摘要:
Methods (3500-3695) and apparatus (10, 20) for controlling physical (30, 40) and virtual (12) access for accelerated recognition and processing of privileges, benefits, value transfers, crowd control, community membership and status, in particular for institutions, arenas and other large venues.
摘要:
Methods (3500-3695) and apparatus (10, 20) for controlling physical (30, 40) and virtual (12) access for accelerated recognition and processing of privileges, benefits, value transfers, crowd control, community membership and status, in particular for institutions, arenas and other large venues.
摘要:
Systems and methods for off line/online access controlled environments to implement temporal applications in wireless devices via near field communications in closed group venues; e.g., concert halls, race horse betting, and university scheduling, are disclosed.
摘要:
Methods and apparatus for controlling venue buy-back and resale of access privileges to controlled group events limiting third party trading of subscription.
摘要:
Systems and methods for off line/online access controlled environments to implement temporal applications in wireless devices via near field communications in closed group venues; e.g., concert halls, race horse betting, and university scheduling, are disclosed.
摘要:
Methods and apparatus for controlling venue buy-back and resale of access privileges to controlled group events limiting third party trading of subscription.
摘要:
An arrangement, system, and methods for creating and distributing authenticated personal information for users of network services and participants in social surveys, and in chat rooms and other forums. A trusted organization verifies that personal information presented by a user is correct, and authenticates the information in an encapsulated form as “certified profiles” within a smart card or other secure portable hardware device issued to the user Certified profiles are authenticated by digital signatures of the trusted organization and the profile users. Personal information in certified profiles can be in raw and/or in statistically-processed and abstracted form, and can be tailored by the user for specific needs to include whatever personal information is required, and to exclude all other personal information. By the use of unique aliases, it is possible for users to anonymously access restricted network sites and participate in surveys, while still satisfying recipients that supplied personal information is accurate, and for surveys that the user has not responded to the same survey more than once. Users enroll for certified profiles via trusted enrollment vendors who market the service to the public and also make hardware and software available to users for managing, maintaining, and distributing the certified profiles.
摘要:
A system for facilitating a sequence of events and comprising a data bank loader operative to set up for each individual event by loading into an event attendee data bank, IDs and pre-paid balance values, for users expected to attend said individual event, a multiplicity of portable receptacles issued to known users and storing a user ID and a pre-paid balance value for a corresponding user, e-cash filling stations incrementing pre-paid balance values of users in an on-site data bank, and mobile service provider workstations reading portable receptacles, accessing the on-site data bank according to the user ID of each portable receptacle, entering into a transaction with a user if his pre-paid balance value accessed from the on-site data bank is positive, and decrementing the transaction's value from the user's pre-paid balance value in the on-site data bank.
摘要:
A system for facilitating a sequence of events each comprising a multiplicity of purchases made by known users, the system comprising an on-site data bank recording an ID and a pre-paid balance value for each user expected to attend, a loader operative to set up for each event by loading into the data bank, IDs and pre-paid balance values, for users expected to attend, portable receptacles issued to each user and storing his ID and balance, e-cash filling stations incrementing the balance in the data bank, to reflect pre-payments made thereby, and mobile service provider workstations operative to read portable receptacles, to access the data bank according to the user ID of each portable receptacle, to enter into a transaction with a user if his balance accessed from the data bank is positive, and to decrement the transaction's value from his balance in the data bank.
摘要:
Systems and methods are disclosed, especially designed for very compact hardware implementations, to generate random number strings with a high level of entropy at maximum speed. For immediate deployment of software implementations, certain permutations have been introduced to maintain the same level of unpredictability which is more amenable to hi-level software programming, with a small time loss on hardware execution; typically when hardware devices communicate with software implementations. Particular attention has been paid to maintain maximum correlation immunity, and to maximize non-linearity of the output sequence. Good stream ciphers are based on random generators which have a large number of secured internal binary variables, which lead to the page synchronized stream ciphering. The method for parsed page synchronization which is presented is especially valuable for Internet applications, where occasionally frame sequences are often mixed. The large number of internal variables with fast diffusion of individual bits wherein the masked message is fed back into the machine variables is potentially ideal for message authentication procedures.