摘要:
A system and method of determining likelihood of counterfeiting without inspection of currency compares signals returned by uniquely customized RFID chips when interrogated, preferably incident to a transaction. The RFID information is compared to RFID information for bills known to be in circulation in order to validate a given currency bill. Usage patterns can be determined from statistical analysis of such reports and reported usage patterns will statistically differ significantly if not radically with the number of RFID chips returning the same RFID information and such differences will increase in either or both of geographic locations of reports and frequency of reports with increase of the number of bills having duplicated RFID chips. The basic infrastructure for practice of the invention is also capable of tracking genuine currency following, for example, a theft or other criminal activity.
摘要:
A method for constructing a secure Internet transaction, the method includes: receiving a user identification (userid) and user password on a client device for filling out a form generated by a secure web site; concatenating the user's Internet Protocol (IP) address with a separate password that is maintained on the secure web site that the user is authenticating to; encrypting the concatenated user IP and separate password to form an Internet Protocol password (IPPW); wherein the encrypting is carried out with a client device linear feedback shift register (LFSR) with a defined cycle count; building a transaction consisting of the IPPW, defined cycle count, and userid; transmitting the transaction and form via a network towards the secure web site; wherein in response the secure website performs the following: decrypts the IPPW, and determines if the IP portion of the decrypted IPPW is equal to the user's IP address.
摘要:
A method for constructing a secure Internet transaction, the method includes: receiving a user identification (userid) and user password on a client device for filling out a form generated by a secure web site; concatenating the user's Internet Protocol (IP) address with a separate password that is maintained on the secure web site that the user is authenticating to; encrypting the concatenated user IP and separate password to form an Internet Protocol password (IPPW); wherein the encrypting is carried out with a client device linear feedback shift register (LFSR) with a defined cycle count; building a transaction consisting of the IPPW, defined cycle count, and userid; transmitting the transaction and form via a network towards the secure web site; wherein in response the secure website performs the following: decrypts the IPPW, and determines if the IP portion of the decrypted IPPW is equal to the user's IP address.
摘要:
A method for constructing a secure Internet transaction, the method includes: receiving a user identification (userid) and user password on a client device for filling out a form generated by a secure web site; concatenating the user's Internet Protocol (IP) address with a separate password that is maintained on the secure web site that the user is authenticating to; encrypting the concatenated user IP and separate password to form an Internet Protocol password (IPPW); wherein the encrypting is carried out with asymmetric public-key cryptography using a public key; building a transaction consisting of the IPPW and userid; transmitting the transaction and form via a network towards the secure web site; wherein in response the secure website performs the following: decrypts the IPPW, and determines if the IP portion of the decrypted IPPW is equal to the user's IP address.
摘要:
A password protected machine where a primary alternative password and a secondary alternative password are assigned, but the secondary alternative password cannot be used to gain access unless and until the primary alternative password has been deactivated. Also, a password protected machine where a user is assigned at least two alternative passwords, and where the use of one alternative password will automatically deactivate the other password. Preferably, there is a primary password and a secondary password such that: (i) the use of the primary password does not deactivate the secondary password, but (ii) the use of the secondary password does deactivate the primary password.
摘要:
A method and system for allowing the purchaser of an on-demand entertainment session of predetermined time duration to reaccess that portion of the session not used. On-demand passenger entertainment services in airline flights often offer services, such as movies, of a predetermined time duration which time is longer than the time of flight. The method and system disclosed allows purchasers to gain access on another flight to the unused portion of the services, such as, the unseen portion of a movie, terminated at the end of the initial flight.
摘要:
A method for suppressing graphical overlays in video content, includes: generating a digital signal, the digital signal including a primary video feed subject to graphic overlays, a data stream, and an audio stream; wherein the primary video feed is; inserting steganographic information into the primary video feed; inserting alternative video information into the data stream; wherein the alternative video information is free of graphic overlays; substituting the alternative video information within the primary video feed based on the steganographic information; and wherein the substitution of the alternative video information suppresses at least a portion of the graphic overlay information.
摘要:
A method for preventing password theft through unauthorized keylogging includes detecting, from a host application, a request for a password input by a user of an input keyboard device; activating a randomly generated keyboard map uniquely associated with the host application such that a first set of keystroke values inputted by the user results in a second, converted set of keystroke values transmitted to the host application, in accordance with the randomly generated keyboard map uniquely associated therewith; and upon completion of a password entry process by the user, deactivating the randomly generated keyboard map such that subsequent keystroke values inputted by the user are no longer converted to the values according to the keyboard map.
摘要:
A system for tracking the location of electronic devices and prohibiting unauthorized operation thereof includes a control unit, configured for wireless communication with an electronic device, the electronic device having a basic input/output system (BIOS) associated therewith. The control unit is configured to remotely disable the electronic device in the event the electronic device is detected to be beyond a programmed radius for a programmed duration, in accordance with a specifically defined level of security, wherein the extent to which the electronic device is disabled by the control unit is dependent upon the specifically defined level of security.
摘要:
A method and system for allowing the purchaser of an on-demand entertainment session of predetermined time duration to reaccess that portion of the session not used. On-demand passenger entertainment services in airline flights often offer services, such as movies, of a predetermined time duration which time is longer than the time of flight. The method and system disclosed allows purchasers to gain access on another flight to the unused portion of the services, such as, the unseen portion of a movie, terminated at the end of the initial flight.