摘要:
Systems and methods are disclosed, especially designed for very compact hardware implementations, to generate random number strings with a high level of entropy at maximum speed. For immediate deployment of software implementations, certain permutations have been introduced to maintain the same level of unpredictability which is more amenable to hi-level software programming, with a small time loss on hardware execution; typically when hardware devices communicate with software implementations. Particular attention has been paid to maintain maximum correlation immunity, and to maximize non-linearity of the output sequence. Good stream ciphers are based on random generators which have a large number of secured internal binary variables, which lead to the page synchronized stream ciphering. The method for parsed page synchronization which is presented is especially valuable for Internet applications, where occasionally frame sequences are often mixed. The large number of internal variables with fast diffusion of individual bits wherein the masked message is fed back into the machine variables is potentially ideal for message authentication procedures.
摘要:
Systems and methods are disclosed, especially designed for very compact hardware implementations, to generate random number strings with a high level of entropy at maximum speed. For immediate deployment of software implementations, certain permutations have been introduced to maintain the same level of unpredictability which is more amenable to hi-level software programming, with a small time loss on hardware execution; typically when hardware devices communicate with software implementations. Particular attention has been paid to maintain maximum correlation immunity, and to maximize non-linearity of the output sequence. Good stream ciphers are based on random generators which have a large number of secured internal binary variables, which lead to the page synchronized stream ciphering. The method for parsed page synchronization which is presented is especially valuable for Internet applications, where occasionally frame sequences are often mixed. The large number of internal variables with fast diffusion of individual bits wherein the masked message is fed back into the machine variables is potentially ideal for message authentication procedures.
摘要:
A system for multi-factor security involving multiple secure devices that distribute the secured functions of the system over the different devices, such that the loss or theft of any one of them does not compromise the overall security of the system. Moreover, a configuration of devices is also secure even if one of them has been attacked by malicious software agents, such as “keyboard sniffers”. A novel contactless smart card reader (200) is presented that incorporates a transceiver antenna (220) within a keypad (210) of a device used with contactless smart cards (100). When the card (100) is pressed against the device's keypad (210), the transceiver (220) of the device establishes a session with the smart card (100). A variety of systems are presented, including those using mobile telephones, computer-interfaced card readers, personal digital appliances, and television set-top box remote controllers.
摘要:
Methods and apparatus for controlling venue buy-back and resale of access privileges to controlled group events limiting third party trading of subscription.
摘要:
Methods (3500-3695) and apparatus (10, 20) for controlling physical (30, 40) and virtual (12) access for accelerated recognition and processing of privileges, benefits, value transfers, crowd control, community membership and status, in particular for institutions, arenas and other large venues.
摘要:
A system for facilitating a sequence of events and comprising a data bank loader operative to set up for each individual event by loading into an event attendee data bank, IDs and pre-paid balance values, for users expected to attend said individual event, a multiplicity of portable receptacles issued to known users and storing a user ID and a pre-paid balance value for a corresponding user, e-cash filling stations incrementing pre-paid balance values of users in an on-site data bank, and mobile service provider workstations reading portable receptacles, accessing the on-site data bank according to the user ID of each portable receptacle, entering into a transaction with a user if his pre-paid balance value accessed from the on-site data bank is positive, and decrementing the transaction's value from the user's pre-paid balance value in the on-site data bank.
摘要:
Systems and methods for off line/online access controlled environments to implement temporal applications in wireless devices via near field communications in closed group venues; e.g., concert halls, race horse betting, and university scheduling, are disclosed.
摘要:
Systems and methods for off line/online access controlled environments to implement temporal applications in wireless devices via near field communications in closed group venues; e.g., concert halls, race horse betting, and university scheduling, are disclosed.
摘要:
Methods and apparatus for controlling venue buy-back and resale of access privileges to controlled group events limiting third party trading of subscription.
摘要:
Methods (3500-3695) and apparatus (10, 20) for controlling physical (30, 40) and virtual (12) access for accelerated recognition and processing of privileges, benefits, value transfers, crowd control, community membership and status, in particular for institutions, arenas and other large venues.