [UNK]
Принадлежит: International Business Machines Corp

Подробнее
27-10-1998 дата публикации

Transaction processing system

Номер: JP2814923B2
Принадлежит: International Business Machines Corp

Подробнее
03-05-1995 дата публикации

Transaction processing system

Номер: EP0651357A1
Принадлежит: International Business Machines Corp

A transaction processing system comprises at least one transaction terminal (10, 11, 12) having means to receive characteristic data from a user, which characteristic data is required to generate a characteristic image associated with the user, such as an image of the user's signature, from data stored in a data processing system (14); and logic for generating a transaction message by combining transaction data with the characteristic data in such a way that the transaction data is required to recover the characteristic data from the message. The data processing system (14) comprises means to store the user data, to receive and store the message, to recover the characteristic data from the message using the transaction data, and to reconstruct the characteristic image from the user data using the characteristic data to establish that the transaction was valid by associating the characteristic image with the transaction data.

Подробнее
07-11-1989 дата публикации

Method and system for personal identification

Номер: US4879747A
Принадлежит: Individual

The method and system of the invention utilizes a private key of a public-key cryptosystem key pair to encrypt a non-secret password into a digital signature. The password and the digital signature are then encoded and stored on a magnetic stripe or other memory device of the card. To effect a transaction, the digital signature on a received card must be shown to have been generated from the password on the received card. The password preferably includes a digitized photograph of the authorized cardholder which is capable of being displayed at the transaction terminal. This enables the operator of the terminal to verify the identity of the cardholder by visual inspection.

Подробнее
19-02-1991 дата публикации

Method and system for personal identification using proofs of legitimacy

Номер: US4995081A
Принадлежит: Individual

The method and system for the invention utilizes any of a number of "proofs of legitimacy" to generate and verify a personal identification card. A card is generated by computing a digital signature of a non-secret password. The password and the digital signature are then encoded and stored on a magnetic stripe or other memory device of the card. To effect a transaction, the digital signature on a received card must be shown to have been generated from the password on the received card. The password preferably includes a digitized photograph of the authorized cardholder which is capable of being displayed at the transaction terminal. This enables the operator of the terminal to verify the identity of the cardholder by visual inspection.

Подробнее
23-08-2001 дата публикации

Electronic negotiable documents

Номер: US20010016838A1
Автор: Peter Landrock
Принадлежит: Peter Landrock

A method of issuing an electronic negotiable document (END) comprising: creating as data an END and storing this in a tamper-resistant document carrier, the document carrier containing a unique public-secret key pair for signing and verifying and a unique document carrier identifier; signing the unique document-carrier identifier, the END and an END identifier using the secret key of the public-secret key pair and storing the result in the document carrier.

Подробнее
05-02-2008 дата публикации

Electronic negotiable documents

Номер: CA2212457C
Автор: Peter Landrock
Принадлежит: Cryptomathic AS

A method of issuing an electronic negotiable doc-ument (END) comprising: creating as data an END and storing this in a tamper-resistant document carrier, the doc-ument carrier containing a unique public-secret key pair for signing and verifying and a unique document carrier iden-tifier; signing the unique document-carrier identifier, the END and an END identifier using the secret key of the public-secret key pair and storing the result in the docu-ment carrier.

Подробнее
11-09-1986 дата публикации

デ−タシステムと通信する装置およびデ−タシステムと通信する方法

Номер: JPS61502014A

(57)【要約】本公報は電子出願前の出願データであるため要約のデータは記録されません。

Подробнее
15-05-1999 дата публикации

Method and system for personal identification using proofs of legitimacy

Номер: KR0177831B1

본 발명의 방법 및 시스템은 다소의 합법증명서를 신원확인카드에 형성하고 확인하는데 이용한다. 카드는 공용 패스워드의 디지탈 부호를 계산항에 의해 이루어진다. 그후 패스워드 및 디지탈 부호는 카드의 자력선 또는 다른 기억장치에 부호화되고 저장된다. 처리를 효과적으로 하기위해, 접수된 카드의 디지탈 부호는 접수된 카드의 패스워드로부터 이루어지도록 보여져야만 한다. 상기 패스워드는 처리터미널에서 표시될 수 있는 인가된 카드 고정기의 디지탈화 사진을 바람직하게 포함한다. 이러한 것은 터미널의 조작자가 가시화됨에 의해 카드고정기의 증명을 확인할 수 있다. The method and system of the present invention are used to form and verify some legitimate certificates on the identification card. The card is made by calculating a digital code of a public password. The password and digital code are then encoded and stored in the magnetic lines of the card or other storage device. In order to make the process effective, the digital code of the accepted card must be shown to be made from the password of the accepted card. The password preferably comprises a digitalized picture of an authorized card holder which can be displayed at the processing terminal. This can confirm the cardholder's proof by visualizing the operator of the terminal.

Подробнее
04-04-2014 дата публикации

Privacy enhanced identity scheme using an un-linkable identifier

Номер: KR101378504B1
Принадлежит: 베리사인 인코포레이티드

토큰 보유자의 속성들을 당사자에게 선택적으로 배포하기 위해 공개키 및 개인키를 이용할 수 있는 프라이버시 향상된 신원확인 방법이 공개된다. 챌린지 메시지 {Rnonce, RID}에서, Rnonce는 판독기 넌스(nonce)이고, RID는 판독기 식별자이다. 이 방법은, 챌린지 메시지에 응답하여, 적어도 암호화된 개인 토큰 식별자 TID와 세션키 k를 포함하는 응답 메시지를 전송하는 단계를 포함한다. 판독기로부터의 챌린지 메시지에 응답하여, 토큰은, 동일한 토큰으로부터 전송된 다른 식별자들에 대해 링크불가능한 토큰 식별자를 포함하는 메시지를 전송한다. Privacy enhanced identity methods are disclosed that can use public and private keys to selectively distribute token holders' attributes to parties. In the challenge message {Rnonce, RID}, Rnonce is the reader nonnce and RID is the reader identifier. The method includes sending, in response to the challenge message, a response message comprising at least an encrypted personal token identifier TID and a session key k. In response to the challenge message from the reader, the token sends a message that includes a token identifier that is not linkable to other identifiers sent from the same token. 프라이버시, 신원확인, 토큰, 링크불가능한 식별자, 암호화 Privacy, Identity, Tokens, Unlinkable Identifiers, Encryption

