摘要:
In order to address the need for detection of fraudulent items, a method, apparatus, and system for detection of fraudulent items is provided herein. Special anti-forgery Radio-Frequency identification (RFID) tags are utilized with additional measures to thwart would-be forgers. Each anti-forgery RFID tag comprises a unique, or semi-unique number that, along with a private key possessed by only the legitimate product manufacturer, determines a signature that is preferably printed on the product packaging. Utilizing the unique number on the anti-forgery RFID and a public key corresponding to the private key, the signature is verified by standard public-key cryptographic methods. The validation of the signature identifies the product's authenticity.
摘要:
A method and system for registering a user device in a domain of a domain authority (106) using biometric information is provided. The method includes sending (402) a request (by the user device) to the domain authority for joining the domain. The user device making the request is then authenticated (400) and the biometric information of the user is then requested (406). Further, the method includes authenticating (412) the biometric information of the user. The security information of the domain is transferred (414) to the user device once the authentication of the user device and the biometric information are both successful.
摘要:
Automatic recognition apparatus (100, 700) includes multiple automatic recognition subsystems (102, 104, 106) that are cable of producing estimates of the probability that a subject matches a particular identity, a probability estimate combiner (108) that receives estimates from the multiple automatic recognition subsystems (102, 104, 106) and produces a combined estimate, and a decayer that (111) that decreases the certainty of the combined estimate over time while avoiding changing estimates to values that would suggest strong information contrary to the initial values of the combined estimates.
摘要:
A method and device for using a partial public key in a cryptosystem. The cryptosystem may be based on a group, such as an elliptic curve over a finite field. The device includes a first memory for storing system parameters of the cryptosystem and a second memory for storing a portion of a public key of the cryptosystem. The device receives the complete public key, or the remainder of the public key, via communication with another device. The received portion of the public key is used to form a validated public key. A processor of the device uses the validated public key for encrypting messages and/or verifying signatures. The size of the second memory is reduced since only part of the public key is stored.
摘要:
Automatic recognition systems (100) includes multiple automatic recognition subsystems (102, 104, 106) that are cable of producing estimates of the probability that a subject matches a particular identity and a probability estimate combiner (108) that receives estimates from the multiple automatic recognition subsystems (102, 104, 106). The probability estimate combiner (108) has a number of properties which allow good use to be made of the individual estimates.
摘要:
Automatic recognition apparatus (100, 700) includes multiple automatic recognition subsystems (102, 104, 106) that are cable of producing estimates of the probability that a subject matches a particular identity, a probability estimate combiner (108) that receives estimates from the multiple automatic recognition subsystems (102, 104, 106) and produces a combined estimate, and a decayer that (111) that decreases the certainty of the combined estimate over time while avoiding changing estimates to values that would suggest strong information contrary to the initial values of the combined estimates.
摘要:
A method and device for using a partial public key in a cryptosystem. The cryptosystem may be based on a group, such as an elliptic curve over a finite field. The device includes a first memory for storing system parameters of the cryptosystem and a second memory for storing a portion of a public key of the cryptosystem. The device receives the complete public key, or the remainder of the public key, via communication with another device. The received portion of the public key is used to form a validated public key. A processor of the device uses the validated public key for encrypting messages and/or verifying signatures. The size of the second memory is reduced since only part of the public key is stored.
摘要:
Methods and system for managing secure access to data by a user in a network are disclosed. The method includes receiving (402, 404) a key and a biometric sample of the user transmitted by a user device (104) at a server (102). The method also includes decrypting (406) an encrypted biometric profile (212) corresponding to the user by using the key, to yield an unencrypted biometric profile. The method further includes authenticating (408) the user by using the biometric sample of the user and the unencrypted biometric profile corresponding to the user. The method further includes discarding (410) the key, the biometric sample of the user, and the unencrypted biometric profile corresponding to the user after authentication.
摘要:
Authentication is performed to a confidence level (CL) desired by a verifier (220). A prover (210) picks and sends certain same size, square matrices to the verifier (220). A random request bit is sent (234) from the verifier (220) to the prover (210) after the receipt of a certain square matrix. Depending on the request bit, calculations are made (244, 264) by the verifier (220) to determine if the matrices sent from the prover are verifiable. The prover (210) is iteratively authenticated by the verifier (220). Iterations are continued until (320) a count of the iterations (IL) reaches a number sufficient to achieve the desired confidence level (CL). After a delay, more iterations can achieve a higher confidence level by building on previous result of authentication without having to begin at zero. During this delay, the verifier (220) can perform tasks in reliance on the result of authentication. Digital logic can perform the authentication.
摘要:
Communication and validation of information transfer from a transmitter to a receiver is achieved by generating a cipher (400) from a message m (410) using parameters of an elliptic curve, a generator point P (406) on the elliptic curve and a public key Q (416) of the receiver. The cipher includes a first element that is the product kP of a random number k (404) with the generator point P and a second element that is the product of m and the x-coordinate of the product kQ. The message m is generated from two mathematically independent representations of the information and, optionally, a random number. The cipher is communicated to the receiver and decoded to recover a message m′ (502). A validation token (500) is generated by the receiver and passed to the transmitter, which validates communication of the information to the receiver if the product mkQ is equal to the validation token.