Abstract:
설명되고 도시되고 청구된 모바일 상거래 인증 및 인가 시스템은 현존 모바일 무선 통신 기기의 사용자가 사용자 및 거래를 인가 및 인증하기 위해 위치 데이터를 이용하는 무선 통신 시스템을 거쳐 구매를 포함하는 금융 거래들을 수행하게 한다. 모바일 무선 통신 기기의 위치 및 판매자 판매 시점 관리 디바이스의 위치는 지불 합계와 매칭된다. 모바일 무선 통신 기기의 사용자의 인증은 적어도 모바일 무선 통신 기기의 위치 및/또는 위치 결정가능 특징들, 상품 또는 서비스들을 구매하기 위해 기기 사용자가 탐색하는, 판매자 또는 상인의 판매 시점 관리 디바이스의 위치 및/또는 장소, 및 판매 시점 관리 디바이스에 입력된 지불 합계의 적용에 의해 달성된다. 무선 고객 서버 허브에 위치된 거래 매칭 서브시스템은 무선 통신 네트워크를 거쳐 지불 합계량 및 위치 데이터의 프로세싱을 지원할 수 있다.
Abstract:
PROBLEM TO BE SOLVED: To provide a system and/or a method for efficiently classifying network packets. SOLUTION: The method for efficiently classifying the network packets includes steps for: describing a packet as a feature vector; and mapping the feature vector to a feature space. The method further includes steps for: defining a feature prism; classifying the packet to the feature prism; and deciding whether or not the feature vector matches the feature prism. When the feature vector matches the feature prism, the packet is transferred to a data recipient, when not, the packet is blocked. A device configuration includes: an identification component defining at least one feature of the packet; and a classification component classifying the packet on the basis of at least one characteristic which is defined at least partially. COPYRIGHT: (C)2011,JPO&INPIT
Abstract:
PROBLEM TO BE SOLVED: To provide an apparatus and a method that can be used by a person for securely authenticating his identity by issuing a secure identifier.SOLUTION: An authentication apparatus 200 has a processor 208, at least one activator 204 coupled to the processor 208, an internal clock 212, a random number generator 216, an optional additional static memory 220 and a signal output 224, and generates a digital signature using a current time (time identifier), an identified secrete key, and a generated random number, which are called secure identifiers, and issues it. A receiver receives the issued secure identifiers to verify that the secure identifiers have been appropriately sent. The secret key corresponding to a transmitted key identifier is accessed, the validity of the secure identifier is determined using the accessed key, and that the time indicated in the received secure identifier is verified to be within acceptable time tolerances.
Abstract:
Un procedimiento para transmisiones seguras en un canal de radiodifusión, comprendiendo el procedimiento: obtener (714) una clave a corto plazo (800) para un mensaje para su transmisión, correspondiendo la clave a corto plazo a un identificador de clave a corto plazo; determinar (702) una clave de acceso de radiodifusión para el mensaje, correspondiendo la clave de acceso de radiodifusión a un identificador de clave de acceso (804); cifrar (716) el mensaje con la clave a corto plazo; formar (718) una cabecera de protocolo de Internet que comprenda el identificador de clave a corto plazo; y transmitir (718) el mensaje cifrado en el canal de radiodifusión con la cabecera de protocolo de Internet, en el que la clave a corto plazo (714) se calcula en función del identificador de clave a corto plazo y de la clave de acceso de radiodifusión.
Abstract:
Methods devices and systems for detecting return oriented programming (ROP) exploits are disclosed. A system includes a processor a main memory and a cache memory. A cache monitor develops an instruction loading profile by monitoring accesses to cached instructions found in the cache memory and misses to instructions not currently in the cache memory. A remedial action unit terminates execution of one or more of the valid code sequences if the instruction loading profile is indicative of execution of an ROP exploit involving one or more valid code sequences. The instruction loading profile may be a hit/miss ratio derived from monitoring cache hits relative to cache misses. The ROP exploits may include code snippets that each include an executable instruction and a return instruction from valid code sequences.
Abstract:
Method and apparatus for secure transmissions. Each user is provided a registration key. A long-time updated broadcast key is encrypted using the registration key and provided periodically to a user. A short-time updatedkey is encrypted using the broadcast key. The short-time key is available with each broadcast message,wherein sufficient information to calculate the short-time key is provided in an Internet protocol headerpreceding the broadcast content. Broadcasts are then encrypted using the short-time key, wherein the user decrypts the broadcast message using the short-time key.
Abstract:
Apparatus and method for provisioning an access key used for a controlled access broadcast service is disclosed. In one aspect, a method for secure processing in a device that securely stores a secret key comprises receiving a plurality of challenges from a network, generating a plurality of ciphering keys based on the secret key and the plurality of challenges, and generating an access key based on the plurality of ciphering keys.
Abstract:
IN A COMMUNICATIONS SYSTEM, A METHOD OF TRANSFORMING A SET OF MESSAGE SIGNALS REPRESENTING A MESSAGE COMPRISING THE STEPS OF FIRST ENCODING ONE OF THE SET OF MESSAGE SIGNALS IN ACCORDANCE WITH A FIRST KEYED TRANSFORMATION, A SECOND ENCODING OF THE ONE OF THE SET OF MESSAGE SIGNALS IN ACCORDANCE WITH AT LEAST ONE ADDITIONAL KEYED TRANSFORMATION, A THIRD ENCODING OF THE ONE OF THE SET OF MESSAGE SIGNALS IN ACCORDANCE WITH A SELF INVERTING TRANSFORMATION IN WHICH AT LEAST ONE OF THE SET OF MESSAGE SIGNALS IS ALTERED, A FOURTH ENCODING OF THE ONE OF THE SET OF MESSAGE SIGNALS IN ACCORDANCE WITH AT LEAST ONE ADDITIONAL INVERSE TRANSFORMATION WHEREIN EACH OF THE AT LEAST ONE ADDITIONAL INVERSE KEYED TRANSFORMATION IS A CORRESPONDING INVERSE OF AT LEAST ONE ADDITIONAL KEYED TRANSFORMATION, AND FIFTH ENCODING THE ONE OF THE SET OF MESSAGE SIGNALS IN ACCORDANCE WITH FIRST INVERSE KEYED TRANSFORMATION WHEREIN THE FIRST INVERSE KEYED TRANSFORMATION IS THE INVERSE OF THE FIRST KEYED TRANSFORMATION.