Abstract:
Methods (3500-3695) and apparatus (10, 20) for controlling physical (30, 40) and virtual (12) access for accelerated recognition and processing of privileges, benefits, value transfers, crowd control, community membership and status, in particular for institutions, arenas and other large venues.
Abstract:
A system for multi-factor security involving multiple secure devices that distribute the secured functions of the system over the different devices, such that the loss or theft of any one of them does not compromise the overall security of the system. Moreover, a configuration of devices is also secure even if one of them has been attacked by malicious software agents, such as 'keyboard sniffers'. A novel contactless smart card reader (200) is presented that incorporates a transceiver antenna (220) within a keypad (210) of a device used with contactless smart cards (100). When the card (100) is pressed against the device's keypad (210), the transceiver (220) of the device establishes a session with the smart card (100). A variety of systems are presented, including those using mobile telephones, computer-interfaced card readers, personal digital appliances, and television set-top box remote controllers.
Abstract:
An arrangement, system, and methods for creating and distributing authenticated personal information for users of network services and participants in social surveys, and in chat rooms and other forums. A trusted organization verifies that personal information presented by a user is correct, and authenticates the information in an encapsulated form as 'certified profiles' within a smart card or other secure portable hardware device issued to the user. Certified profiles are authenticated by digital signatures of the trusted organization and the profile users. Personal information in certified profiles can be in raw and/or in statistically-processed and abstracted form, and can be tailored by the user for specific needs to include whatever personal information is required, and to exclude all other personal information. By the use of unique aliases, it is possible for users to anonymously access restricted network sites and participate in surveys, while still satisfying recipients that supplied personal information is accurate, and for surveys that the user has not responded to the same survey more than once. Users enroll for certified profiles via trusted enrollment vendors who market the service to the public and also make hardware and software available to users for managing, maintaining, and distributing the certified profiles.
Abstract:
The invention is a method for communication of information and data between a user holding a token and a wireless handheld communicator and the operator of a venue attended by the user. The communication is specific to the venue and is carried out via a poster. The poster has an attached wireless token and visual indicia printed on the poster. The wireless token is operative to communicate with the wireless handheld communicator and the operator of the venue and operative to transmit data thereto and to receive data therefrom. The wireless token comprises an event specific list of expected users and user attributes. The visual indicia are operative to guide the user to perform a procedure for establishing data transfer between the attached wireless token and the wireless handheld communicator.
Abstract:
A computerized venue management system for managing a venue serving clients, the system comprising a multiplicity of portable computing devices each associated with a loyalty rating representing a client of the venue; a plurality of computerized delivery terminals each capable of communicating with and serving any one of the multiplicity of portable computing devices wherein at least a subset of the plurality of terminals is operative to enable delivery of at least one Loyalty based entitlement to at least one client of the venue and, in conjunction with delivery of the at least one entitlement, to enhance the individual portable computing device's loyalty rating, wherein the entitlement is computed to encourage more even distribution of clients over time by weighting at least one client's entitlement positively as a function of presence of the client's portable computing devices at the venue at times of lesser client attendance.
Abstract:
A personal identification and security system (102) including a personal identification verification system (140, 144, 142, 108, 146), a controlled substance detection and identification system (120, 122, 126) and an alarm indicator responsive to outputs of the personal identification verification system and the controlled substance detection and identification system for providing an alarm indication in response to fulfillment of alarm criteria in at least one of the outputs.
Abstract:
Systems and methods are disclosed, especially designed for very compact hardware implementations, to generate random number strings with a high level of entropy at maximum speed. For immediate deployment of software implementations, certain permutations have been introduced to maintain the same level of unpredictability which is more amenable to hi-level software programming, with a small time loss on hardware execution; typically when hardware devices communicate with software implementations. Particular attention has been paid to maintain maximum correlation immunity, and to maximize non-linearity of the output sequence. Good stream ciphers are based on random generators which have a large number of secured internal binary variables, which lead to the page synchronized stream ciphering. The method for parsed page synchronization which is presented is especially valuable for Internet applications, where occasionally frame sequences are often mixed. The large number of internal variables with fast diffusion of individual bits wherein the masked message is fed back into the machine variables is potentially ideal for message authentication procedures.
Abstract:
Systems and methods are disclosed, especially designed for very compact hardware implementations, to generate random number strings with a high level of entropy at maximum speed. For immediate deployment of software implementations, certain permutations have been introduced to maintain the same level of unpredictability which is more amenable to hi-level software programming, with a small time loss on hardware execution; typically when hardware devices communicate with software implementations. Particular attention has been paid to maintain maximum correlation immunity, and to maximize non-linearity of the output sequence. Good stream ciphers are based on random generators which have a large number of secured internal binary variables, which lead to the page synchronized stream ciphering. The method for parsed page synchronization which is presented is especially valuable for Internet applications, where occasionally frame sequences are often mixed. The large number of internal variables with fast diffusion of individual bits wherein the masked message is fed back into the machine variables is potentially ideal for message authentication procedures.