Подробнее
27-09-2000 дата публикации

Method for conducting transactions

Номер: RU2157001C2

FIELD: sale systems, electronic mass service systems, communication equipment. SUBSTANCE: Device may be used exchange of securities, organization of payment systems and sale systems using computer networks, organization of banks and bank systems, shops, service centers, lotteries, and so on. The method involves choosing payment secret and public keys, running accumulation transactions, preparation of payment certificate basis, production and addition of payment request, generation of payment signature, checking payment solvency of certificate, adding public key into basis of payment certificate, adding data about payment receiver, payment conditions and identifier of used payment certificate into payment order, selection of secret key of account signature, linking it to open account, generation of signature of payment order of receiver, and processing data about commitment of receiver. EFFECT: protection of financial interests of each participants against breach of confidence by other partners, protection of privacy of payers and receivers of payments. 109 cl, 14 ex оО‘ с ПЧ сэ (19) РОССИЙСКОЕ АГЕНТСТВО ПО ПАТЕНТАМ И ТОВАРНЫМ ЗНАКАМ ВИ” 2 157 001 ' (51) МПК? 13) С2 07 О 7/00 С О07Е 19/00, С 06 Е 17/60, С 12) ОПИСАНИЕ ИЗОБРЕТЕНИЯ К ПАТЕНТУ РОССИЙСКОЙ ФЕДЕРАЦИИ (21), (22) Заявка: 98120922/09, 25.11.1998 (24) Дата начала действия патента: 25.11.1998 (46) Дата публикации: 27.09.2000 (56) Ссылки: 9. СНАЧМ, ЗЕСУКПУ МИТНОЦТ ШРЕМПЕ1САТЮМ: ТКАМЗАСТЮОЮМ ЗУЗТЕМ$ ТО МАКЕ В!С ВКОТНЕК ОВЗОЁЕТЕ, СОММИОМ!САТЮМ$ ОРГ ТНЕ АСМ, у91.28 по 10, ОСТОВЕК 19685, р.1030-1044. КЦ 2022351 СЛ, 30.10.1994. 4$ 4977535 А, 11.12.1990. 4$ 5768385 А, 16.06.1998. Ц$ 5224162 А, 29.06.1993. КУ 2094846 СЛ, 27.10.1997. КО 2096826 СЛ, 20.11.1997. (98) Адрес для переписки: 199034, Санкт-Петербург, Университетская наб. 7/9, Университет, Межвузовский патентно-лицензионный отдел, Матвеевой Т.И. (71) Заявитель: Закрытое акционерное общество "Алкорсофт" (72) Изобретатель: Золотарев О.А., Кузнецов И.В., Мошонкин А ...

Подробнее
27-08-2011 дата публикации

Device, system and method to reduce time of interaction in contactless transaction

Номер: RU2427917C2

FIELD: information technologies. SUBSTANCE: system comprises the following: device of a card owner, issued by an issuer and designed to store data; a reading terminal. The card owner device is composed of the following components: a transaction module; a security module. The reading terminal comprises the following components: a contactless interface; a transaction module; a security module linked to a reading terminal transaction module and designed to interact with the card owner device to prevent violator's interference into a contactless transaction by verification of dynamic signature reliability, containing a transaction currency code and an unpredictable number of the card owner device. EFFECT: increased security of transaction performance in the system due to data authentication in dynamic mode. 16 cl, 7 dwg РОССИЙСКАЯ ФЕДЕРАЦИЯ (19) RU (11) 2 427 917 (13) C2 (51) МПК G06Q 99/00 G06Q 30/00 (2006.01) (2006.01) ФЕДЕРАЛЬНАЯ СЛУЖБА ПО ИНТЕЛЛЕКТУАЛЬНОЙ СОБСТВЕННОСТИ, ПАТЕНТАМ И ТОВАРНЫМ ЗНАКАМ (12) ОПИСАНИЕ ИЗОБРЕТЕНИЯ К ПАТЕНТУ (72) Автор(ы): ХИЛЛ Труди (US), (24) Дата начала отсчета срока действия патента: САХОТА Джегдип Сингх (US), 28.09.2006 ОБЮ Кристиан (US), ВАГНЕР Ким (US), Приоритет(ы): ОЧИЕАНО Анита (US), (30) Конвенционный приоритет: ОППЕНЛЕНДЕР Кэрол (US), 28.09.2005 US 60/721,454 ЧАН Вильям (US), 19.07.2006 US 60/807,775 ШИ Юань (SG), (43) Дата публикации заявки: 27.10.2009 Бюл. № 30 ГЛЕНДЕННИНГ Крэг Аллен (SG) (21)(22) Заявка: 2008116103/08, 28.09.2006 C 2 2 4 2 7 9 1 7 R U C 2 (85) Дата начала рассмотрения заявки PCT на национальной фазе: 25.04.2008 (86) Заявка PCT: US 2006/038047 (28.09.2006) (87) Публикация заявки РСТ: WO 2007/038743 (05.04.2007) Адрес для переписки: 119296, Москва, а/я 113, Э.П. Песикову (54) УСТРОЙСТВО, СИСТЕМА И СПОСОБ СОКРАЩЕНИЯ ВРЕМЕНИ ВЗАИМОДЕЙСТВИЯ ПРИ БЕСКОНТАКТНОЙ ТРАНЗАКЦИИ (57) Реферат: Изобретение относится к вычислительной технике, а именно к системе и устройствам сокращения времени взаимодействия при ...

