Abstract:
A data integrity system including a transmitter, having a TX pseudorandom function generator, a TX switching function having a transmitting option and a TX combiner operative to receive, from a Host, an initialization data entity including at least one word, [TA1], in an initialization phase, to receive, during normal operation, two data entities of interest each including at least one data word of interest [TA2] and [TA3] respectively; to receive a first data entity including at least one word [TC1] comprising a randomized data entry, from the TX pseudorandom function generator, to generate a first XOR sum of the initialization data entity's word [TA1] and the at least one randomized data entity [TC1], in at least one iteration of an initialization phase; and, during normal operation, to generate and to output a second XOR sum [TA2 ? TC2 = TB2] and a third XOR sum [TA3 ? TC3 = TB3], wherein TB2 and TB3 are randomized data entities, wherein the words TA1, TA2 and TA3 are operative to initialize the data integrity system including enabling the data integrity system to encrypt the TA2 word and to generate an identifying hash value output using the TA3 word.
Abstract:
An arrangement, system, and methods for creating and distributing authenticated personal information for users of network services and participants in social surveys, and in chat rooms and other forums. A trusted organization verifies that personal information presented by a user is correct, and authenticates the information in an encapsulated form as "certified profiles" within a smart card or other secure portable hardware device issued to the user. Certified profiles are authenticated by digital signatures of the trusted organization and the profile users. Personal information in certified profiles can be in raw and/or in statistically-processed and abstracted form, and can be tailored by the user for specific needs to include whatever personal information is required, and to exclude all other personal information. By the use of unique aliases, it is possible for users to anonymously access restricted network sites and participate in surveys, while still satisfying recipients that supplied personal information is accurate, and for surveys that the user has not responded to the same survey more than once. Users enroll for certified profiles via trusted enrollment vendors who market the service to the public and also make hardware and software available to users for managing, maintaining, and distributing the certified profiles.
Abstract:
A system for multi-factor security involving multiple secure devices that distribute the secured functions of the system over the different devices, such that the loss or theft of any one of them does not compromise the overall security of the system. Moreover, a configuration of devices is also secure even if one of them has been attacked by malicious software agents, such as "keyboard sniffers". A novel contactless smart card reader (200) is presented that incorporates a transceiver antenna (220) within a keypad (210) of a device used with contactless smart cards (100). When the card (100) is pressed against the device's keypad (210), the transceiver (220) of the device establishes a session with the smart card (100). A variety of systems are presented, including those using mobile telephones, computer-interfaced card readers, personal digital appliances, and television set-top box remote controllers.
Abstract:
An arrangement, system, and methods for creating and distributing authenticated personal information for users of network services and participants in social surveys, and in chat rooms and other forums. A trusted organization verifies that personal information presented by a user is correct, and authenticates the information in an encapsulated form as "certified profiles" within a smart card or other secure portable hardware device issued to the user. Certified profiles are authenticated by digital signatures of the trusted organization and the profile users. Personal information in certified profiles can be in raw and/or in statistically-processed and abstracted form, and can be tailored by the user for specific needs to include whatever personal information is required, and to exclude all other personal information. By the use of unique aliases, it is possible for users to anonymously access restricted network sites and participate in surveys, while still satisfying recipients that supplied personal information is accurate, and for surveys that the user has not responded to the same survey more than once. Users enroll for certified profiles via trusted enrollment vendors who market the service to the public and also make hardware and software available to users for managing, maintaining, and distributing the certified profiles.
Abstract:
A computerized venue management system for managing a venue serving clients, the system comprising a multiplicity of portable computing devices each associated with a loyalty rating representing a client of the venue; a plurality of computerized delivery terminals each capable of communicating with and serving any one of the multiplicity of portable computing devices wherein at least a subset of the plurality of terminals is operative to enable delivery of at least one Loyalty based entitlement to at least one client of the venue and, in conjunction with delivery of the at least one entitlement, to enhance the individual portable computing device's loyalty rating, wherein the entitlement is computed to encourage more even distribution of clients over time by weighting at least one client's entitlement positively as a function of presence of the client's portable computing devices at the venue at times of lesser client attendance.
Abstract:
A system for multi-factor security involving multiple secure devices that distribute the secured functions of the system over the different devices, such that the loss or theft of any one of them does not compromise the overall security of the system. Moreover, a configuration of devices is also secure even if one of them has been attacked by malicious software agents, such as "keyboard sniffers". A novel contactless smart card reader is presented that incorporates a transceiver antenna within a keypad of a device used with contactless smart cards. When the card is pressed against the device's keypad, the transceiver of the device establishes a session with the smart card. This configuration is very easy to use, because precise alignment of the smart card and the reader is not required. Moreover, the close proximity of the smart card and the antenna in the device reduces radio frequency power requirements, conserves battery power, and allows maximum power utilization by the smart card, for performing complex cryptographic calculations. A variety of systems are presented, including those using mobile telephones, computer-interfaced card readers, personal digital appliances, and television set-top box remote controllers.
Abstract:
A computerized venue management system for managing a venue serving clients, the system comprising a multiplicity of portable computing devices each associated with a loyalty rating representing a client of the venue; a plurality of computerized delivery terminals each capable of communicating with and serving any one of the multiplicity of portable computing devices wherein at least a subset of the plurality of terminals is operative to enable delivery of at least one Loyalty based entitlement to at least one client of the venue and, in conjunction with delivery of the at least one entitlement, to enhance the individual portable computing device's loyalty rating, wherein the entitlement is computed to encourage more even distribution of clients over time by weighting at least one client's entitlement positively as a function of presence of the client's portable computing devices at the venue at times of lesser client attendance.
Abstract:
A data integrity system including a transmitter, having a TX pseudorandom function generator, a TX switching function having a transmitting option and a TX combiner operative to receive, from a Host, an initialization data entity including at least one word, [TA1], in an initialization phase, to receive, during normal operation, two data entities of interest each including at least one data word of interest [TA2] and [TA3] respectively; to receive a first data entity including at least one word [TC1] comprising a randomized data entry, from the TX pseudorandom function generator, to generate a first XOR sum of the initialization data entity's word [TA1] and the at least one randomized data entity [TC1], in at least one iteration of an initialization phase; and, during normal operation, to generate and to output a second XOR sum [TA2 ⊕ TC2 = TB2] and a third XOR sum [TA3 ⊕ TC3 = TB3], wherein TB2 and TB3 are randomized data entities, wherein the words TA1, TA2 and TA3 are operative to initialize the data integrity system including enabling the data integrity system to encrypt the TA2 word and to generate an identifying hash value output using the TA3 word.