摘要:
A transponder (1) comprises at least one memory (MEM1, MEM2) for storing encrypted information (E_k(EPC, PI)) that has been encrypted by use of a key (k) and for storing the key (k) associated with the encrypted information (E_k(EPC, PI)). The transponder (1) is adapted to send the key (k) slower response than the encrypted information (E_k(EPC, PI)) in response to queries of a reading device (2), which is preferably done by delaying the transmission of the key (k) or by limiting the response rate at which the key (k) is transmitted. In particular the invention is related to RFID systems.
摘要:
A decryption device (2) is arranged for visually decrypting an encrypted image displayed on a display device (1) emitting polarized light. The decryption device (2) comprises a polarizing element (21), a liquid crystal display (23), and a further polarizing element (22), arranged such that the polarized light received from the display device (1) and incident on the polarizing element (21) may pass through the liquid crystal display (23) and the further polarizing element (22). The polarizing element (21) comprises a switchable polarizer capable of switching between a first, polarizing state and a second, nonpolarizing state. This allows the decryption device to be used as a stand-alone device which can also be used for other applications. The display device (1) is preferably also provided with a switchable polarizer (12).
摘要:
A system for authenticating a physical object includes an enrolment device, an authentication device, and a storage for storing authentication data. The enrolment device includes an input for receiving a property set Y of the object measured using a measurement procedure. A processor is used for creating a property set I from the measured property set Y that meet a predetermined robustness criterion. It then creating a property set A from the property set I that includes less information on the actual properties than property set Y, and finally generates a control value Vin dependence on properties of the property set A. An output is used for supplying the control value to the storage as part of the authentication data. The enrolment device operates in an analogous way.
摘要:
An authentication system 600 includes optical authentication devices 620, 630, 640. Each optical authentication device includes an optical layer 622, 632, 642. The optical layer includes a representation of a first image visually encrypted under control of an encryption key. The encrypted first image uniquely identifies the respective authentication device. An inspection device 610 decrypts the optical layer of the optical authentication device under control of the encryption key and visualizes the first image to enable verification of the unique identification of the authentication device.
摘要:
Zero knowledge protocols, such as the Fiat-Shamir and Guillou-Quisquater protocols are implemented using only Montgomery multiplications on Montgomery representations of numbers to effect a more efficient implementation of the protocols, particularly in devices that have restricted computational resource such as smart cards and other portable electronical devices.
摘要:
A method of and a device (501) for reconstructing a graphical message (520) using visual cryptography. Cells (303, 304) in a first liquid crystal display (701) are activated if a bit in a message sequence represents ‘1’, and not activated if said bit represents ‘0’. Cells (303, 304) in a second liquid crystal display (511) are activated if a bit in a key sequence represents ‘0’, and not activated if said bit represents ‘1’. The first and second displays (701, 511) are then superimposed so as to visually reconstruct the graphical message (520). Preferably a portion of a polarization filter (305) in an area of the first liquid crystal display (701), and a corresponding portion of a polarization filter (302) in an area of the second liquid crystal display (511) have been omitted to allow superimposition of the first and second liquid crystal displays (701, 511) at said areas.
摘要:
A method of verifying the authenticity of an image (1) rendered on a display screen (10) involves using a graphical representation of an authentication code (2) associated with the image. The graphical representation of the authentication code is also rendered on the display screen, while optional guide marks (3) may also be displayed. Both the image (1) and the associated authentication code (2) are read using a scanner (20), preferably a handheld linear scanner. The scanner calculates an authentication code based upon the image and compares the calculated authentication code with the authentication code read from the display.
摘要:
A physical random function (PUF) is a function that is easy to evaluate but hard to characterize. Controlled physical random functions (CPUFs) are PUFs that can only be accessed via a security program controlled by a security algorithm that is physically bound to the PUF in an inseparable way. CPUFs enable certified execution, where a certificate is produced that proves that a specific computation was carried out on a specific processor. The invention provides an additional layer for generating a proof of execution which any third party can verify. This proof of execution is also useful to provide secure memory and secure interruptible program execution.
摘要:
The invention relates to a method of processing data, the method comprising steps of enabling to (210) encrypt first data for a first source, and encrypt second data for a second source, (220) provide the encrypted first and second data to a server that is precluded from decrypting the encrypted first and second data, and from revealing identities of the first and second sources to each other, (230) perform a computation on the encrypted first and second data to obtain a similarity value between the first and second data so that the first and second data is anonymous to the second and first sources respectively, the similarity value. providing an indication of a similarity between the first and second data. The method may further comprise a step (240) of using the similarity value to obtain a recommendation of a content item for the first or second source. The first or second data may comprises a user profile or user ratings of content items. One of the applications of the method may be in collaborative filtering systems.
摘要:
The invention relates to a biometrical identification device for identifying an individual finger (1). An intra-skin image (ISI) is acquired. Said image (ISI), which is located inside the finger at a distance (D) from an inside surface (2) of the finger, comprises sweat pores (P1, P2, P3). Said sweat pores are located as isolated spots in the intra-skin image (ISI). The pore locations (CP1-CPN) are further matched with reference pore locations (RP1-RPM) of a reference intra-skin image (RI) to produce a pore matching score (PMS). The pore matching score (PMS) is compared with a predetermined pore threshold for deciding whether the pore-based identification of the finger (1) is valid or not.