Подробнее
21-09-2018 дата публикации

Device for transactions

Номер: RU2667577C1

FIELD: control devices.SUBSTANCE: invention relates to the field of non-cash financial transactions, more particularly to transaction devices, and can be applied to ATMs and the like. Transaction device includes an input section, a determining means, a recording section, and a transaction processing means. Input section includes multiple keys. Detection tool monitors one of the simultaneous pressing states, in which a plurality of keys are pressed simultaneously, and a long press state in which one of the keys is pressed continuously for a predetermined duration or longer, and determines that the wrong input was made, in cases in which either a state of simultaneous pressing was detected, or a long-press state. Write section records the configuration information indicating the content of the processing for the cases in which the determining means determined that an incorrect entry was made. Transaction processing means performs the transaction processing in the user using the input section and performs the action according to the setting information recorded in the recording section, in cases in which the means of determining determined that an incorrect entry was made.EFFECT: increased security (safety) of transactions.9 cl, 29 dwg РОССИЙСКАЯ ФЕДЕРАЦИЯ (19) RU (11) (13) 2 667 577 C1 (51) МПК G07D 9/00 (2006.01) G07F 19/00 (2006.01) ФЕДЕРАЛЬНАЯ СЛУЖБА ПО ИНТЕЛЛЕКТУАЛЬНОЙ СОБСТВЕННОСТИ (12) ОПИСАНИЕ ИЗОБРЕТЕНИЯ К ПАТЕНТУ (52) СПК G07D 9/00 (2006.01); G07F 19/206 (2006.01); G07F 7/1016 (2006.01); G07F 7/1033 (2006.01); G07F 7/1083 (2006.01) (21)(22) Заявка: 2017143783, 16.06.2016 16.06.2016 (73) Патентообладатель(и): ОКИ ЭЛЕКТРИК ИНДАСТРИ КО., ЛТД. (JP) Дата регистрации: 21.09.2018 05265632 A, 15.10.1993. RU 2507588 C2, 20.02.2014. 24.07.2015 JP 2015-146959 (45) Опубликовано: 21.09.2018 Бюл. № 27 (85) Дата начала рассмотрения заявки PCT на национальной фазе: 14.12.2017 (86) Заявка PCT: 2 6 6 7 5 7 7 (56) Список документов, цитированных в отчете о поиске: JP 2010282309 ...

Подробнее
09-08-2007 дата публикации

Methods and Tangible Objects Employing Machine Readable Data

Номер: US20070183624A1
Принадлежит: Digimarc Corp

The present invention relates generally to steganography and data hiding. In one implementation we provide a method including: obtaining auxiliary data; providing a mask for a photo-reactive material, the mask corresponding at least in part to the auxiliary data; and exposing the material through the mask to steganographically impart the auxiliary data in the photo-reactive material. The auxiliary data is machine-readable from the exposed material. In another implementation the material is exposed through photolithographic illumination. Of course, other implementations are described and claimed as well.

Подробнее
25-12-2007 дата публикации

Methods and tangible objects employing machine readable data in photo-reactive materials

Номер: US7313253B2
Принадлежит: Digimarc Corp

The present invention relates generally to steganography and data hiding. In one implementation we provide a method including: obtaining auxiliary data; providing a mask for a photo-reactive material, the mask corresponding at least in part to the auxiliary data; and exposing the material through the mask to steganographically impart the auxiliary data in the photo-reactive material. The auxiliary data is machine-readable from the exposed material. In another implementation the material is exposed through photolithographic illumination. Of course, other implementations are described and claimed as well.

Подробнее
07-06-2002 дата публикации

Treatment of waste water produced during process for preparing melamine

Номер: KR100339834B1
Принадлежит: 박호군, 한국과학기술연구원

본 발명은 멜라민 제조 공장에서 배출되는 폐수를 알칼리 조건 하에서 포기하여 암모니아를 포집, 재사용하고, 이후에 산성 조건 하에서 황산알루미늄계 응집제를 사용하여 유기 오염 물질을 응집 작용과 루이스산·염기 형성 작용에 의해 불용화시키고, 이의 침전, 여과 및 처리수를 재사용하는 폐수 처리 방법을 제공한다. In the present invention, the wastewater discharged from the melamine manufacturing plant is abandoned under alkaline conditions, and ammonia is collected and reused. Then, the organic contaminants are aggregated using an aluminum sulfate-based flocculant under acidic conditions and a Lewis acid / base formation action is performed. A wastewater treatment method is provided which insolubilizes and reuses its precipitation, filtration and treated water.

Подробнее
19-09-1984 дата публикации

Generation of identification keys

Номер: EP0118995A1
Принадлежит: British Telecommunications plc

commercial transactions conducted over a telecommunications link are verified using a transaction key available at both ends of the link. The transaction key is produced by combining (1) data supplied to the retailer by a customer and stored by the bank with (2) data stored by the retailer. The telecommunications link includes a node which passes the retailer's data to the bank in the form of a label obtained by encrypting the retailer's code with a client code. The bank retrieves the bank code and decrypts the label to obtain the retailer's code. The bank also retrieves the customer's data and combines the two elements to obtain the same transaction key that was created at the retailer's terminal.

