Abstract:
PROBLEM TO BE SOLVED: To provide a reception method and a receiver in which compliance of security conditions and transcoding conditions of a transcoder can be inspected. SOLUTION: Information data contains encrypted confidential information data and non-confidential information data. Security information and transcoding-type information are sent to a transcoder together with the partly encrypted information data. The transcoder uses the security information and the transcoding-type information during a transcoding step. The encrypted confidential information data are transcoded without using its contents while the non-confidential information data are transcoded, having access to its contents. COPYRIGHT: (C)2006,JPO&NCIPI
Abstract:
The present invention relates to a privacy method for responding to read request. The present invention further relates to a device for generating a response signal and a computer program product. Methods and systems in accordance with embodiments of the invention validate, whether a read request is directed at a target tag to be protected, and, upon a match, respond to the read request by sending a response signal.
Abstract:
A method of transmitting information data from a sender to a receiver via a transcoder is proposed. The information data comprises confidential information data which is encrypted and non-confidential information data. Security information and transcoding-type information is sent together with the partly encrypted information data to the transcoder which uses the security information and transcoding-type information during a transcoding step. The encrypted confidential information data is thereby transcoded without using its content while the non-confidential information data is transcoded, having access to its content.
Abstract:
A Transaction Authorization Method operating over a computer network comprising a plurality of interconnected computers and a plurality of resources, each computer including a processor, memory and input/output devices, each resource operatively coupled to at least one of the computers and executing at least one of the activities in the process flow, the method characterized in that it assembles an electronic authorization of a transaction in a manner which is verifiable by extracting and verifying whether role certificates of at least one type, associated with the authorization, are themselves authentic. The method eliminates the need of having to authorize each and every signature on a transaction individually by providing an authorization structure based on roles, this structure being accessible on a public network for verification that the transaction is authorized.
Abstract:
A method of establishing a trustworthiness level of a participant in a communication connection between a first communication partner and a second communication partner is proposed whereby the communication behavior is adapted to the established trustworthiness level. The participant is equipped with a trustworthiness certificate and a therefrom separated securely stored participant private key. The first communication partner receives the trustworthiness certificate from the participant wherefrom the trustworthiness level is derived and established. The first communication partner tests whether the trustworthiness certificate belongs to the participant by using the participant private key. In case the trustworthiness certificate is confirmed by the test to belong to the participant, the first communication partner communicates the established trustworthiness level to the second communication partner. Then, at least one parameter of the communication behavior is chosen in dependence of the established trustworthiness level.
Abstract:
A method of transmitting information data from a sender to a receiver via a transcoder is proposed. The information data comprises confidential information data which is encrypted and non-confidential information data. Security information and transcoding-type information is sent together with the partly encrypted information data to the transcoder which uses the security information and transcoding-type information during a transcoding step. The encrypted confidential information data is thereby transcoded without using its content while the non-confidential information data is transcoded, having access to its content.
Abstract:
A method of establishing a trustworthiness level of a participant in a communication connection between a first communication partner and a second communication partner is proposed whereby the communication behavior is adapted to the established trustworthiness level. The participant is equipped with a trustworthiness certificate and a therefrom separated securely stored participant private key. The first communication partner receives the trustworthiness certificate from the participant wherefrom the trustworthiness level is derived and established. The first communication partner tests whether the trustworthiness certificate belongs to the participant by using the participant private key. In case the trustworthiness certificate is confirmed by the test to belong to the participant, the first communication partner communicates the established trustworthiness level to the second communication partner. Then, at least one parameter of the communication behavior is chosen in dependence of the established trustworthiness level.
Abstract:
A method of transmitting information data from a sender to a receiver via a transcoder is proposed. The information data comprises confidential information data which is encrypted and non-confidential information data. Security information and transcoding-type information is sent together with the partly encrypted information data to the transcoder which uses the security information and transcoding-type information during a transcoding step. The encrypted confidential information data is thereby transcoded without using its content while the non-confidential information data is transcoded, having access to its content.
Abstract:
A method of establishing a trustworthiness level of a participant in a communication connection between a first communication partner and a second communication partner is proposed whereby the communication behavior is adapted to the established trustworthiness level. The participant is equipped with a trustworthiness certificate and a therefrom separated securely stored participant private key. The first communication partner receives the trustworthiness certificate from the participant wherefrom the trustworthiness level is derived and established. The first communication partner tests whether the trustworthiness certificate belongs to the participant by using the participant private key. In case the trustworthiness certificate is confirmed by the test to belong to the participant, the first communication partner communicates the established trustworthiness level to the second communication partner. Then, at least one parameter of the communication behavior is chosen in dependence of the established trustworthiness level.
Abstract:
A method of establishing a trustworthiness level of a participant in a communication connection between a first communication partner and a second communication partner is proposed whereby the communication behavior is adapted to the established trustworthiness level. The participant is equippe d with a trustworthiness certificate and a therefrom separated securely stored participant private key. The first communication partner receives the trustworthiness certificate from the participant wherefrom the trustworthine ss level is derived and established. The first communication partner tests whether the trustworthiness certificate belongs to the participant by using the participant private key. In case the trustworthiness certificate is confirmed by the test to belong to the participant, the first communication partner communicates the established trustworthiness level to the second communication partner. Then, at least one parameter of the communication behavior is chosen in dependence of the established trustworthiness level.