摘要:
A method and apparatus for executing electronic transactions using cryptographically-enabled accounts stores cryptographically-enabled account information and instructions, receives a cryptographically-encoded permission certificate, and processes the received permission certificate to execute the transactions.
摘要:
An off-line remote lottery system which enables players to purchase instant-type lottery game outcomes from a randomized prize datastream in a central computer and view the outcomes on remotely disposed gaming computers which do not require an on-line connection to the central computer during play, the central computer storing identification data for a plurality of gaming computers and being configured for randomly assigning outcomes from the randomized prize datastream to the gaming computers in response to purchase requests by players for a requested number of outcomes in each purchase request, each gaming computer including a game program in memory for execution on the gaming computer to generate games which yield the purchased outcomes or aggregate net payoff of the purchased outcomes, and a redemption function for generating a redemption request to cash-out winnings, the system enabling outcome purchase and redemption of winnings to be effectuated directly with the central computer over a telephone network, or via a plurality of agent terminals located at various lottery retailers.
摘要:
In many computer applications, sensitive information must be kept on an untrusted machine. Such information must be protected against attackers, as well as against partially trusted entities to be given partial, but not total, access to the stored information. This invention provides a method, apparatus and computer-readable data structure for inhibiting an attacker from accessing or corrupting information stored by an untrusted machine. More specifically, in a log file generated during a process in which the untrusted machine is in limited communication with a trusted machine, entries generated prior to the attack remain secure (they cannot be modified without detection), even though subsequent entries can not be trusted. One embodiment of the invention also allows a partially trusted verifier to read and verify entries in the log file, but not to change them without detection. In another embodiment of the invention, operating with or without the trusted machine, the untrusted machine's log file can also incorporate log files of other processes.
摘要:
A computer device and method for encoding a message corresponding to an outcome of a computer game, and a computer device and method for decoding the message to detect a fraudulent outcome. The computer device used to generate the encoded message includes (1) a memory device containing encoding control code and (2) a processor configured to process the encoding control code in conjunction with a computer game outcome to generate an encoded message containing the computer game outcome and to transmit the encoded message to a human-readable output device, such as a display device. The computer device includes various tamper resistant or tamper evidence features. A secure module containing the processor and memory is used to plug into an existing personal computer or dedicated game device. The device also includes a system for metering use of a computer game. The method for encoding the message includes the steps of executing a computer game program to generate a computer game outcome, encoding the computer game outcome to generate an encoded message, and providing the encoded message to a user, who may then transmit the encoded message to a device configured for decoding the encoded message to reveal the computer game outcome. A second central or host computer device is used to decode the encoded message. The second computer device has (a) a memory device containing decoding control code and an encoded message corresponding to a computer game outcome and (b) a processor configured to process the code to decode the encoded message to reveal the computer game outcome.
摘要:
A method for digitally signing a message by a tamper-resistant device to generate a digital signature. The method includes the step of hashing the message to form message bits; and encrypting with a private key the message bits, redundancy bits for the security of the signature, and auditing bits to form the digital signature for the message. The auditing bits provide an audit trail for the message. The auditing bits include one or more of the following categories: signature-packet version bits to identify the version of the device generating the signature; device ID bits to identify the token generating the digital signature; key ID bits to identify the private key; a packet-sequence number, which increments every time the device generates a signature to indicate the sequence of signatures generated; bits generated by hashing the prior signature to provide an auditing trail of signatures generated and a time-stamp to indicate the time when the signature is generated. The auditing bits may further include a random number.
摘要:
A system for establishing anonymous communications includes a plurality of party terminals, a plurality of requester terminals, and a central controller. The system receives and stores party data about respective parties. Upon receiving criteria for parties of interest from a requestor terminal and authorization from respective parties, the central controller releases to the requester party associated with the parties. The system also establishes communications channels between parties and the requester, while maintaining their anonymity.
摘要:
A computer-implemented method and apparatus electronically represent and quantify the security of a system as a logical tree structure including leaf nodes representing attacks against the system and intermediate nodes representing various logical combinations of attacks necessary to mount a successful overall attack. An indication of the overall security of the system is quantified in a value of a root node of the tree. The values of the various nodes can be Boolean or continuous, representing simple binary security attributes such as feasible/infeasible or more complicated attributes such as cost, time or probability. The nodes' attributes and values can also represent defenses as well as attacks. The attack trees can be used to calculate the cost, time or probability of an attack to list the security assumptions of a system, to compare competing systems, to evaluate system modifications, to perform security subsystem analysis, to allocate a security budget, and for many other uses.
摘要:
According to some embodiments, a method, apparatus and computer readable medium are provided for facilitating play of a game utilizing an encoded player number and a decoding key for decoding the encoded player number.
摘要:
A conditional purchase offer (CPO) management system is disclosed for receiving CPOs from one or more customers, such as airline passengers, and for evaluating the received CPOs against a number of CPO rules defined by a plurality of sellers, such as airlines, to determine whether any seller is willing to accept a given CPO. A CPO rule is a set of restrictions defined by a given seller, such as an airline, to define a combination of restrictions for which the seller is willing to accept a predefined price. The CPO rules may be securely stored by one or more servers. The CPO management system permits a seller to correct for forecasting errors, if necessary, or other competitive forces which have produced excess capacity, by providing inventory for sale to CPO customers.
摘要:
The present invention is a method and apparatus for effectuating bilateral buyer-driven commerce. The present invention allows prospective buyers of goods and services to communicate a binding purchase offer globally to potential sellers, for sellers conveniently to search for relevant buyer purchase offers, and for sellers potentially to bind a buyer to a contract based on the buyer's purchase offer. In a preferred embodiment, the apparatus of the present invention includes a controller which receives binding purchase offers from prospective buyers. The controller makes purchase offers available globally to potential sellers. Potential sellers then have the option to accept a purchase offer and thus bind the corresponding buyer to a contract. The method and apparatus of the present invention have applications on the Internet as well as conventional communications systems such as voice telephony.