Подробнее
27-12-2007 дата публикации

Method for acoustic two-factor authentication

Номер: RU2313916C2

FIELD: authentication. SUBSTANCE: method comprises using a manual counter for generating acoustic or another wireless signal that represents a digital signature, receiving the signal by a receiver in a bank that requests the PIN code to access to the bill, introducing the PIN code by a user into the receiver in which the signal from the counter is coded with the PIN code, and sending the coded signal to the bank computer through an unsafe line because it is no way to verify that the PIN code is true without the key stored in the computer. EFFECT: enhanced safety. 30 cl 2313916 С2 КО РОССИЙСКАЯ ФЕДЕРАЦИЯ 22 7 #7 #7 2777 7 (19) (11) < ма а 5% (13) <\ “а За ВО < < У С Е МА С2 Знублиховано на СО-ВОМ: МЕМОЗА КВТ 2007/3800 КВ127360 ФЕДЕРАЛЬНАЯ СЛУЖБА ПО ИНТЕЛЛЕКТУАЛЬНОЙ СОБСТВЕННОСТИ (12) ИЗВЕЩЕНИЯ К ПАТЕНТУ НА ИЗОБРЕТЕНИЕ ММАА Досрочное прекращение действия патента из-за неуплаты в установленный срок пошлины за поддержание патента в силе Дата прекращения действия патента: 13.02.2011 Дата публикации: 20.12.2011 Стр.: 1 эгбесзтЕ&с ПЧ с»

Подробнее
31-07-2014 дата публикации

Method for using contents with a mobile card, host device, and mobile card

Номер: KR101424972B1
Автор: 박지순, 신준범
Принадлежит: 삼성전자주식회사

본 발명은 모바일 카드를 이용한 컨텐츠 사용 방법, 호스트 장치, 및 모바일 카드에 관한 것이다. 본 발명은 모바일 카드의 아이디, 공통 키, 및 모바일 카드의 비밀 키에 의해 암호화된 컨텐츠 키를 저장하는 단계; 모바일 카드의 아이디 및 공통 키의 결합 키를 생성하는 단계; 모바일 카드의 비밀 키에 의해 암호화된 컨텐츠 키를 결합 키에 의해 암호화한 제1 암호문을 생성하는 단계; 제1 암호문을 모바일 카드로 송신하는 단계; 모바일 카드에서 복호화된 컨텐츠 키를 결합 키에 의해 암호화한 제2 암호문을 수신하는 단계; 및 제2 암호문을 복호화하는 단계를 포함하도록 함으로써, 사용자로 하여금 원격지에서 암호화된 컨텐츠를 사용할 수 있도록 하는 효과가 있다. The present invention relates to a content using method using a mobile card, a host device, and a mobile card. The method includes storing a content key encrypted by an ID of a mobile card, a common key, and a secret key of a mobile card; Generating a joint key of an identity and a common key of the mobile card; Generating a first cipher text in which a content key encrypted by a secret key of the mobile card is encrypted by a combination key; Transmitting a first cipher text to the mobile card; Receiving a second cipher text in which a content key decrypted by the mobile card is encrypted by a combination key; And decrypting the second cipher text, thereby enabling the user to use the encrypted content at a remote location.

Подробнее
05-07-2011 дата публикации

Embedding hidden auxiliary information in media

Номер: US7974439B2
Автор: Geoffrey B. Rhoads
Принадлежит: Digimarc Corp

Methods and apparatus for steganographically embedding information in media signals (e.g., audio and video) are provided. One claim recites a method of enabling tracing of a media signal to a distribution point of the media signal, including: providing time and place information associated with the distribution point, the distribution point includes at least speakers to render the media signal to an assembled audience; utilizing a programmed electronic processor, embedding the time and place information in the media signal, such that the time and place information is imperceptibly distributed in the media signal, said embedding alters data representing audible portions of the media signal or alters data representing video picture elements of the media signal to convey the time and place information in the media signal; and at least the place information is recoverable from plural different portions of the media signal. Of course, other claims, combinations and features are also provided.

Подробнее
26-07-2011 дата публикации

Audio encoding to convey auxiliary information, and decoding of same

Номер: US7987094B2
Автор: Geoffrey B. Rhoads
Принадлежит: Digimarc Corp

The present claims relate generally to steganographically encoding and decoding of audio signals. One claim recites a method of embedding auxiliary information in data representing audio. The method includes acts of: using at least a programmed electronic processor, altering data representing audio to include a sequence of bits of auxiliary information, said altering based on a carrier signal and corresponding to the sequence of bits, and said altering based on a local gain that varies within the data representing audio, the sequence of bits of auxiliary information including at least one fixed registration sequence for registration of the auxiliary information within the data representing audio and at least one message sequence, and in which the fixed registration sequence and the at least one message sequence are interleaved in at least some portions of the data, and in which the fixed registration sequence is provided in the data representing audio so as to allow determination of threshold levels associated with the auxiliary information; and repeating the altering of the data representing audio to include redundant instances of at least some of the auxiliary information including at least the fixed registration sequence. Of course, other combinations and claims are provided as well.

Подробнее
16-08-2011 дата публикации

Methods, objects and apparatus employing machine readable data

Номер: US8000518B2
Принадлежит: Digimarc Corp

The present invention relates generally to steganography and data hiding. One claim recites an object including: electronic processing circuitry having an operating or performance metric associated therewith; and steganographic indicia carried by the object, the steganographic indicia is usable as an index to verify the operating or performance metric. Another claim recites an apparatus including: electronic memory; and machine-readable indicia usable as a registry index including data that provides an indication regarding an expected capacity of the electronic memory. Other combinations are described and claimed as well.

