摘要:
A technique for verifying that indicia, such as print indicia, are provided at the correct location(s) on an object. Relative movement between the object and a sensor is provided. If sensed indicia are located at an expected position on the object, an indicia-bearing object is vertified. One or more samples of a proper object are scanned to establish a template which defines those locations at which indicia on the samples are located. This template is used subsequently to verify the presence of proper indicia-bearing objects.
摘要:
An encryption/decryption key is generated from an identification number ID by first generating two sets of numbers from the identification number ID, based upon known expressions. The first set of numbers are employed as coefficients of a first polynomial to generate N first numbers for x=0, 1 . . . N-1 (N is the number of bits of the key) and a second number corresponding to each first number is generating employing the second set of numbers as coefficients and the generated first numbers as variables. The ordered pairs of first and second numbers generated correspond to addresses of a memory at which bits of the key are stored, the order of the bits being determined by the corresponding values of X. The expressions employ modular arithmetic using prime numbers as bases.