Abstract:
"método e equipamento para segurança em um sistema de processamento de dados". método e equipamento para transmissões seguras. cada usuário recebe uma chave de registro. uma chave de broadcast atualizada de longo prazo é encriptada usando-se a chave de registro e é provida periodicamente a um usuário. uma chave atualizada a curto prazo é encriptada usando-se a chave de broadcast e provida periodicamente a um usuário. difusões são então encriptadas usando-se a chave de curto prazo, em que o usuário decripta a mensagem de broad-cast usando a chave de curto prazo.
Abstract:
A method of authenticating anonymous users while reducing potential for "middleman" fraud includes the step of constructing a puzzle in response to information received from a software user. The puzzle includes the received information. The puzzle is sent to the user by a software provider. The user solves the puzzle and returns the solution to the provider. The puzzle includes a portion of a value derived from an encrypted "cookie" and an exponentiation of the derived value. The cookie includes information about the user.
Abstract:
A system and method for digital tickets. An issuer provides a digital ticket to a portable wireless devices such as a sonic token, e.g., acoustic key fob or wireless telephone. The ticket can include a ticket index that may be encrypted. When entry is desired into an entity (such as a movie theater) whose access is controlled by a verifier, a user manipulates the token to wirelessly (e.g., acoustically) transmit the ticket index to the verifier, which grants access if the ticket is valid and has not previously been used or voided.
Abstract:
A method of authenticating anonymous users while reducing potential for "middleman" fraud includes the step of constructing a puzzle in response to information received from a software user. The puzzle includes the received information. The puzzle is sent to the user by a software provider. The user solves the puzzle and returns the solution to the provider. The puzzle includes a portion of a value derived from an encrypted "cookie" and an exponentiation of the derived value. The cookie includes information about the user.
Abstract:
A method for constructing keyed integer permutations over the set Z N . where N can be factored into p and q, or N can be prime. N bits are permuted by deriving a keyed permutation of representative indices. When N is factorable into p and q, the set of indices are divided into two portions. The portions undergo iterative processing called "rounds," and in each round, a first half-round function operates on the first portion to form a first half-round value; the first half-round value and the second portion are added together by a modulo-p adder to form a first output value; a second half-round function operates on the second portion to form a second half-round value; and the second half-round value and the first portion are added together by a modulo-q adder to form a second output value. In this manner, outputs of the rounds are reordered. If N is prime and not less than 13, then N is separated into composite values s and t, and two sets are formed with s and t elements, respectively. Each set is then permuted using the method for when N is not prime. At the end of each round, the two blocks are combined using a mixing operation.
Abstract:
A method of authenticating anonymous users while reducing potential for "middleman" fraud includes the step of constructing a puzzle in response to information received from a software user. The puzzle includes the received information. The puzzle is sent to the user by a software provider. The user solves the puzzle and returns the solution to the provider. The puzzle includes a portion of a value derived from an encrypted "cookie" and an exponentiation of the derived value. The cookie includes information about the user.
Abstract:
A method of authenticating anonymous users while reducing potential for "middleman" fraud includes the step of constructing a puzzle in response to information received from a software user. The puzzle includes the received information. The puzzle is sent to the user by a software provider. The user solves the puzzle and returns the solution to the provider. The puzzle includes a portion of a value derived from an encrypted "cookie" and an exponentiation of the derived value. The cookie includes information about the user.