Подробнее
06-09-2011 дата публикации

Methods and systems for steganographic processing

Номер: US8014563B2
Автор: Geoffrey B. Rhoads
Принадлежит: Digimarc Corp

The present claims utilize steganographic embedding to help facilitate tracing of unauthorized copies to a location and particular time. One claim recites a method including: obtaining data representing audio or video, the audio or video to be communicated to an audience assembled at a location at a particular time; and steganographic embedding binary information in the data with a programmed electronic processor, said steganographic embedding modifies portions of the data to hide the binary information in the data, the binary information is associated with the location and particular time of communicating the audio or video to the audience assembled at the location at the particular time. The binary information enables an unauthorized version of the communicated audio or video to be traced back to the location and particular time. Of course, other combination and claims are provided too.

Подробнее
20-09-2011 дата публикации

Apparatus and methods to process video or audio

Номер: US8023692B2
Автор: Geoffrey B. Rhoads
Принадлежит: Digimarc Corp

The presently claimed invention relates generally to video or audio data. One claim recites an apparatus. The apparatus includes an input to receive data associated with video or audio; a decoder to analyze the data associated with video or audio for a steganographic signal hidden therein, the steganographic signal hidden in data representing video picture elements or in data representing audio elements; an extractor to extract an identifier from the data associated with video or audio; a generator to provide a signal based at least in part on a result produced by said decoder and said extractor; and an output to output the signal. Of course, other combinations are provided and claimed as well.

Подробнее
01-11-2011 дата публикации

Methods for audio watermarking and decoding

Номер: US8051294B2
Автор: Geoffrey B. Rhoads
Принадлежит: Digimarc Corp

The presently claimed invention relates generally to encoding and decoding audio signals to include auxiliary information. One example encoding technique includes steganography. One method recites: using a microphone, obtaining an audio signal carried by sound waves; utilizing an analog-to-digital converter to convert the audio signal into a digital audio signal; utilizing a programmed electronic processor, extracting auxiliary data from a series of segments of the digital audio signal, the segments conveying the same auxiliary data, yet the segments represent the auxiliary data differently as code signals carrying the same auxiliary data change over the blocks, the auxiliary data being steganographically hidden in the digital audio signal; and utilizing a programmed electronic processor, utilizing the auxiliary data from the series of segments to increase confidence of accurate extraction of the auxiliary data, the auxiliary data being separately decoded from the segments and combined to increase the confidence of extraction of the auxiliary data. Of course, other combination and claims are provided as well.

Подробнее
24-04-2012 дата публикации

Methods and apparatus to process imagery or audio content

Номер: US8165341B2
Автор: Geoffrey B. Rhoads
Принадлежит: Digimarc Corp

The presently claimed invention relates generally to digital watermarking, and processing imagery (e.g., including video) or audio content. One claim recites a method including: obtaining first media comprising imagery or audio; obtaining second media comprising imagery or audio; aggregating the first media and the second media to yield a unit; and using a programmed electronic processor, examining the unit for the presence of a digital watermark. Another claim recites a method comprising: upon encountering imagery or audio content, performing a screening operation on the imagery or audio content; based at least in part on the result of the screening operation, determining whether to derive or extract identifying data from the imagery or audio content, said act of determining uses a programmed electronic processor; providing the identifying data for storage in an electronic data record. Still another claim recites a method comprising: using a programmed electronic processor, extracting identifying data from data representing imagery or from data representing audio; automatically dialing a telephone number; providing the identifying data for telephonic communication to a device hosting the telephone number; receiving signals representing a human voice command; and providing signals for telephonic communication to a device hosting the telephone number. Of course, other claims and combinations are provided too.

Подробнее
19-06-2012 дата публикации

Steganographic encoding and decoding of auxiliary codes in media signals

Номер: US8204222B2
Автор: Geoffrey B. Rhoads
Принадлежит: Digimarc Corp

Methods of steganographically encoding auxiliary data into audio and decoding the auxiliary data. In an encoding method, a processor maps the auxiliary data to samples in the audio data. A processor modifies the mapping of the auxiliary data to the samples over time. A processor modifies a feature of the samples of the audio data to which the code signals are mapped to convey the auxiliary data substantially imperceptibly in the audio data. In a decoding method, a processor performs decoding of a multibit auxiliary code embedded in an audio signal. A processor decodes code values of the auxiliary code from two or more different portions of the audio signal, each having the multibit auxiliary code. A processor combines the code values decoded from the two or more different portions of the audio signal to determine the code values of the auxiliary code.

Подробнее
28-04-1998 дата публикации

Identification/authentication system using robust, distributed coding

Номер: US5745604A
Автор: Geoffrey B. Rhoads
Принадлежит: Digimarc Corp

An identification code signal is impressed on a carrier to be identified (such as an electronic data signal or a physical medium) in a manner that permits the identification signal later to be statistically discerned and the carrier thereby identified. The method and apparatus are characterized by robustness despite degradation of the encoded carrier, and by holographic permeation of the identification signal throughout the carrier.

Подробнее
05-05-1998 дата публикации

Image steganography system featuring perceptually adaptive and globally scalable signal embedding

Номер: US5748763A
Автор: Geoffrey B. Rhoads
Принадлежит: Digimarc Corp

An identification code signal is hidden in a carrier signal (such as an electronic data signal or a physical medium) in a manner that permits the identification signal later to be discerned. The carrier signal can thereby be identified, or some machine responsive action can thereby be taken. In one image steganography embodiment, the relative strength of the identification code signal is both perceptually adapted in accordance with psychovisual characteristics of the image, and globally scaled in accordance with a user-set visibility control. The technique can be applied in video imagery embodiments to control associated video equipment, e.g. to serve as a copy control signal.

