摘要:
There is provided a method and system for producing an intelligent document comprising a program which, when a precondition has been met, can be executed by a program execution environment, the intelligent document containing contents that can be displayed by a display program. An exemplary method comprises incorporating a program module into the intelligent document, the program module being configured to create displayable information indicating a result of a checking step in order to check whether the precondition has been met within the intelligent document. The exemplary method also comprises inserting displayable information indicating a negative result of the checking step into the intelligent document. The exemplary method additionally comprises transforming, with the program module, the information indicating the negative result of the checking step into displayable information indicating a positive result of the checking step.
摘要:
An authentication method authenticates between subscribers of a communications system using an asymmetric elliptic curve encryption algorithm. The method involves providing a first and at least one second subscriber having a first or second secret key known only to the respective subscriber and a public key; authenticating an inquiry transmitted by the first subscriber with respect to the validity of the first certificate contained therein and associated with the first subscriber; calculating the response of the second subscriber associated with the inquiry; randomized encryption of the calculated response and a second certificate associated with the second subscriber using the public key; decryption and authentication of the response transmitted by the second subscriber with respect to the validity of the second certificate contained therein.
摘要:
In side-channel attack-resistant encoding methods, a return value (r) is determined as the modular inverse of an input value (a), by a module (M). A resistance to side-channel attack can be achieved with minimal restrictions on implementation on determination of the modular inverse with minimal technical complexity. To this end, in a first sub-step, a first product (d) of the input value (a) and a random number is generated (c), in a second sub-step, the modular inverse (e) of the first product (d) is determined by the module (M), in a third sub-step, a second product (b) of the random number (c) is determined by the modular inverse (e) and in a fourth sub-step the return value (r) is set to the same as the second product (b).
摘要:
The invention relates to a method and a device for the generation of checkable forgery-proof documents with an externally supplied cryptographic module, whereby the checking of authenticity of the document is carried out without using key information belonging to the cryptographic module. According to the invention, the method and the device are characterised in that the cryptographic module is supplied with two types of data, even on supply from a communication partner which is cryptographically not trustworthy, which either remain in the cryptographic module or are attached to the document. The information remaining in the cryptographic module is used to secure the document information by means of a check value and the information transferred into the document serves to verify the securing of the document by the cryptographic module during a check of the authenticity of the document at a checkpoint.
摘要:
The invention relates to a method and a device for the generation of checkable forgery-proof documents with an externally supplied cryptographic module, whereby the checking authenticity of the document is carried out without using key information belonging to the cryptographic module. According to the invention, the method and the device are characterized in that the cryptographic module is supplied with two types of data, even on supply from a communication partner which is cryptographically not trustworthy, which either remain in the cryptographic module or are attached to the document. The information remaining in the cryptographic module is used to secure the document information by means of a check value and the information transferred into the document serves to verify the securing of the document by the cryptographic module during a check of the authenticity of the document at a checkpoint.
摘要:
The invention relates to a method for franking postal items. The franking note is prepared on a central system and is then transferred to a client system to be printed out. The franking note is transferred from the central system to the client system in two steps. In a first step, an invalid pre-print of the franking note is transferred and in the second step, the valid franking note is transferred to the central franking system by feeding it back to the central system, said feedback being controlled by the printing process. The invention also relates to a suitable device for carrying out the method.
摘要:
A method for preparing a mail, wherein task data for mail which is to be stamped and/or sent is produced in a task component. Electronically ordered data is received and the ordered data in address information of a receiver is separated and a goods identification code identifying the goods is also separated such that the goods identification code is transmitted to a warehouse management control unit. The disclosure also relates to the provision of address information in a form which can be lined to the goods, and to a suitable device for carrying out said method.
摘要:
The invention relates to a method for the measurement and/or determination of sensory disorders, in particular, related to neuropathies, whereby an air current (10) is directed at a measuring point (4) on the body of a living being, in particular a human, by means of a device (2), in order to influence the thermal sensitivity of the being at said measuring point (4), during a measuring process. The thermal sensitivity and/or a change in thermal sensitivity is correlated with a perceived temperature and, in order to determine the perceived temperature before and/or during the measurement process, at least one parameter from the environment and/or the being is recorded and analysed. The invention further relates to a device for the measurement and/or determination of sensory disorders, in particular, related to neuropathies.
摘要:
A method for authentication and identification uses different keys for the prover and the verifier, but on the other hand dispenses with the utilization of long number modulo arithmetic by the use of simple basic components such as, for example, arithmetic operations in finite bodies GF(2n). A private key is stored in the prover, so that the latter can receive, in encrypted form, data elements generated as random elements and can itself utilize them again as key for an authentication method of a data set to be transmitted. The verifier receives the authenticator thus formed and checks it. If the data set is generated by the verifier and transmitted to the prover, then this method can serve for the identification of the prover. The method is particularly advantageous in the area of smart cards, since there the required space in the hardware implementation can be considerably reduced.
摘要:
A method and apparatus for performing a multi-stage wavelet transform on a block of image data, using a smaller memory than would be required to implement an equivalent conventional multi-stage wavelet transform on the same block, and a method and apparatus for performing compression on a block of image data by performing a multi-stage wavelet transform on the block, quantizing coefficients resulting from the multi-stage wavelet transform, and performing entropy encoding on the quantized coefficients. Typically, the input image data is generated by a document scanner, and is compressed in a manner allowing fast decompression (by employing simple entropy encoding) and imposing low memory requirements. The data is compressed by operating a first circuit to perform at least two consecutive horizontal wavelet transform stages on a block of the image data, quantizing and entropy encoding at least a first block of the resulting coefficients indicative of relatively high spatial frequency information (“high frequency coefficients”) and writing to a memory a second block of the resulting coefficients indicative of relatively low spatial frequency information (“low frequency coefficients”), reading the low frequency coefficients from memory and operating a second circuit to perform at least one vertical wavelet transform stage on the low frequency coefficients, and quantizing and entropy encoding at least some of the resulting coefficients.