摘要:
Apparatus and method are disclosed for digital authentication and verification. In one embodiment, authentication involves storing a cryptographic key and a look up table (LUT), generating an access code using the cryptographic key; generating multiple parallel BPSK symbols based upon the access code; converting the BPSK symbols into multiple tones encoded with the access code using the LUT; and outputting the multiple tones encoded with the access code for authentication. In another embodiment, verification involves receiving multiple tones encoded with an access code; generating multiple parallel BPSK symbols from the multiple tones; converting the BPSK symbols into an encoded interleaved bit stream of the access code; de-interleaving the encoded interleaved bit stream; and recovering the access code from the encoded de-interleaved bit stream.
摘要:
A system and method for generating random numbers in a wireless communication network is presented. The noise present in the signal received by a wireless receiver is extracted to form random numbers. Wireless transmitters typically are identified by a synchronization signal. In acquiring the synchronization signal, a wireless receiver generates a plurality of psuedorandom sequences, despreads an incoming signal, integrates the resulting signal, and performs an energy computation to calculate an energy measure. One or more energy measures are collected in a pool of bits, and the bits are hashed to extract random numbers.
摘要:
A small form-factor security device is provided that may be inserted in series with a telephone line to encrypt dual tone multi-frequency (DTMF) tones from a telephone to prevent unauthorized disclosure of sensitive information. A receiving device decrypts the encrypted DTMF tones to receive the original information sent by the telephone. The security device acts as a second factor in a two-factor authentication scheme with a tele-services security server that authenticates the security device.
摘要:
Apparatus and method for authentication is disclosed. In one embodiment, an apparatus for performing authentication using removeably coupled external authentication module comprises a module configured to receive the authentication module. The authentication module is configured to generate authentication information. The module may comprises an input unit configured to receive and couple the authentication module, and an output unit configured to receive the authentication information from the authentication module and to transmit the authentication information.
摘要:
A scheme is provided for determining the geographical location of an active IP device coupled to an IP network. A network path to the user device is obtained to identify a last hop device having a known first geographical location. A last leg distance between the last hop device and the user device is calculated. The last leg bandwidth, propagation time, and propagation speed are also characterized to more accurately determine the last leg distance. By combining the known first geographical location and the distance of the last hop device and user device, a geographical location for the user device is obtained. To improve the accuracy of the geographical location of the user device, multiple last hop devices with known geographical locations are employed to obtain multiple geographical areas for the user device. The intersection or overlap of these geographical areas indicates a refined geographical location of the user device.
摘要:
Software for use on a client device that is configured for communications via a communications network instantiates a communications function that effects an advertisement download communication link between the client device and an advertisement distribution server system via the communications network, at selected advertisement download times, an advertisement download function that downloads advertisements identified in a playlist(s) generated by at least one playlist server, via the advertisement download communication link, at the selected advertisement download times, an advertisement storage function for storing the downloaded advertisements on a storage medium associated with the client device, and an advertisement display function that effects display of at least selected ones of the stored advertisements.
摘要:
A scheme is provided for determining the geographical location of an active IP device coupled to an IP network. A network path to the user device is obtained to identify a last hop device having a known first geographical location. A last leg distance between the last hop device and the user device is calculated. The last leg bandwidth, propagation time, and propagation speed are also characterized to more accurately determine the last leg distance. By combining the known first geographical location and the distance of the last hop device and user device, a geographical location for the user device is obtained. To improve the accuracy of the geographical location of the user device, multiple last hop devices with known geographical locations are employed to obtain multiple geographical areas for the user device. The intersection or overlap of these geographical areas indicates a refined geographical location of the user device.
摘要:
Embodiments describe a method and/or system whereby a secret key in a cryptographic system may be replaced without revealing the secret key. One embodiment comprises creating a first private key and corresponding first public key. A second private key associated with the first private key and a second public key corresponding to the second private key are also created. The second private key is output once such that it can be re-created and the second public key is output when outputting the first public key. The first private key is used for authentication. The method further comprises re-creating the second private key; and using the second private key for authentication. Another embodiment comprises creating a private key and corresponding public key with associated system parameter; outputting the system parameter when outputting the public key; and using the private key for authentication. The method may further comprise creating a new private key using the previous key and the system parameter.
摘要:
A small form-factor security device is provided that may be inserted in series with a telephone line to encrypt dual tone multi-frequency (DTMF) tones from a telephone to prevent unauthorized disclosure of sensitive information. A receiving device decrypts the encrypted DTMF tones to receive the original information sent by the telephone. The security device acts as a second factor in a two-factor authentication scheme with a tele-services security server that authenticates the security device.
摘要:
Software for use on a client device that is configured for communications via a communications network instantiates a communications function that effects an advertisement download communication link between the client device and an advertisement distribution server system via the communications network, at selected advertisement download times, an advertisement download function that downloads advertisements identified in a playlist(s) generated by at least one playlist server, via the advertisement download communication link, at the selected advertisement download times, an advertisement storage function for storing the downloaded advertisements on a storage medium associated with the client device, and an advertisement display function that effects display of at least selected ones of the stored advertisements.