Abstract:
Method and apparatus for error concealment in an image allowing to conceal an error area in the image with estimated pixels. A first boundary section and a second boundary section adjacent to the error area is determined and correspondences between the boundary elements of the boundary sections are established using non-linear alignment operations. After establishing the correspondences pixels between respective boundary elements of the first boundary section and the second boundary section are estimated. The non-linear alignment operations may include dynamic programming techniques, including Needleman-Wunsch techniques, wherein a similarity measure is used for a matrix fill operation.
Abstract:
A method for authentication of a user towards a unit (AR1) is described that uses unique biometric data of the user but avoids spreading of the sensitive biometric data. The method overcomes the problem of the lack of trustworthiness of a client (C1) operated by a user and the lack of trustworthinessof a unit (AR1) operate d by an institution offering services or goods introducing an authentication instance (AI1) operated by a third party that is trusted by both the user operating the client (C1) and the institution operating the unit. According to the invented method the responsability for the secure handling of the sensitive biometric data is taken from the institution operating the unit (AR1) requesting authentication and given to a trusted third party organization operating an authentication instance (AI1). The authentication instance (AI1) stores the sensitive biometric data and performs the authentication based on a pattern matching of a prestored pattern of biometric data and a pattern of biometric data recorded by the user.
Abstract:
For control of access of personal information in accordance with a privacy policy defined for a service provider, a method is disclosed, wherein the method comprises the steps of providing service provider request data from a service provider to an end user device, the service provider request data being indicative of personal information of a user of the end user device to be accessed by the service provider, providing to the service provider first user data including at least one of personal information of the user as requested by the service provider or rejections of personal information requested by the service provider, creating privacy receipt data including the first user data and data being indicative of the service provider, and providing the privacy receipt data to the end user device.
Abstract:
A method for linking of a first characteristic of a first device (PP1,PP2) and a second characteristic of a second device (NP1,NP2) by a server (S1,AS2) is disclosed. The method comprises the steps of selecting (75) a first linking information and a second linking information, the first linking information matching to the second linking information, sending (100,150) from the server (S1,AS2) the first linking information to the first device (PP1,PP2) and the second linking information to the second device (NP1,NP2), presenting (200,250) by the first device (PP1,PP2) the first linking information and by the second device (NP1,NP2) the second linking information, entering (300) into the first device (PP1,PP2) an indication of the matching of the first linking information and the second linking information, and based on the entered indication of the matching, sending (400) to the server (S1,AS2) a matching confirmation for confirming the matching to the server (S1,AS2), and associating (450) the first characteristic and the second characteristic based on the received matching confirmation.
Abstract:
The method involves selecting a first linking data and a second linking data matching the first linking data, sending from a server the first linking data to a first device and the second linking data to a second device, and presenting by the first device the first linking data and by the second device the second linking data. The method further involves entering into the first device an indication of the matching of the first and second linking data, and based on the entered indication, sending to the server a matching confirmation for confirming the matching to the server, and associating the characteristics of the devices based on the received matching confirmation. Independent claims are also included for the following ; (1) a server for linking characteristics of devices. (2) stored software.
Abstract:
A method for the authorization of transactions is described, wherein a user equipment receives an authorization request with an identifier of a transaction and replies to the request with an authorization response. For an authorization request, an indication is determined which is output by the user equipment (UE). Preferably, the identifier is a hash value of the content which is to be authorized. After an input to approve or disapprove the authorization request, the identifier (H) is signed and the authorization response according to the input is sent, wherein an approving authorization response comprises the signed identifier (H). Devices and software programs adapted to the method are also described.
Abstract:
A method for provision of access for a data requesting entity (IRE) to data related to a principal is disclosed, comprising the steps of (i) creating an access granting ticket comprising an access specification specifying a permission for an access to data related to the principal, said data being available at a data providing entity (IPE1), and a principal identifier representing the principal towards the data providing entity (IPE1), (ii) encrypting the access granting ticket with an encryption key of the data providing entity (IPE1), (iii) communicating to the data requesting entity (IRE) the encrypted access granting ticket accompanied by an identifier of the data providing entity (IPE1), (iv) communicating from the data requesting entity (IRE) to the data providing entity (IPE1) a request comprising the encrypted access granting ticket, (v) decrypting the encrypted access granting ticket with a decryption key of the data providing entity (IPE1) corresponding to the encryption key, (vi) providing to the data requesting entity (IRE) access to data related to the principal identifier according to the access specification.
Abstract:
The invention relates to a method for providing information related to a client (C) to a first web server (WS1). The invention further relates to a proxy server, a program unit loadable into a proxy server, a web server, and a program unit loadable into a web server, all of them to perform the invented method. A second web server (WS2) stores the information related to the client (C), and the first web server (WS1) is connected to the client (C) via a proxy server (PS). The proxy server stores a cookie for the first web server (WS1), the cookie being related to the client (C) and the cookie comprising a network address of the second web server (WS2). The client (C) sends a message towards the first web server (WS1) via the proxy server (PS). The message is received in the proxy server (PS), that inserts the cookie into the message, and forwards the message to the first web server (WS1). The first web server (WS1) receives the message, retrieves the network address of the second web server (WS2) from the cookie, and requests the second web server (WS2) for the information related to the client (C). The second web server (WS2) sends information related to the client (C) to the first web server (WS1).
Abstract:
A method for authentication of a user towards a unit (AR1) is described that uses unique biometric data of the user but avoids spreading of the sensitive biometric data. The method overcomes the problem of the lack of trustworthiness of a client (C1) operated by a user and the lack of trustworthiness of a unit (AR1) operated by an institution offering services or goods introducing an authentication instance (AI1) operated by a third party that is trusted by both the user operating the client (C1) and the institution operating the unit. According to the invented method the responsibility for the secure handling of the sensitive biometric data is taken from the institution operating the unit (AR1) requesting authentication and given to a trusted third party organization operating an authentication instance (AI1). The authentication instance (AI1) stores the sensitive biometric data and performs the authentication based on a pattern matching of a prestored pattern of biometric data and a pattern of biometric data recorded by the user.
Abstract:
A method for the authorization of transactions is described, wherein a user equipment receives an authorization request with an identifier of a transaction and replies to the request with an authorization response. For an authorization request, an indication is determined which is output by the user equipment (UE). Preferably, the identifier is a hash value of the content which is to be authorized. After an input to approve or disapprove the authorization request, the identifier (H) is signed and the authorization response according to the input is sent, wherein an approving authorization response comprises the signed identifier (H). Devices and software programs adapted to the method are also described.