Abstract:
A system method for providing an authentication code across a network (14) for use in authentication of documents (40), such as printed lottery tickets. The system includes document-printing terminals (16) that create a first key and a second key, with the first key used to generate an authentication code for printing on the document, and the second key is sent to a central server (12) and usable to verify that the first key created the authentication code. The central server (12) can also provide ticket serial numbers for tickets being dispensed at the terminals and the first key can be combined with the serial number and other secondary data to create the authentication code.
Abstract:
The present invention relates to an authentication method for storage and application of data, IC card, fingerprint scanner. In the method IC card device as well as fingerprint scanner is connected to a flash memory (taken-with disk) which is compatible to USB interface of computer and acts as the hardware for authentication, then put the authentication hardware into a IC card read device (Reader), wherein confirm user's identity by means of the mechanism of the fingerprint identification center, while the other kind of authentication is processed using identity checking cypher ICCID and international checking code GLN; The advantage of the method is that the practitioners of network station who supply files which have copyright and intellectual property will be controlled effectively by authorization, thus avoid the confusion occurring in which the files which have copyright and intellectual property are supplied to net friend to upload, download, share to or with each other by means of Peer-to-Peer transmission P2P (Peer to Peer), so that the rights of legal practitioners(the owner of copyright, intellectual property) are damaged badly.
Abstract:
A method of generating a seed for use in a pseudo-random number generator in which a value of a first periodic signal (104) is sampled, wherein timing for said sampling is obtained from a second periodic signal (102). Transitions between binary states of said first periodic signal (104) and said second periodic signal (102) are not synchronized. The resulting binary stream (106) of said sampled values is then converted into a seed.
Abstract:
An elliptic curve random number generator avoids escrow keys by choosing a point Q on the elliptic curve as verifiably random. An arbitrary string is chosen and a hash of that string computed. The hash is then converted to a field element of the desired field, the field element regarded as the x-coordinate of a point Q on the elliptic curve and the x-coordinate is tested for validity on the desired elliptic curve. If valid, the x-coordinate is decompressed to the point Q, wherein the choice of which is the two points is also derived from the hash value. Intentional use of escrow keys can provide for back up functionality. The relationship between P and Q is used as an escrow key and stored by for a security domain. The administrator logs the output of the generator to reconstruct the random number with the escrow key.
Abstract:
A method and apparatus for generating random numbers. Events characteristic of a random process are registered, and a particular time segment, from among a set of time segments, is identified based upon registration of an event within that time segment, and a value is associated based on the identified time segment. The events may be detections of a particle by a particle detector such as a photon detector. A random number is outputted based at least upon the associated value. Outputting of the random numbers may be followed by a whitening process. The source of particles may be driven to provide various specified probability distributions of values.
Abstract:
An identity based service system is provided, in which an identity is created and managed for a user or principal, such that at least a portion of the identity is available to use between one or more system entities. A discovery service enables a system entity to discover a service descriptor, given a service name and a name identifier of the user, whereby system entities can find and invoke the user's other personal web services. The discovery service preferably provides a translation between a plurality of namespaces, to prevent linkable identity information over time between system entities.
Abstract:
An apparatus for generating random data, comprising a raw random sequence source (105) adapted to generate a raw random sequence (RRBS) and a digital post processor (110) adapted to process said raw random sequence to generate said random data (PRBS), wherein said digital post-processor (110) comprises a synchronous fmite state machine (115) having at least one input adapted to repeatedly receive a current value of said raw random sequence and at least one output to provide a current output value (OS) depending on previous values of said raw random sequence.
Abstract:
Method and apparatus for generating random numbers are disclosed. In one aspect, a method for generating random numbers for use in a wireless communication device provides for generating random numbers, gathering a sample of the generated random numbers, and computing at least one metric, such as mean value, standard deviation, and/or entropy. The method further provides for comparing the metric with a corresponding reference value and adjusting the metric based on a result of said comparison so that the generated random numbers achieve a desired distribution. In another aspect, an apparatus for generating random numbers includes an analog noise generator and hardware components for generating random numbers and feedback values to adjust the random numbers. The apparatus further includes a processor capable of executing instructions to carry out control algorithms for adjusting the random numbers.
Abstract:
Aspects for enhancing security in wireless stations of a local area network (LAN) are described. The aspects include utilizing a smart card to store sensitive data in a wireless station accessing a host in a wireless local area network (WLAN). Further included is providing a cryptographic token interface in the host for performing cryptographic operations with the sensitive data from the wireless station.