Abstract:
PROBLEM TO BE SOLVED: To protect the privacy of user by utilizing a human body as a communication medium for transmitting information concerning the user. SOLUTION: A user 2 activates an automatic teller machine(ATM) 4. The user 2 carries a personal area network(PAN) card 5 such as an EF card with him. The ATM 4 is provided with a control panel 6, and the control panel 6 is provided with a contract for forming electric connection with the user 2. The ATM 4 is connected through a communication link 10 to a receiver module 7 and a processor 8. The PAN card 5 and the processor 8 communicate through a conductive medium of the body of user 2 and the communication link 10, and the identification of user 2 is confirmed. The communication is enciphered for establishing confirmation and security. A transmitter and a receiver communicate in cooperation. Two transceivers are used for bidirectional communication. They are arranged in the card 5 and the processor 8.
Abstract:
PROBLEM TO BE SOLVED: To fulfill a requirement according to an intended use and to obtain as inconspicuous, safe and quick water-marking as possible by converting a water-marked edition by using an identified privacy encoding method and extracting a water-mark from the privacy coded water-marked edition of a source data set. SOLUTION: Privacy control 202 is added to source data 201. Thus, authentication can be attained, and simultaneously the privacy of the content of a data set can be protected. Then, water-marking algorithm is applied (203). Thus, privacy reinforced water-marked data 204 can be obtained. The water-mark is present in an image so that only the least significant bit of the image can be affected, and the maximum picture quality protection can be attained. An authenticated result 212 can be obtained from the privacy reinforced water- marked data 204.
Abstract:
PROBLEM TO BE SOLVED: To maintain the perceivability as to a watermarked data set I made by embedding a watermark in a source data set I, and also to allow an authenticator to precisely authenticate the contents of I while keeping it secret to him. SOLUTION: Bits constituting the watermark data set I are divided into the least significant bit and other superordinate bits. The superordinate bits I t are extracted from I. I s =f 2 (I t ) as an encrypted version or a hash version of It is generated. Watermark I 1 =V(I s ) is calculated. The watermark data set I is obtained by inserting I 1 into the least significant bit of I. The authenticator receives I s and I 1 from an authentication requester, and calculates I 1 '=V(I s ), and compares I 1 ' with I 1 . COPYRIGHT: (C)2004,JPO
Abstract translation:要解决的问题:为了保持对通过在源数据集I中嵌入水印而做出的水印数据集的可感知性,并且还允许认证者精确地认证I的内容,同时保持对其的秘密 。 解决方案:构成水印数据集I的位被分成最低有效位和其他上位。 上级位I t SB>作为加密的数据从I I / SB> = f 2(SBB)中提取 版本或哈希版本的生成。 计算水印I 1 SB> = V(I s SB>)。 水印数据集I通过将I 1 SB>插入到I的最低有效位中来获得。认证器从一个I / S> S SB>和I 1 SB> 认证请求者,并且计算I 1 SB>'= V(I s SB>),并将I 1 SB>与I 1 SB >。 版权所有(C)2004,JPO
Abstract:
A watermarking scheme which allows the watermarked image to be authenticated by an authentication agent without revealing the human-readable content of the image. There is disclosed an approach which combines privacy control with watermarking and authentication mechanisms. The watermark can be made to be imperceptible to humans. Public key cryptography allows the authentication agent to authenticate without being able to watermark an image.
Abstract:
A software-efficient pseudorandom function maps an index and an encryption key to a pseudorandom bit string useful for constructing a stream cipher. The method begins by preprocessing the encryption key into a table of pseudorandom values. The index and a set of values from the table is then used to generate a set of initial values for the registers. At least some of the register values are modified in part by taking a current value of a register and replacing the current value with a function of the current value and a value retrieved from the table, the latter value being determined by the values in one or more other registers. After modifying the register values in this fashion, the values are masked using other values from the table and the results then concatenated into the pseudorandom bit string. The modification step is repeated and a new masked function of the register values is then concatenated into the pseudorandom bit string. The modification and concatenation steps are repeated to continue growing the pseudorandom bit string until the string reaches some desired length.
