摘要:
Mobile device assisted secure computer network communications embodiments are presented that employ a mobile device (e.g., a mobile phone, personal digital assistant (PDA), and the like) to assist in user authentication. In general, this is accomplished by having a user enter a password into a client computer which is in contact with a server associated with a secure Web site. This password is integrated with a secret value, which is generated in real time by the mobile device. The secret value is bound to both the mobile device's hardware and the secure Web site being accessed, such that it is unique to both. In this way, a different secret value is generated for each secure Web site accessed, and another user cannot impersonate the user and log into a secure Web site unless he or she knows the password and possesses the user's mobile device simultaneously.
摘要:
This invention relates to a highly effective nanoparticle system for stabilizing near-infrared (near-IR) fluorescent dyes such as indocyanine (ICG) in order to enhance the dye's utility for biomedical application. This invention further relates to nanoparticles comprised of biodegradable polymer materials such as poly(dl-lactide-co-glycolide)(PLGA). The invention also relates to methods of preparing the nanoparticle-entrapped dyes, as well as methods for using them in bioimaging, diagnosis, and treatment of disease. The present invention also relates to compositions and kits comprising nanoparticle-entrapped dyes.
摘要:
The present invention relates to an image forming apparatus comprising a movable image bearing member on which an image is formed; a movable intermediate transfer member, being in contact with said image bearing member, to which the image on said image bearing member is transferred; and a controlling means for starting a drive of said image bearing member after a drive of said intermediate transfer member is started.
摘要:
The present invention relates to an image forming apparatus comprising a movable image bearing member on which an image is formed; a movable intermediate transfer member, being in contact with said image bearing member, to which the image on said image bearing member is transferred; and a controlling means for starting a drive of said image bearing member after a drive of said intermediate transfer member is started.
摘要:
In order to suppress uneven densities in an image, an image forming apparatus includes an image bearing member; a first developing unit, including a first developer carrying member, for developing a first latent image formed on the image bearing member; a second developing unit, including a second developer carrying member, for developing a second latent image formed on the image bearing member after the first developing unit has developed the first latent image; and a rotary unit, for holding the first and the second developing units and for moving the first and the second developing unit to positions opposite said image bearing member. Upon the reception of an image forming signal at the image forming apparatus, the first and the second developer carrying members are rotated before the first latent image on the image bearing member is developed.
摘要:
The embodiments of the present disclosure disclose a method and apparatus for reducing the parameter transmission bandwidth. The parameter sender reduces the values of the parameters before sending the parameters to the parameter receiver. This scheme reduces the bandwidth consumed during parameter transmission, thus makes the transmission more efficient. The embodiment of the present disclosure also discloses a method for key exchange. This method reduces the values of the transmission parameters before sending the transmission parameters. This saves the bandwidth compared with the protocol in the prior art. Besides, the embodiment of the present disclosure discloses a system for key exchange. The parameter sender sends the transmission parameters to the bandwidth processing unit. The bandwidth processing unit performs a modulo operation on the received transmission parameters and then sends the processed transmission parameters to the parameter receiver, thus reducing the bandwidth consumed in the transmission of transmission parameters.
摘要:
A “proxy re-signature system” provides various techniques for transforming a delegatee's signature on a message m into a delegator's on the same message m. Various embodiments of non-interactive re-signature generation processes are described. Various embodiments to aggregate part of signatures to reduce the size of re-signed signatures are also described. Various combinations of the proxy re-signature process and the re-signature conversion process result in an overall process that is unidirectional, multi-use, private, and non-interactive. As such, the proxy re-signature system is applicable for use with a wide range of applications.
摘要:
Described is an optimistic fair payment protocol in electronic commerce that provides fair payment while resisting an unconscious double spending attack and other attacks. A buyer receives encrypted e-goods from a merchant, and sends payment to the merchant. If decryption information is not received in exchange for the payment, or the decryption information does not render the e-goods useable, the buyer launches a dispute with a third party dispute resolution service. If the decryption information is received and renders the e-goods useable, the buyer determines whether the e-goods are valid, according to a corresponding description. If not valid, the buyer launches a dispute and provides the e-goods and the description. The third party uses the description to evaluate the validity of the goods to determine whether to refund the payment to the buyer or release it to the merchant.
摘要:
Mobile device assisted secure computer network communications embodiments are presented that employ a mobile device (e.g., a mobile phone, personal digital assistant (PDA), and the like) to assist in user authentication. In general, this is accomplished by having a user enter a password into a client computer which is in contact with a server associated with a secure Web site. This password is integrated with a secret value, which is generated in real time by the mobile device. The secret value is bound to both the mobile device's hardware and the secure Web site being accessed, such that it is unique to both. In this way, a different secret value is generated for each secure Web site accessed, and another user cannot impersonate the user and log into a secure Web site unless he or she knows the password and possesses the user's mobile device simultaneously.
摘要:
An exemplary optimistic protocol for a two-party transaction includes a setup sub-protocol that includes an authorized Diffie-Hellman key agreement, an exchange sub-protocol that includes sending a certificate from a sending party to a receiving party and sending a receipt from the receiving party to the sending party and a dispute sub-protocol that includes a dispute resolution mechanism for resolving disputes between the sending party and the receiving party due to sending of an invalid certificate, due to sending an invalid receipt, or due to abortion of the exchange sub-protocol. Other exemplary methods, systems, etc., are also disclosed.