Abstract:
The present invention discloses a system and method for providing privacy to a client (10) accessing a chat application on a chat server via the Internet wherein a request (130) is transmitted for a chat application from a client (10) to a first proxy server (15) to a second proxy server (20). In response to the receipt of the request (130) at the second proxy (20) server, a unique ID is forwarded back to the first proxy server (15) and the request (130) along with the unique ID (135) are forwarded on to the chat server. A response (110) to the request (130) is transmitted from the chat server back to the second proxy server (20) along with the originally provided unique ID (115). The response (110) and unique ID (115) are stored within the second proxy server (20) and may be accessed from the first proxy server (15) by providing the unique ID (135).
Abstract:
The invention relates to a method for processing data via the Internet comprising at least two clients (1, 2), a webserver (3) and at least one database server (4) for saving and retrieving data. According to said method, at least one first client (1) saves data to the database server (4) via the Internet using the webserver (3) and at least one second client (2), retrieves the data, preferably via the Internet, using the webserver (3). To achieve a rapid, simple and cost-effective transfer of information to and from a service provider, in particular a logistics service provider, the method is designed in such a way that an assignment takes place between the first client (1) and the data that has been saved to the database server (4) and also the second client (2), which retrieves the saved data and that the data of the first client (1) is assigned by means of the selection of the second client (2) using the first client (1).
Abstract:
An agent (14) obtains data from a device (19) by receiving a plug-in (26) containing system calls for obtaining the data from the device (19), loading the plug-in into the agent (14), obtaining the data from the device using the system calls, and transmitting the data over an external network (12) using one or more of a plurality of protocols. The data is provided to a client (30) by formatting the data, and making the formatted data accessible to a client (30) via the external network (12). Data indicative of an operating state of a machine is automatically and repeatedly collected. Information related to the collected date is automatically transmitted to a location remote from the machine. The information is transmitted in the form of electronic mail messages complying with standard electronic mail messaging protocol.
Abstract:
Digital information is held in a piece of hardware having a durability so as to protect the digital information. A record concerning transfer of digital information, namely, a transfer history is made in a system in which digital information is transferred without permitting duplication using a hardware mechanism. Analysis of the transfer history enables determination when digital information is copied by altering the hardware. Because the data structure of the transfer history is a nested structure, the computational complexity of the computation for transfer history inspection necessary for a transfer is a constant independent of the number of transfers, and the durability against false alteration of a transfer history by an authorized user during the distribution.
Abstract:
The present invention provides permutation instructions which can be used in software executed in a programmable processor (14) for solving permutation problems in cryptography, multimedia and other applications. The permute instructions are based on an omega-flip network comprising at least two stages in which each stage can perform the function of either an omega network stage or a flip network stage. Intermediate sequences of bits are defined that an initial sequence of bits from a source register are transformed into. Each intermediate sequence of bits is used as input to a subsequent permutation instruction. Permutation instructions are determined for permuting the initial source sequence of bits into one or more intermediate sequence of bits until a desired sequence is obtained. The intermediate sequences of bits are determined by configuration bits.
Abstract:
An intermediate system provides remote clients with access to a primary system. The intermediate system creates and stores a log-in record (50) for each client. The log-in record contains an encrypted primary system client identifier (PSCI) and a security scheme identifier (Security ID). The PSCI contains authentication information for verifying a client's right to access the primary system (58). The Security ID identifies the security scheme employed to secure information for a client's log-in process. The intermediate system initially verifies a client's access rights using the security scheme identified by the Security ID and data provided by the client. Next, the intermediate system sends the PSCI to the client's primary system, which uses the PSCI to verify the client's access rights. When necessary, a security scheme update modifies values in the client log-in record (64). The update modifies values that depend on log-in data provided by the client, including modifications to the encrypted PSCI. Using the client's log-in data eliminates the need to separately request data from the client for security scheme updates.
Abstract:
The method of the invention includes a tokenless authorization of a reward transaction between an issuer (58) and a recipient (54) using an electronic identicator and at least one recipient bid biometric sample, the method comprising the following steps. A recipient registration (54) step, wherein a recipient registers with an electronic identicator at least one registration biometric sample. An issuer registration step, wherein the issuer registers identification data (64) with the electronic identicator. During a transaction formation step, where an electronic reward transaction (56) is formed between the issuer and the recipient, comprising issuer bid identification data (64), transaction data (60), and at least one recipient bid biometric sample, the bid biometric sample is obtained from the issuer's person. In at least one transmission step, the issuer bid identification data (64), the transaction data (56), and recipient bid biometric sample are electronically forwarded to the electronic identicator. In a recipient identification step, the electronic identicator compares the bid biometric sample with at least one registered biometric sample for producing either a successful or failed identification of the recipient. In an issuer identification step, the electronic identificator compares the issuer's bid identification data with an issuer's registered identification data for producing either a successful or failed identification of the issuer. Thereby, upon successful identification of the recipient and issuer, a reward transaction is authorized for debit or credit settlement of reward units from the recipient's rewards account, without the recipient presenting any personalized man-made tokens such as smartcards or magnetic swipe cards.
Abstract:
A system is described for allowing "pay by time" purchasing of digital video programming. The system provides for a variable or metered approach. A user can purchase a fraction of a program for a price different from that required for purchasing the entire program. Records of the user's viewing can be created to record, e.g., when a user started receiving a program, how long the user received a program, and when the user stopped receiving a program.
Abstract:
A password storage and retrieval system (8) for secure authentication and management of network agents (10). The password storage and retrieval system (8) includes a memory unit (18) and, in a network agent (10), a decryptor (12), an encryptor (14), and an encryption key (16). The decryptor (12) uses a symmetrical algorithm and an encryption key (16) to decrypt an encrypted password related to the network agent (10) to thereby obtain a decrypted password. The same symmetrical algorithm was previously used to encrypt the password with the key and store the encrypted password. In a preferred embodiment of the invention, the encryption key (16) is hard-coded in the network agent (10), and the memory unit (18) for the encrypted password is a designated directory easily accessible to the network agent (10). An obvious advantage of this invention is that in order to break through the system, a person would need to obtain at least two pieces of information; that is, the encryption key (16) and the encrypted password.
Abstract:
Systems and methods to create venue tokens that provide generalized geographic information while preserving location specific data. In one embodiment, a Universal Location Descriptor (ULD) translator converts location data into a geocode that in one embodiment is a binary code. Location information can include a street address, zip code, directional information, destination, velocity information, latitude and/or longitude, etc. The geocode can then be encrypted to generate a token. Relative geographic similarities can be identified by comparing geographic information from the tokens, thereby allowing similarly situated individuals and/or organizations, service providers, etc., to be identified without disclosing specific location identities of those parties seeking such privacy. The comparison of token geographic information can provide a probabilistic output that, in one embodiment, can be customized using an application-dependent threshold, to generate only those outputs satisfying a specified probability measure.