Подробнее
05-02-2002 дата публикации

Digital watermarks and methods for security documents

Номер: US6345104B1
Автор: Geoffrey B. Rhoads
Принадлежит: Digimarc Corp

Security documents (e.g. passports, currency, event tickets, and the like) are encoded to convey machine-readable multi-bit binary information (e.g., a digital watermark), usually in a manner not alerting human viewers that such information is present. The documents can be provided with overt or subliminal calibration patterns. When a document incorporating such a pattern is scanned (e.g. by a photocopier), the pattern facilitates detection of the encoded information notwithstanding possible scaling or rotation of the scan data. The calibration pattern can serve as a carrier for the watermark information, or the watermark can be encoded independently. In one embodiment, the watermark and the calibration pattern are formed on the document by an intaglio process, with or without ink. A photocopier responsive to such markings can take predetermined action if reproduction of a security document is attempted. A passport processing station responsive to such markings can use the decoded binary data to access a database having information concerning the passport holder. Some such apparatuses detect both the watermark data and the presence of a visible structure characteristic of a security document (e.g., a printed seal of the document's issuer).

Подробнее
02-01-2003 дата публикации

Digital authentication with analog documents

Номер: US20030002710A1
Автор: Geoffrey Rhoads
Принадлежит: Digimarc Corp

Security of photographic identification documents is enhanced by embedding within the photographic image encoded information that may be correlated to other information pertaining to the individual represented by the image, such other information being, for example, printed on the document adjacent to the photograph.

Подробнее
11-02-2003 дата публикации

Encoding and decoding in accordance with steganographically-conveyed data

Номер: US6519352B2
Автор: Geoffrey B. Rhoads
Принадлежит: Digimarc Corp

A digital content object comprised of plural portions is steganographically encoded, with different portions of the object conveying different steganographic data. Data steganographically conveyed in a first portion can be required to access information in a second portion. Data steganographically conveyed in the second portion can be required to access information in a third portion, and so on. Such arrangements make it more difficult for hackers to gain access to electronic content.

Подробнее
18-05-2010 дата публикации

Watermark embedder and reader

Номер: US7720249B2
Автор: Geoffrey B. Rhoads
Принадлежит: Digimarc Corp

A watermark system includes an embedder, detector, and reader. The watermark embedder encodes a watermark signal in a host signal to create a combined signal. The detector looks for the watermark signal in a potentially corrupted version of the combined signal, and computes its orientation. Finally, a reader extracts a message in the watermark signal from the combined signal using the orientation to approximate the original state of the combined signal. While adapted for images, video and audio, the watermark system applies to other electronic and physical media. For example, it can be applied to mark graphical models, blank paper, film and other substrates, texturing objects for ID purposes, etc.

Подробнее
26-09-2006 дата публикации

Watermark embedder and reader

Номер: US7113615B2
Принадлежит: Digimarc Corp

A watermark system includes an embedder, detector, and reader. The watermark embedder encodes a watermark signal in a host signal to create a combined signal. The detector looks for the watermark signal in a potentially corrupted version of the combined signal, and computes its orientation. Finally, a reader extracts a message in the watermark signal from the combined signal using the orientation to approximate the original state of the combined signal. While adapted for images, video and audio, the watermark system applies to other electronic and physical media. For example, it can be applied to mark graphical models, blank paper, film and other substrates, texturing objects for ID purposes, etc.

Подробнее
03-01-2006 дата публикации

Methods for audio watermarking and decoding

Номер: US6983051B1
Автор: Geoffrey B. Rhoads
Принадлежит: Digimarc Corp

An identification code signal is hidden in a carrier signal (such as an electronic data signal or a physical medium) in a manner that permits the identification signal later to be discerned. The carrier signal can thereby be identified, or some machine responsive action can thereby be taken. The technique can be applied in video imagery embodiments to control associated video equipment, e.g. to serve as a copy control signal.

Подробнее
18-03-2004 дата публикации

IDENTIFICATION / CERTIFICATION CODING METHOD AND DEVICE

Номер: DE69432480T2
Автор: B. Geoffrey Rhoads
Принадлежит: Digimarc Corp

Подробнее
13-09-2005 дата публикации

Steganographic encoding and decoding of auxiliary codes in media signals

Номер: US6944298B1
Автор: Geoffrey B. Rhoads
Принадлежит: Digimarc Corp

One aspect of the invention is a method of decoding an auxiliary code embedded in an audio signal. The method performs a statistical decoding of a multibit auxiliary code embedded in an audio signal. The auxiliary code has been repetitively embedded in the audio signal. The method decodes code values of the auxiliary code from two or more different portions of the audio signal, each having the multibit auxiliary code. It then uses the code values decoded from two or more different portions to determine statistically the code values of the auxiliary code. Another aspect of the invention is another method of decoding an auxiliary code embedded in an audio signal. The method receives an audio signal suspected of being embedded with an auxiliary code. It evaluates a statistical feature of a portion of the audio signal to decode code values of the auxiliary code from the audio signal. It then determines a code value in the auxiliary code based on the statistical feature. The statistical feature may comprise, for example, the power of the audio signal. The statistical feature may be analyzed over different portions of the audio signal to decode two or more values of the auxiliary code.

Подробнее
24-11-1998 дата публикации

Security system for photographic identification

Номер: US5841886A
Автор: Geoffrey B. Rhoads
Принадлежит: Digimarc Corp

Security of photographic identification documents is enhanced by embedding within the photographic image encoded information that may be correlated to other information pertaining to the individual represented by the image, such other information being, for example, printed on the document adjacent to the photograph.

