Abstract:
A method of searching a specific computer IP address of Internet networks using several specific telephone numbers in series which are arranged and assenbled in sequnce and coded with identification codes, having a specific website, a searching interface program, searching program (30), a first database (40) and a second database (50).
Abstract:
A technique for content management involves storing runtime state of content externally. A system created according to the technique may include a state server that receives runtime state of content from a playback device, and provides the runtime state to that or another playback device upon request. A playback device constructed according to the technique may include a content state recovery engine for recovering runtime state that was previously stored externally to the playback device. A method according to the technique may include generating the runtime state locally, storing the runtime state externally, and re-acquiring the runtime state.
Abstract:
A system, method, and computer program for for text-based encryption, comprising accessing a text file with a plurality of lines of text characters; re- sequencing each of said text characters; translating a decimal representation for each of said text character by an offset of a decimal value so that a resulting translated character is printable; inserting a plurality of characters between each of said translated text characters on each of said line to form a random character string; inserting a plurality of random numbers of random characters before and after said random character string to output to a resultant file; and including a translated seed with said resultant file and appropriate means and computer- readable instructions.
Abstract:
Die Erfindung betrifft ein Telekommunikationsverfahren mit folgenden Schritten: - Aufbau eines Sprachkanals zur Sprachkommunikation zwischen einem ersten Teilnehmer und einem zweiten Teilnehmer zwischen einem ersten Telekommunikationsgerät (118) des ersten Teilnehmers und einem zweiten Telekommunikationsgerät (118') des zweiten Teilnehmers, wobei zumindest das zweite Telekommunikationsgerät ein Sicherheitsmodul aufweist, auf dem Teilnehmer-Identitätsdaten des zweiten Teilnehmers für den Aufbau des Sprachkanals und ein geheimer Schlüssel (108') des zweiten Teilnehmers gespeichert sind, und wobei das Sicherheitsmodul einen Prozessor (114') zur Generierung einer digitalen Signatur (140) mit Hilfe des geheimen Schlüssels aufweist, - Übertragung von Daten (138, 140) über den Sprachkanal zur Authentifizierung des zweiten Teilnehmers gegenüber dem ersten Teilnehmer mit Hilfe eines Challenge-Response-Verfahrens, wobei zur Durchführung des Challenge-Response-Verfahrens durch den Prozessor die digitale Signatur generiert wird, und wobei der zweite Teilnehmer gegenüber dem ersten Teilnehmer als authentifiziert gilt, wenn das Challenge-Response-Verfahren erfolgreich durchgeführt worden ist, - Sprachkommunikation zwischen dem ersten Teilnehmer und dem zweiten Teilnehmer über den Sprachkanal, wobei digitalisierte Sprachdaten (158), die zur Übertragung von dem zweiten Teilnehmer an den ersten Teilnehmer über den Sprachkanal vorgesehen sind, von dem zweiten Teilnehmer blockweise signiert werden, wobei die Signaturen (160) von dem zweiten Teilnehmer an den ersten Teilnehmer übertragen werden, und wobei der erste Teilnehmer die Signaturen prüft, um sicherzustellen, dass die Sprachdaten tatsächlich von dem zweiten Teilnehmer empfangen werden.
Abstract:
A CableCARD device for manipulation of a stream of data has an inband data input for receiving a stream of video data from a host, the stream of video data being encrypted and encoded according to a first coding. A decrypter decrypts the encrypted data. A transcoder transcodes the stream of video data to convert the stream of video data to a second coding, producing a transcoded data stream. An encrypter encrypts the transcoded data stream. An inband data output sends the encrypted transcoded data stream back to the host. This abstract should not be considered limiting, since other embodiments may incorporate more, fewer or different elements that those described in this abstract.
Abstract:
In an SNMP network including a Manager Station having a first digital certificate and an Agent Station having a second digital certificate, the MS generates a simple network management protocol (SNMP) configuration file which includes SNMP authentication keys and SNMP encryption keys for use by the MS and the AS for authentication and for encrypting communications between the MS and the AS, respectively. Mutual authentication can be performed using the first and second digital certificates to establish a secure session between the MS and the AS. The MS can encrypt the SNMP configuration file and transmit it to the AS which can then decrypt the encrypted SNMP configuration file to generate the SNMP authentication keys and the SNMP privacy keys. The MS and the AS can then use the SNMP authentication and privacy keys to conduct secure SNMP communications between the MS and the AS.
Abstract:
In an embodiment of the invention, a dongle is configured for communication with an electronic device. The dongle includes a connector, a controller, a first memory and a second memory. The connector is for interfacing with the electronic device. The controller is for controlling the interface between the connector and the electronic device. The first memory includes a file system. The controller is configured to provide automatic recognition of the dongle and mounting of the file system to the electronic device by using the connector when the dongle interfaces with the electronic device. The second memory has data for automatic navigation to a predetermined location. The dongle is configured for automatic execution of an element of the file system.
Abstract:
Methods and apparatus, including computer program products, related to relationship-based authorization. In general, data characterizing a request for authorization to a computer-based resource is received, and the authorization may be provided based on one or more relationships of a requesting principal. A determination may be made as to whether a requesting principal is authorized, which may include determining whether the requesting user has a relationship with a principal that has management rights of the computer-based resource and determining whether the relationship allows for an access, such as a use of the computer-based resource, if the requesting principal has a relationship with the other principal. If there is no such relationship, a determination may be made as to whether an organization of the requesting principal has a relationship with the other principal that allows for the access.
Abstract:
A Java 2 Enterprise Edition (J2EE) enabled server executing Java software provides a financial transaction Web service to a client each of which communicates wirelessly with the J2EE enabled server and executes Java software to conduct financial transactions between a merchant and a consumer upon an account issued by an issuer to the consumer. Each financial transaction is submitted by the merchant to an acquirer for processing by a transaction handler/ payment processor, and is submitted by the transaction handler/ payment processor to the issuer to obtain a payment amount for the financial transaction from the account, and wherein the issuer forwards the payment amount of the financial transaction to the transaction handler/ payment processor who forwards the payment amount of the financial transaction to the acquirer to pay the merchant for the financial transaction.
Abstract:
Gaming systems and methods for wager game license management in a network utilizing peer networking technology are in the various embodiments. A network component, such as a server computer or a gaming machine, is deputized an authorized license management component, which then receives a license deputizing certificate and data relating to devices in the gaming network, wagering games available in the network, and network configuration data. Once a network component is deputized to perform as an authorized license management component, it assumes the role of local licensing server for the gaming network or for a local peer gaming network, enabling it to supply and manage the distribution of license tokens in a gaming network utilizing peer network technology.