Abstract:
A method and system for registering a user device in a domain of a domain authority (106) using biometric information is provided. The method includes sending (402) a request (by the user device) to the domain authority for joining the domain. The user device making the request is then authenticated (400) and the biometric information of the user is then requested (406). Further, the method includes authenticating (412) the biometric information of the user. The security information of the domain is transferred (414) to the user device once the authentication of the user device and the biometric information are both successful.
Abstract:
A communications method and device that enables multiple source devices (110, 120, 130) to communicate information to a destination device (100) is disclosed. The information communicated from any source device to the destination device (100) typically takes the form of binary electronic product codes ('EPC') or identification ('ID') information. The preferred embodiment of the invention utilizes the techniques of: data scrambling and descrambling; channel selection and transmission; enabling and disabling group transmissions; correlation; and collision mitigation.
Abstract:
The identity of a user of a mobile device (300) is verified (220) by the mobile device accessing the location of the mobile device over recent time to obtain a current route, comparing (212) a feature of the current route to characteristic features of previous routes stored on the mobile device. The user is verified if the feature of the current route matches a characteristic feature of previous routes. The previous routes may be obtained by tracking the location of the mobile device over time to obtain a number of routes, identifying characteristic features of the routes, and storing the characteristic features of the routes.
Abstract:
A method and device for using a partial public key in a cryptosystem. The cryptosystem may be based on a group, such as an elliptic curve over a finite field. The device includes a first memory for storing system parameters of the cryptosystem and a second memory for storing a portion of a public key of the cryptosystem. The device receives the complete public key, or the remainder of the public key, via communication with another device. The received portion of the public key is used to form a validated public key. A processor of the device uses the validated public key for encrypting messages and/or verifying signatures. The size of the second memory is reduced since only part of the public key is stored.
Abstract:
The identity of a user of a mobile device (300) is verified (220) by the mobile device accessing the location of the mobile device over recent time to obtain a current route, comparing (212) a feature of the current route to characteristic features of previous routes stored on the mobile device. The user is verified if the feature of the current route matches a characteristic feature of previous routes. The previous routes may be obtained by tracking the location of the mobile device over time to obtain a number of routes, identifying characteristic features of the routes, and storing the characteristic features of the routes.
Abstract:
Methods and system for managing secure access to data by a user in a network are disclosed. The method includes receiving (402, 404) a key and a biometric sample of the user transmitted by a user device (104) at a server (102). The method also includes decrypting (406) an encrypted biometric profile (212) corresponding to the user by using the key, to yield an unencrypted biometric profile. The method further includes authenticating (408) the user by using the biometric sample of the user and the unencrypted biometric profile corresponding to the user. The method further includes discarding (410) the key, the biometric sample of the user, and the unencrypted biometric profile corresponding to the user after authentication.
Abstract:
In order to address the need for detection of fraudulent items, a method, apparatus, and system for detection of fraudulent items is provided herein. Special anti-forgery Radio-Frequency identification (RFID) tags are utilized with additional measures to thwart would-be forgers. Each anti-forgery RFID tag comprises a unique, or semi-unique number that, along with a private key possessed by only the legitimate product manufacturer, determines a signature that is preferably printed on the product packaging. Utilizing the unique number on the anti-forgery RFID and a public key corresponding to the private key, the signature is verified by standard public-key cryptographic methods. The validation of the signature identifies the product's authenticity.
Abstract:
A communications method and device that enables multiple source devices (110, 120, 130) to communicate information to a destination device (100) is disclosed. The information communicated from any source device to the destination device (100) typically takes the form of binary electronic product codes ("EPC") or identification ("ID") information. The preferred embodiment of the invention utilizes the techniques of: data scrambling and descrambling; channel selection and transmission; enabling and disabling group transmissions; correlation; and collision mitigation.
Abstract:
A communications method and device that enables multiple source devices (110, 120, 130) to communicate information to a destination device (100) is disclosed. The information communicated from any source device to the destination device (100) typically takes the form of binary electronic product codes ("EPC") or identification ("ID") information. The preferred embodiment of the invention utilizes the techniques of: data scrambling and descrambling; channel selection and transmission; enabling and disabling group transmissions; correlation; and collision mitigation.