Подробнее
26-09-2002 дата публикации

Data hiding through arrangement of objects

Номер: US20020136429A1
Принадлежит: Digimarc Corp

The present invention provides steganographic embedding techniques. A digital watermark signal is reduced to a set of spatial positions. The set of spatial positions sufficiently conveys the digital watermark signal. Message objects are positioned according to the set of spatial positions. Non-message objects are combined with the message objects to form an image or design. The message objects include distinguishable characteristics, e.g., via color, contrast, gray-scale level or luminance, in comparison to the non-message objects. The digital watermark signal is detected by distinguishing the message objects from the non-message objects (e.g., via color or contrast differences) and analyzing the relative placement of the message objects within the image or design.

Подробнее
14-02-2002 дата публикации

Printing media and methods employing digital watermarking

Номер: US20020018579A1
Принадлежит: Digimarc Corp

Stationary, or other printable media, is encoded with a digital watermark. The watermark is not conspicuous to a human observer of the media, yet conveys plural bits of auxiliary information when optically scanned and digitally processed. The watermark can be formed by ink-jet printing, or otherwise. The encoded information can be used for various purposes, including authenticating the document as an original, linking to associated on-line resources, and distinguishing seemingly-identical versions of the same document (document serialization).

Подробнее
23-10-2007 дата публикации

Secure document design carrying auxiliary machine readable information

Номер: US7286684B2
Принадлежит: Digimarc Corp

A two dimensional pattern design for secure documents serves as both a machine readable code and an aesthetic part of the documents' design. A method for generating the design generates a variable auxiliary message comprising message values and maps the message values to a two dimensional pattern of areas on the document. The areas each comprise an arrangement of pixels on the printed document. Depending on a value of the message mapped to a corresponding area, the method assigns a visible structure to the corresponding area. Different visible structures are assignable to a single value of the message to create a visible design having a desired aesthetic appearance.

Подробнее
19-04-2005 дата публикации

Methods and tangible objects employing textured machine readable data

Номер: US6882738B2
Принадлежит: Digimarc Corp

A tangible object (such as a microprocessor, wristwatch, pharmaceutical, compact disc, vehicle part, etc) is surface-textured to encode a plural-bit code thereon. In one arrangement, this encoding conveys date information. In use, the object can be imaged by a scanner apparatus, and the resulting scan data analyzed to discern the plural-bit code. The decoded date information can be used in a determination relating to the object. For example, at a port of entry, date information encoded on a Rolex wristwatch can be used to determine whether importation of the wristwatch should be permitted. The texture-encoded data can also convey other information, such as a vehicle identifier for an automotive part, a place of fabrication, a specification with which the part complies, etc.

Подробнее
31-01-2006 дата публикации

Hiding geo-location data through arrangement of objects

Номер: US6993152B2
Принадлежит: Digimarc Corp

The present invention provides steganographic-embedding techniques. In one implementation a digital watermark signal is mapped to a set of spatial positions. Physical message objects are positioned according to the set of spatial positions. The signal is provided on a physical structure such as a building or road. The signal may include geo-location information. The geo-location information identifies the location of the physical structure. In other cases the signal includes a marker or identifier. The marker or identifier provides a reference point for images depicting the physical structure.

Подробнее
18-03-2003 дата публикации

Image capture device with steganographic data embedding

Номер: US6535618B1
Автор: Geoffrey B. Rhoads
Принадлежит: Digimarc Corp

An image capture device is provided with processing circuitry that steganographically embeds plural-bit auxiliary data within the captured image data. The embedding may be accomplished by adding a low level noise signal to the image data, where the noise signal has the auxiliary data encoded therein. Image data output by the device thus conveys auxiliary data that can be used for a variety of purposes.

Подробнее
17-08-2004 дата публикации

Redundantly embedding auxiliary data in source signals

Номер: US6778682B2
Автор: Geoffrey B. Rhoads
Принадлежит: Digimarc Corp

The present invention relates to a data hiding method that includes changing values of input pixels corresponding to an input two-dimensional image to encode an N-bit auxiliary data signal therein, thereby yielding encoded output pixels defining an encoded output image. N comprises at least two. The method is characterized in that the N-bit auxiliary data signal is redundantly encoded in the image by at least: changing values of input pixels in a first image location according to a first pattern in order to encode the N-bit auxiliary data signal therein; changing the pattern according to a key to yield a second pattern; and changing values in a second image location according to the second pattern in order to encode the N-bit auxiliary data signal therein.

Подробнее
25-05-2010 дата публикации

Methods and systems for steganographic processing

Номер: US7724919B2
Автор: Geoffrey B. Rhoads
Принадлежит: Digimarc Corp

Media content (e.g., audio or visual) can be steganographically encoded for a variety of purposes. One such purpose relates to tracing rendered media content back to a particular time and place. For example, one claim recites a method including: receiving data representing media content, the media content is to be rendered to an audience assembled at a location; and then encoding tracing information in the data utilizing at least a programmed electronic processor, said encoding alters at least some portions of the data to hide the tracing information in the data, the tracing information is associated with a time and location of rendering the media content to the audience assembled at the location, the tracing information will permit an illicitly captured version of the rendered media content to be traced back to the time and location of the rendering. Of course, other combinations and claims are presented as well.

Подробнее
21-03-2006 дата публикации

Authentication of identification documents

Номер: US7016516B2
Автор: Geoffrey B. Rhoads
Принадлежит: Digimarc Corp

Security of photographic identification documents is enhanced by providing machine-readable information that may be correlated to other information pertaining to the individual represented by the image, such other information being, for example, printed on the document adjacent to the photograph.

Подробнее
29-01-2002 дата публикации

Security documents with hidden digital data

Номер: US6343138B1
Автор: Geoffrey B. Rhoads
Принадлежит: Digimarc Corp

An identification code signal is hidden in a carrier signal (such as an electronic data signal or a physical medium) in a manner that permits the identification signal later to be discerned. The carrier signal can thereby be identified, or some machine responsive action can thereby be taken. The technique can be applied in video imagery embodiments to control associated video equipment, e.g. to serve as a copy control signal.

