Abstract:
A mechanism for storing authenticity information about a written or printed document. This authenticity information may be stored in a publicly-accessible database. When a document patterned with electronic ink is to be verified, the verifier examines the electronic ink under magnification. The verifier locates start and end pattern markers within the ink, and extracts the pattern from the ink. Once the pattern is obtained, the verifier performs a lookup of the pattern in the database. If the pattern is found, the verifier obtains information associated with the pattern from the database. The verifier may then use this information to verify the authenticity of the document.
Abstract:
A mechanism for ensuring the authenticity of written and printed documents. With the mechanism of the present invention, electronic ink is deposited onto a document, wherein the electronic ink deposited comprises at least one mark visible to a user. Current is applied to the electronic ink while the electronic ink is wet. The current is applied to the electronic ink in order to imprint a pattern in the ink. The electronic ink deposited on the document is then allowed to dry. The pattern in the electronic ink may then be examined to verify the authenticity of the document.
Abstract:
A system and method for remote code integrity in distributed systems is presented. A server sends encrypted remote code to a client. The client receives the encrypted remote code and a key agent from the server. The key agent includes a key to decrypt the remote code. The client uses the key to decrypt the encrypted remote code and stores the decrypted remote code in internal memory. The key agent uses a second key included in the key agent to re-encrypt the decrypted remote code and stores the re-encrypted remote code in non-volatile memory. The client executes the decrypted remote code located in internal memory. Once the client is finished executing the decrypted remote code, the client overwrites the keys and deletes the old encrypted code.