摘要:
The present invention includes an apparatus and a method for transceiver self-diagnostic testing in a communication system. A feedback unit (228, 326) is utilized that allows performance of a loopback test independent of a transmit frequency to receive frequency difference without undue proliferation of circuitry.
摘要:
A method and apparatus for utilizing a token which is preferably a "dumb token" to provide secure access by authorized users to a selected resource. The token stores a secret user code in machine readable form, which code is read by a token processor. The token processor also receives a time-varying value and an algorithm, both of which may be stored or generated at either the token or the token processor and preferably a secret personal identification code which may be inputted at the token, but is preferably inputted at the token processor. The secret user code, time-varying value and secret personal identification code are then algorithmically combined by the algorithm, preferably in the token processor, to generate a one-time nonpredictable code which is transmitted to a host processor. The host processor utilizes the received one-time nonpredictable code to determine if the user is authorized access to the resource and grants access to the resource if the user is determined to be authorized. The system may be modified to operate in query/response mode. The token processor may be any of a variety of available portable remote processors or may be a device such as a telephone which is equipped with card or other token reader and with processing capability.
摘要:
A method and apparatus for performing personal identification and/or verification at perdetermined stations or checkpoints is provided. Each person to be identified has a unit such as a card, badge or other token or device which stores a predetermined coded value, at least a predetermined portion of which is changed at selected time intervals in accordance with an algorithm, the algorithm being such that the value of the predetermined portion of the stored coded value at any given time is nonpredictable. The unit has a triggering signal generator, the unit being responsive to the triggering signal to present an indication of the current stored coded value to the station, the station responding to the predetermined coded value for identifying the person. Triggering may be in response to detection of a predetermined beacon from the station, in response to a user keypad input or may be periodically generated. Security may be enhanced by the person inputting a unique PIN at the unit which PIN is utilized in generating the nonpredictable codes. The PIN input may also be used for triggering. Verification may be achieved by including a public code as part of the code which is presented from the unit which public code is not changed.
摘要:
An apparatus and method for synchronizing the time definition of the dynamic variables by (a) calculating a first non-predictable code according to a secret predetermined algorithm, the algorithm generating the first non-predictable code on the basis of a first dynamic variable and a unique static variable; (b) automatically defining the first dynamic according to a first interval in which the static variable is input into the algorithm, the first interval of time having a predetermined duration; (c) calculating two or more second non-predictable codes according to the predetermined algorithm, the algorithm generating the second non-predictable codes on the basis of the two or more second dynamic variables and the unique static variable, (d) automatically defining the two or more second dynamic variables according to two or more cells of a second interval of time in which the static variable is input into the algorithm of the second computer, the second interval of time comprising a central cell of time having a predetermined duration and one or more cells of time bordering the central cell of time, each bordering cell of time having a predetermined duration; (e) comparing the first non-predictable code with the second non-predictable codes to determine a match, and (f) automatically synchronizing the clock mechanisms which define the first and second dynamic variables upon comparison and matching of the first non-predictable code with one of the second non-predictable codes.
摘要:
Embodiments of the invention generally relate to apparatus, systems and methods for authentication, in particular, apparatus, systems and methods for authenticating an entity for computer and/or network security, secure authorization of a payment or for funds transfer and for selectively granting privileges and providing other services in response to such authentications. In addition, embodiments of the invention relate generally to apparatus, systems and methods for the communication of information between a mobile user-device and a point-of-sale device to securely provide authorization for a financial transaction.
摘要:
According to one aspect, the invention provides a system for authenticating identities of a plurality of users. In one embodiment, the system includes a first handheld device including a wireless transceiver which is configured to transmit authentication information, a second device including a wireless receiver, where the second device is configured to receive the authentication information.
摘要:
The present invention provides a system, method and apparatus that includes a user device having a magnetic field generator disposed within a substrate that is normally inactive, an initiator mounted on the substrate, a memory disposed within the substrate and a processor disposed within the substrate that is communicably coupled to the magnetic field generator, the initiator and the memory. The processor is operable to process information received from the initiator, generate a time varying code in response to the received information and activate the magnetic field generator. A power source is also disposed within the substrate. The magnetic field generator can create a spatial magnetic signal using a magnetic stripe and one or more induction coils, or create a time-varying magnetic signal for emulating data obtained from swiping a traditional magnetic stripe card through a magnetic card reader.
摘要:
A method and system for controlling access to a plurality of secure computer networks using a secure registry system is disclosed. The secure registry system includes a database containing selected data of a plurality of users each authorized to access at least one of the plurality of secure computer networks. The method and system facilitate receiving authentication information from an entity at a secure computer network, communicating the authentication information to the secure registry system, validating the authentication information at the secure registry system, receiving from the secure registry system an indication of whether the entity is authorized to access the secure computer network, and granting the entity access to the secure computer network when the authentication information of the entity corresponds to one of the plurality of users.
摘要:
A method and apparatus are provided for reproducing an audio signal. The audio signal may be a digital input with each segment of the signal being broadcast at least two times, which broadcast transmissions are at time spaced intervals. The time spaced transmissions are stored in at least one RAM, and the multiple transmissions are processed to obtain an enhanced output for each segment, which is applied to an audio receiver for reproduction. For example, the multiple transmissions for each segment may be compared, and the best transmission for the segment selected as the enhanced output for the segment.
摘要:
A method and apparatus are provided for reproducing an audio, video or data signal. The signal may be a digital input with each segment of the signal being broadcast at least two times, which broadcast transmissions are at time spaced intervals. The time spaced transmissions are stored in at least one RAM, and the multiple transmissions are processed to obtain an enhanced output for each segment, which is applied to a receiver for reproduction. For example, the multiple transmissions for each segment may be compared, and the best transmission for the segment selected as the enhanced output for the segment.