摘要:
The invention provides a system and method for content protection. A system in accordance with an embodiment includes a media center connectable to a mobile master memory unit associated with an identifier, the media center including: a protection key; storage means for storing files identified by respective file identifiers; a processing unit comprising file encryption for encrypting each file before storage, using a title key computed from the protection key of the media center and for encrypting the title key using the protection key of the master storage device and the identifier of the master memory unit, the master storage device being further provided to write the encrypted title key in association with the corresponding file identifier to the master memory unit.
摘要:
A method, system and computer-usable medium for providing secure access to an application over an unsecure network. A transparent identification member can be physically placed by a user against a login interface, the transparent identification member possessing a filter for filtering and displaying a pattern unique to the login interface. Thereafter, the user can be automatically permitted to authenticate an unsecure network and securely access an application over the unsecure network, in response to placing the transparent identification member against the login interface and providing a user input at a physical location on the login interface corresponding to the pattern unique to the login interface, thereby providing a secure authentication for the user to perform secure transactions over the unsecure network and preventing phishing by others with respect to the user and the unsecure network.
摘要:
A method for communicating with a receiving station and a system for implementing the method. The system includes the receiving station. A geographical area is divided into at least two geographical cells. Each cell is a unique geographical region within the geographical area. Each cell is associated with one and only one unique joining address of at least two joining addresses. A totality of joining addresses in a joining message consisting of the one and only one unique joining address to which each cell is associated. The joining message is an IP unicast message including the at least two joining addresses.
摘要:
The present application provides an apparatus and method for verifying a user, via captured biometric characteristics of the user, who is interacting online. The captured biometrics are guaranteed to be captured in real-time, and avoids the possibility of providing biometrics that were previously captured, by sending to the user a time-sensitive challenge and requiring the user to provide the requested biometric information within a predetermined time period. Therefore, the present invention is best positioned for environments where trusted identification of a user is needed online to facilitate secure transactions.
摘要:
A method and RFID tag for locating RFID tags. A passive RFID tag A receives a polling command transmitted from a RFID reader and addressed to another passive RFID tag B. The RFID tag A determines that the polling command is not addressed to the RFID tag A and consequent1y, at time t1, switches the RFID tag A to a catching mode for catching echos from other tags. The RFID tag A receives at time t3>t1 an echo of a message sent by the RFID tag B to the RFID reader. The RFID tag A determines a distance (D.t2t) between the RFID tag A and the RFID tag B based on t3 minus t1. The distance D.t2t does not exceed a specified radius limit and the identification of the RFID tag B and the distance D.t2t are stored in a database within the RFID tag A.
摘要:
A method for authenticating an end user. The method begins by generating a login field in response to receiving an authentication request from an end user. The login field comprises a plurality of colored nodes containing a first subset of nodes matching both color and location to a second subset of nodes residing in a transparent credit card being controlled by the end user. Next the method determines the authenticity status of the end user by comparing data received from the end user with the first subset of nodes. The end user having generated the data by overlaying the transparent credit card on top of the login field and selecting at least one colored node. Each node being selected according to a function utilizing both static and dynamic variables. Finally, the method sends the determined authenticity status to the end user via an output device.
摘要:
A location localization method and system. The method includes transmitting by an RFID tag reader, a request for locating a passive RFID tag in a facility. The RFID tag reader receives from active RFID tags, a first date/time associated with first data. The RFID tag reader transmits to the active RFID tags, a request for retrieving the first data. The first data comprises distances between each active RFID tag and the passive RFID tag. The RFID tag reader receives the first data. The RFID tag reader receives a map of the facility and locations on the map for the active RFID tags. The RFID tag reader determines a location within the facility for the passive RFID tag based on the first data, the map, and the locations on the map. The RFID tag reader transmits the first location to a user.
摘要:
The present invention discloses a method, system and computer program embarked in a vehicle, for estimating traffic conditions based on positioning information exchanged with other vehicles using wireless communication. A method in accordance with an embodiment of the invention includes: receiving positioning information repeatedly broadcast by at least one vehicle, the positioning information for each vehicle including: information related to a current location of the vehicle; and information identifying the vehicle; calculating based on at least two successive locations of a same identified vehicle, a current speed and a current direction for the vehicle; and estimating current traffic conditions based on current location, speed and direction of identified vehicles.
摘要:
RFID method and system are provided. A reader transmits a reader signal to beacon tags and a listening tag. The beacon tags transmit beacon signals including a beacon identification and a beacon distance to the reader. The listening tag receives the beacon signals. Neighbor distances are calculated for the beacon tags based on when the beacon signals are received, when the listening tag receives the reader signal, and a constant processing time. The neighbor distances are the individual distances from the listening tag to the beacon tags. A list is stored including the beacon identification for the beacon tags, the beacon distance, and the neighbor distances. The listening tag transmits the list and a listening tag identification to the reader. A geographical position of the listening tag is calculated based on the beacon distance, beacon coordinates, and a listening tag distance which is from the reader to the listening tag.
摘要:
A method and a system. A Medium Access Control (MAC) frame includes an embedded Internet Protocol (IP) frame and a MAC address. The IP frame includes content of a second multimedia program and a second multicast address of the second multimedia program, the MAC address having been resolved from the second multicast address. The second multicast address is determined to be linked to a first multicast address of a first multimedia program of a television channel being played at a user host. The IP frame is forwarded from the MAC frame to an IP layer where the second multicast address is ascertained to be a multicast sub group address of the first multimedia program and is replaced in the IP frame with the first multicast address, after which the IP frame is transmitted to the user host to replace or be inserted into the first multimedia program being played.