Abstract:
AN APPARATUS AND METHOD ARE DISCLOSED FOR ENCODING AND TRANSFERRING DATA FROM A TRANSMITTER (5) TO A RECEIVER (7), USING THE HUMAN BODY AS A TRANSMISSION MEDIUM. THE TRANSMITTER INCLUDES AN ELECTRIC FIELD GENERATOR, A DATA ENCODER WHICH OPERATES BY MODULATING THE ELECTRIC FIELD, AND ELECTRODES (16) TO COUPLE THE ELECTRIC FIELD THROUGH THE HUMAN BODY. THE RECEIVER INCLUDES ELECTRODES (18), IN PHYSICAL CONTACT WITH, OR CLOSE PROXIMITY TO, A PART OF THE HUMAN BODY, FOR DETECTING AN ELECTRIC FIELD CARRIED THROUGH THE BODY, AND A DEMODULATOR (20) FOR EXTRACTING THE DATA FROM THE MODULATED ELECTRIC FIELD. AN AUTHENTICATOR (22), CONNECTED TO THE RECEIVER, PROCESSES THE ENCODED DATA AND VALIDATES THE AUTHENTICITY OF THE TRANSMISSION. THE APPARATUS ANDMETHOD ARE USED TO IDENTIFY AND AUTHORIZE A POSSESSOR (32) OF THE TRANSMITTER. THE POSSESSOR THEN HAS SECURE ACCESS TO, AND CAN OBTAIN DELIVERY OF, GOODS AND SERVICES SUCH AS THE DISTRIBUTION OF MONEY, PHONE PRIVILEGES, BUILDING ACCESS, AND COMMODITIES. ENCRYPTION PROVIDES RAPID TRANSMISSION AND AUTHENTICATION OF THE TRANSMITTER, AND A PLURALITY OF SIMILAR TRANSMITTERS, WITH MINIMUM VULNERABILITY TO COUNTERFEIT. SIGNAL PROCESSING AND DIGITAL COMMUNICATION COMPONENTS ACCOMMODATE VARIATIONS IN LOCATION AND ORIENTATION OF THE TRANSMITTER AND RECEIVER, AND PROVIDE TRANSMITTERS WITH LONG LIFE TIMES AND HIGH RELIABILITY. (FIGURE 1)
Abstract:
A software-efficient pseudorandom function maps an index and an encryption key to a pseudorandom bit string useful for constructing a stream cipher. The method begins by preprocessing the encryption key into a table of pseudorandom values. The index and a set of values from the table is then used to generate a set of initial values for the registers. At least some of the register values are modified in part by taking a current value of a register and replacing the current value with a function of the current value and a value retrieved from the table, the latter value being determined by the values in one or more other registers. After modifying the register values in this fashion, the values are masked using other values from the table and the results then concatenated into the pseudorandom bit string. The modification step is repeated and a new masked function of the register values is then concatenated into the pseudorandom bit string. The modification and concatenation steps are repeated to continue growing the pseudorandom bit string until the string reaches some desired length.
Abstract:
An apparatus and method are disclosed for encoding and transferring data from a transmitter to a receiver, using the human body as a transmission medium. The transmitter includes an electric field generator, a data encoder which operates by modulating the electric field, and electrodes to couple the electric field through the human body. The receiver includes electrodes, in physical contact with, or close proximity to, a part of the human body, for detecting an electric field carried through the body, and a demodulator for extracting the data from the modulated electric field. An authenticator, connected to the receiver, processes the encoded data and validates the authenticity of the transmission. The apparatus and method are used to identify and authorize a possessor of the transmitter. The possessor then has secure access to, and can obtain delivery of, goods and services such as the distribution of money, phone privileges, building access, and commodities. Encryption provides rapid transmission and authentication of the transmitter, and a plurality of similar transmitters, with minimum vulnerability to counterfeit. Signal processing and digital communication components accommodate variations in location and orientation of the transmitter and receiver, and provide transmitters with long life times and high reliability.
Abstract:
An apparatus and method are disclosed for encoding and transferring data from a transmitter to a receiver, using the human body as a transmission medium. The transmitter includes an electric field generator, a data encoder which operates by modulating the electric field, and electrodes to couple the electric field through the human body. The receiver includes electrodes, in physical contact with, or close proximity to, a part of the human body, for detecting an electric field carried through the body, and a demodulator for extracting the data from the modulated electric field. An authenticator, connected to the receiver, processes the encoded data and validates the authenticity of the transmission. The apparatus and method are used to identify and authorize a possessor of the transmitter. The possessor then has secure access to, and can obtain delivery of, goods and services such as the distribution of money, phone privileges, building access, and commodities. Encryption provides rapid transmission and authentication of the transmitter, and a plurality of similar transmitters, with minimum vulnerability to counterfeit. Signal processing and digital communication components accommodate variations in location and orientation of the transmitter and receiver, and provide transmitters with long life times and high reliability.