摘要:
Methods and systems that prevent completion of postdated financial transactions until the specified future date is provided. A portion of the information necessary to complete a financial transaction is encrypted utilizing an identity-based encryption (IBE) scheme. The encryption key used to encrypt the information is associated with the date on which the transaction is authorized to be completed. The encrypted information is provided to the payee. The issuing bank provides a daily decryption key that allows decryption of information encrypted using the key associated with the corresponding date. Thus, only when the maturity date of the transaction has arrived will the payee or depositing bank be able to obtain the decryption key that will decrypt the encrypted information necessary to complete the transaction. Since the encrypted information can not be decrypted until the date associated with the encryption key, the financial transaction can not be completed until such date.
摘要:
A system and method are described for establishing and managing a vendor inventory of emergency business supplies for a business. The vendor is compensated for costs of maintaining the inventory. The business supplies are released periodically, for discount sale, after they have been in the vendor inventory for a period of time expiring when a release condition occurs. The vendor inventory is then restocked, and the vendor is compensated at least partially for the discount provided in the discount sale.
摘要:
Methods, systems, and computer programs for managing mobile device applications are described. In some aspects, a mobile device application is prevented from accessing resources of a wireless network. For example, a wireless network operator system can determine that one or more mobile device applications are disapproved for use in the wireless network. In some implementations, the wireless network operator denies the disapproved mobile device applications access to the wireless network resources. In some implementations, mobile devices disable access to the wireless network by the disapproved mobile device applications.
摘要:
During generation of an implicit certificate for a requestor, a certificate authority incorporates information in the public-key reconstruction data, where the public-key reconstruction data is to be used to compute the public key of the requestor. The information may be related to one or more of the requestor, the certificate authority, and the implicit certificate. The certificate authority reversibly encodes the public-key reconstruction data in the implicit certificate and sends it to the requestor. After receiving the implicit certificate from the certificate authority, the requestor can extract the incorporated information from the public-key reconstruction data. The implicit certificate can be made available to a recipient, and the recipient can also extract the incorporated information.
摘要:
A method of processing a check prior to submitting it for deposit in which the depositor's intent at the time of submitting the check is linked with an image of the check. The method includes receiving from the depositor intended amount information for the check, generating a first image of a front of the check, and generating an image of the intended amount. The method further includes generating a second image of the front of the check using the first image of the front of the check, wherein the second image of the front of the check includes the image of the intended amount and wherein the first image of the front of the check may be obtained from the second image of the front of the check. Finally, the method includes submitting at least the second image of the front of the check to a depository bank.
摘要:
A method for detecting whether perforations are present on the edge of an image of a form, such as a check, includes obtaining a bitmap of the image, identifying a selected portion of the bitmap that corresponds to at least the edge and that includes a matrix of a plurality of rows and columns of brightness values, and selecting a particular one of the rows of brightness values. The method further includes performing a Fourier transform of the brightness values included in the particular selected row to generate a Fourier transform output, and determining whether a series of perforations is present based on the Fourier transform output. The method may also include steps wherein the brightness values are low pass filtered and wherein the values in the selected row are high pass filtered prior to the step of performing a Fourier transform
摘要:
A method and apparatus for embedding information in an image during relative movement between a print medium and an ink jet print head is provided. A plurality of first lines are printed and a plurality of second lines are printed. Each of the first lines includes a plurality of first dots and a plurality of second dots offset from the first dots by a first amount, and each of the second lines includes a plurality of third dots and a plurality of fourth dots offset from the third dots by a second amount different than the first amount. The information is encoded in the image using an encoding scheme in which the first lines represent a first value in the encoding scheme and the second lines represent a second value in the encoding scheme.
摘要:
A method and system for generating cryptographic keys and similar secret cryptographic inputs that are hard to guess. A seed is input from an entropy source, and an initial composite state is generated as a function of the seed, the initial state comprising a plurality of components. The components include at least an initial state component and a state-update component. When a request to generate a cryptographic key is received all components of a current state, where the current state is initially the initial state, are mixed to generate an output string and a next state and the current state is set to the next state. The requested cryptographic key is generated from the string; and output. These steps can be repeated to generate successive output strings with assurance of forward and backward secrecy.
摘要:
A system for facilitating a transaction between a first party and a second party is controlled by a trusted third party system and is programmed to carry out the method by receiving the first party's instructions for fulfilling at least a part of the first party's obligations in said transaction. The system communicates with the second party and provides the second party with perceptible assurance that the second party is in communication with a trusted third party system through the system. The system transmits information to the second party to provide assurance that the first party's instructions have been or will be fulfilled. Thus trust in the third party is transferred to the first party and the second party can trust that the first party's obligations have been or will be fulfilled.
摘要:
Methods, systems, and computer programs for managing mobile device applications are described. In some aspects, a mobile device application is prevented from accessing resources of a wireless network. For example, a wireless network operator system can determine that one or more mobile device applications are disapproved for use in the wireless network. In some implementations, the wireless network operator denies the disapproved mobile device applications access to the wireless network resources. In some implementations, mobile devices disable access to the wireless network by the disapproved mobile device applications.