Подробнее
01-04-2003 дата публикации

Methods for watermark decoding

Номер: US6542618B1
Автор: Geoffrey B. Rhoads
Принадлежит: Digimarc Corp

An identification code signal is hidden in a carrier signal (such as an electronic data signal or a physical medium) in a manner that permits the identification signal later to be discerned. The carrier signal can thereby be identified, or some machine responsive action can thereby be taken. The technique can be applied in video imagery embodiments to control associated video equipment, e.g. to serve as a copy control signal.

Подробнее
05-03-2013 дата публикации

Steganographic encoding and detecting for video signals

Номер: US8391541B2
Автор: Geoffrey B. Rhoads
Принадлежит: Digimarc Corp

Aspects of the invention relate generally to steganography, data hiding and/or digital watermarking for video and other media signals. One claim recites a method including: obtaining a media signal comprising a message steganographically embedded therein; obtaining information obtained from the media signal; adjusting a message detection process with reference to the information; and detecting the message from the media signal according to the adjusted message detection process. Of course, other combinations are provided as well.

Подробнее
08-11-2011 дата публикации

Hiding and detecting messages in media signals

Номер: US8055012B2
Автор: Geoffrey B. Rhoads
Принадлежит: Digimarc Corp

The present invention relates to steganographically hiding messages in media signals such as video and audio signals. In one implementation, a method of decoding an encoded media signal to extract a plural-bit auxiliary signal therefrom is provided. The media signal includes a plurality of intervals, with the plural-bit auxiliary signal being steganographically encoded in at least some of the intervals. Once encoded in the media signal the plural-bit auxiliary signal is generally imperceptible to a human observer of the encoded media signal. The encoding includes subtle changes to at least some portions of the media signal to thereby represent the plural-bit auxiliary signal. The method includes receiving the encoded media signal; and decoding the received encoded media signal to extract the plural-bit auxiliary signal therefrom. The decoding analyzes a plurality of intervals of the media signal with greater or lesser confidence in the extracted multi-bit auxiliary data signal being obtained by processing more or less intervals of the encoded media signal, respectively.

Подробнее
15-01-2013 дата публикации

Audio encoding to convey auxiliary information, and media embodying same

Номер: US8355514B2
Автор: Geoffrey B. Rhoads
Принадлежит: Digimarc Corp

Methods of processing audio to convey auxiliary information hidden therein are provided. Various arrangements are disclosed. One alters data representing audio to include a sequence of bits of auxiliary information. The altering is based on a carrier signal and corresponding to the sequence of bits, and is based on a perceptibility threshold that varies within the data representing audio. Other arrangements are provided as well.

Подробнее
06-12-2011 дата публикации

Methods and systems for steganographic processing

Номер: US8073193B2
Автор: Geoffrey B. Rhoads
Принадлежит: Digimarc Corp

Electronic content data (e.g., audio or visual) can be steganographically encoded for a variety of purposes. One claim recites a method practiced by a first party, including the acts: (a) receiving content that has been previously steganographically encoded by a second party with first plural-bit data; and (b) utilizing a programmed electronic processor, further steganographically encoding the content with a second plural-bit data different than the first. The further encoding includes altering digital data representing human-perceptible attributes of the content, in a manner that is dependent on the content. Both of the first and second plural-bit data are represented in encoded content. Of course, a great variety of other claims, arrangements and features are provided.

Подробнее
29-11-2011 дата публикации

Audio and video signal processing

Номер: US8068679B2
Автор: Geoffrey B. Rhoads
Принадлежит: Digimarc Corp

The present disclosure related generally to audio and video signal processing. Various arrangements are disclosed. One method recites: (a) obtaining data representing audible portions of audio or representing picture portions of video; (b) using a programmed electronic processor, determining identifying information from the obtained data by computing a frequency transform to produce frequency transform data, and processing the frequency transform data to derive a pattern, and using the pattern as the identifying information for the audio or video; and (c) using the identifying data to facilitate purchase or license of the audio or video. Other arrangements are disclosed as well.

Подробнее
22-07-2014 дата публикации

Methods and arrangements for composing information-carrying artwork

Номер: US8788971B2
Автор: Geoffrey B. Rhoads
Принадлежит: Digimarc Corp

Data defining several different information-carrying patterns can be stored on mass storage of a computer workstation and serve as a library of design elements for future designs. The same user-interface techniques that are employed to pick colors in image-editing software (e.g. Adobe Photoshop) and fill textures in presentation programs (e.g. Microsoft PowerPoint) can similarly be used to present a palette of information patterns to a security document designer. Clicking on a visual representation of the desired pattern makes the pattern available for inclusion in a security document being designed (e.g. filling a desired area). A great variety of other features and arrangements are also detailed.

Подробнее
19-09-2000 дата публикации

Computer system linked by using information in data objects

Номер: US6122403A
Автор: Geoffrey B. Rhoads
Принадлежит: Digimarc Corp

Various improvements to steganographic systems, and applications therefore, are disclosed. The improvements include facilitating scale and rotation registration for steganographic decoding by use of rotationally symmetric steganographically embedded patterns and subliminal digital graticules; improved techniques for decoding without access to unencoded originals; improving robustness of steganographic coding in motion pictures and/or in the presence of lossy compression/decompression; and representing data by patterned bit cells whose energy in the spatial domain facilitates decoding registration. Applications include enhanced-security financial transactions, counterfeit resistant identification cards, fraud deterrent systems for cellular telephony, covert modem channels in video transmissions, photo duplication kiosks with automatic copyright detection, and hotlinked image objects (e.g. with embedded URLs) for use on the internet.

Подробнее