摘要:
A method for activating an optical article includes providing an optical article, wherein at least one mark is disposed on the optical article, wherein the mark comprises an optical-state change material in an initial state, the initial state preventing the optical article from being read by a player; deriving an unlock code by cryptographic operations on an optical article operatively coupled with a POS equipment and a data input from a medium encrypted with a cryptographic algorithm; deriving a toggling signal from an unlock code, and applying the toggling signal to the at least one mark resulting in changing the optical-state change material to a final state, the final state allowing the optical article to be read by the player; wherein the toggling signal comprises a set of values corresponding to the respective states of each of a plurality of marks on the surface of the optical article, and wherein applying the toggling signal results in setting each of the marks to either one of an initial state or a final state, corresponding to the value for the mark in the toggling signal.
摘要:
A method for activating an optical article includes providing an optical article, wherein at least one mark is disposed on the optical article, wherein the mark comprises an optical-state change material in an initial state, the initial state preventing the optical article from being read by a player; deriving an unlock code by cryptographic operations on an optical article operatively coupled with a POS equipment and a data input from a medium encrypted with a cryptographic algorithm; deriving a toggling signal from an unlock code, and applying the toggling signal to the at least one mark resulting in changing the optical-state change material to a final state, the final state allowing the optical article to be read by the player; wherein the toggling signal comprises a set of values corresponding to the respective states of each of a plurality of marks on the surface of the optical article, and wherein applying the toggling signal results in setting each of the marks to either one of an initial state or a final state, corresponding to the value for the mark in the toggling signal.
摘要:
A system and method are provided for controlling the latency of messages to enable a network of devices to detect and respond to potential malware. The system and method receiving a message at a device and determining whether the message represents potential malware and requires a delay to allow time to detect and respond to potential malware. The amount of the delay associated with the message is determined and the message is processed based on the delay amount.
摘要:
A method for providing secure communication in an electrical power distribution network includes detecting an enhanced threat level in the electrical power distribution network. A plurality of configuration command messages including information related to a common configuration command are received. The common configuration commands are certified if the plurality of configuration command messages have originated from a threshold number of command sites. The method further includes executing the certified configuration command.
摘要:
A system and method for monitoring a network and detecting network vulnerabilities is provided. A communication associated with one or more programs is issued to one or more devices in a network and the response from the devices is detected and analyzed. Based on the analysis, a device response is identified as a threat response if it represents at least an alert, an unexpected response or a response time-out indicating that the device did not response to the communication. The vulnerability of the network is determined based on the threat responses of the devices.
摘要:
System, device and methods that provide proximate environmental and security intelligence to a guard making a security tour or round in an installation, as well as that provide for certifying that the guard has visited designated and known checkpoints on or about the times at which the guard is expected at those checkpoints.
摘要:
A system and method are provided for controlling the latency of messages to enable a network of devices to detect and respond to potential malware. The system and method receiving a message at a device and determining whether the message represents potential malware and requires a delay to allow time to detect and respond to potential malware. The amount of the delay associated with the message is determined and the message is processed based on the delay amount.
摘要:
A system and method for monitoring a network and detecting network vulnerabilities is provided. A communication associated with one or more programs is issued to one or more devices in a network and the response from the devices is detected and analyzed. Based on the analysis, a device response is identified as a threat response if it represents at least an alert, an unexpected response or a response time-out indicating that the device did not response to the communication. The vulnerability of the network is determined based on the threat responses of the devices.
摘要:
System, device and methods that provide proximate environmental and security intelligence to a guard making a security tour or round in an installation, as well as that provide for certifying that the guard has visited designated and known checkpoints on or about the times at which the guard is expected at those checkpoints.
摘要:
A method for providing secure communication in an electrical power distribution network includes detecting an enhanced threat level in the electrical power distribution network. A threshold number of different configuration command shadows are received and processed to generate a configuration command data. A verified configuration command data is generated by comparing the configuration command data with a stored configuration commands and a verified configuration command related to the verified configuration command data is executed.