摘要:
The present invention relates to a method of privacy-preserving during an access to a restricted e-service requiring user private data from a smart card. The invention relates more particularly to the field of methods implemented so that the user has the guarantee that only the private data needed to access to the e-service are extracted from the smart card. It is to guarantee that the user has a perfect knowledge of his private data provided by his smart card to a requester. With the invention a message notifying to the user the very nature of the identity assertion is displayed on the screen of the smart card. By doing so, the card ensure 100% security with regard to user consent: the data read out of his card cannot differ comparing to the data requested by the service provider through the terminal.
摘要:
A method and an apparatus for providing feedback on input of data. A processor (111) iteratively receives (S52) a character of the data and generates (S55; S56) a feedback output from the received character and a feedback output generated previously. The processor (111) also outputs (S57) the feedback output. The processor (111) preferably belongs to an apparatus that further comprises a user interface (113), through which the data is received. It is preferred that the feedback output is an image, advantageously generated from at least one of geometric shapes, colours, rotations of the image and flips of the image. The feedback output for a first received character can be based on the first received character and a starting output and it is advantageous that when the data are a password, the starting output is generated from user related data.
摘要:
A device for presenting a digital voucher comprises: voucher presenting means for presenting a digital voucher and a microphone. The device is arranged to: present the voucher using the voucher presenting means; receive a sound challenge signal via the microphone; and present a challenge response using the voucher presenting means.
摘要:
Systems and methods use an origin pattern to verify the authenticity of a host object. The origin pattern includes a text-based serial number and a computer-graphics based surface-texture component. The serial number includes a public manufacturer identifier and an object identifier sequence that is based on a hash of a private manufacturer identifier and a private object identifier. The surface-texture component includes a two dimensional texture mapped onto a three dimensional surface, the generation of the surface being based on the hash. In response to an authentication request for an origin pair, the system may verify the serial number component exists in a data store and generate a challenge surface-texture component based on data in the data store. If the challenge surface-texture component matches, the system may use a time-location stamp to determine an authenticity probability and provide an indication of authenticity in response to the verification request.
摘要:
Embodiments relates to a method for encrypting a 3D object (O) defined at least by a set of first points ( p i ) and a set first of faces (F), contained in a bounding box (B), the method being executed by an encryption device and comprising: - determining (S4) a set of second points ( p si ) by bijection of the set of first points ( p i ), and a second set of faces ( F s ), - determining (S5) an encrypted 3D object ( 0 s ) defined at least by the set of second points ( p si ) and the second set of faces ( F s ),
wherein the first points ( p i ) are associated with respective first indexes (i), the second points ( p si ) are associated with respective second indexes ( s j ), and a face is specified by a list of indexes, wherein the encrypted 3D object ( 0 s ) is contained in said bounding box (B), the method further comprising: - partitioning the bounding box (B) into a set of first sub-boxes ( n j ), - determining a set of second sub-boxes ( n sj ) by bijection of the set of first sub-boxes ( n j ), in function of a secret key (k),
wherein the position of a second point ( p si ) is determined in function the position of the corresponding first point ( p i ), the position of the first sub-box ( n j ) containing the corresponding first point, and the position of the second sub-box ( n sj ) corresponding with said first sub-box ( n j ).
摘要:
Methods, devices, and computer program products facilitate the application of a content use policy based on watermarks that are embedded in a content. Watermark extraction and content screening operations, which can include the application of content usage enforcement actions, may be organized such that some or all of the operations can be conducted at different times by different devices. These operations can be conducted by one or more trusted devices that reside in a networked environment. Real-time access to a content can also be facilitated by utilizing existing watermark extraction records. To facilitate real-time access to the content, the extraction records may contain segmented authentication information that correspond to particular segments of the content that is being accessed. Additionally, or alternatively, new watermark extraction operations can be conducted in real-time to produce new watermark extraction records.
摘要:
A method of transmitting authorization data, said authorization data for authorizing a process. The method comprises securely providing an encryption key to an encrypter and a decrypter; encrypting at the encrypter input authorization data with the encryption key; converting the encrypted data into an optical code pattern; displaying the optical code pattern on a display device; reading the optical code pattern with an optical reader; converting the optical code pattern into received encrypted data corresponding the encrypted data; decrypting the received encrypted data at the decrypter to generate decrypted data corresponding to the input authorization data, and authorizing the process with the data corresponding to the input authorization data.
摘要:
A marker placement device includes, a marker placement method decision section that decides, for every predetermined pitch from a starting edge of a side to an end edge of the side, a placement position of a marker for detecting a position within a rectangular image region, the placement position being along the side of the image region within an image. A marker adding section that adds the marker to the image according to the placement position decided is provided, where, when a gap shorter than the pitch remains between the end edge and the decided placement position closest to the end edge of the side, the marker placement method decision section decides a first marker placement position closest to the starting edge, and decides a subsequent marker placement position.
摘要:
To code a digital object (310), a sender (110) preferably encrypts (210) its data to obtain a bitstream that is converted (230) into a set of points (320) that are then packaged (240) and the coded object (330) is output (250). A receiver (140) receives (260) and unpacks (270) the coded object (330) to obtain the set of points (320), converts (280) the set of points (320) to a bitstream that, if needed, is decrypted (290) to generate the original object (310) that is output (295). The invention is particularly suited for protection of 3D objects, but it can also be used to protect any kind of digital data, in which case it may be possible to append the protected data of another kind to a 3D object.
摘要:
A method for encrypting a 3D object. In a preferred embodiment, the encryption shapes the 3D object by generating (S21) a set of secret functions using a secret K , applying (S22) the generated functions to the 3D object, determining (S23) the function that gives an output that is closest to predetermined characteristics, encrypting (S24) the 3D object using the determined function, and outputting (S25) the encrypted 3D object and an indication of the determined function. Also provided is a corresponding decryption method, an encryption device (910) and a decryption device (940).