Abstract:
PROBLEM TO BE SOLVED: To provide an improved transmission method and a device for transmitting quickly and efficiently an information from two or more transmission source devices to a sending end device. SOLUTION: Two or more transmission source devices (110, 120, 130) can transmit an information to a sending end device (100) from the transmission source device. The information transmitted to the sending end device (100) from the transmission source device takes usually a form of an electronic product code ("EPC") of binary digit or an identity ("ID") information. The method utilizes a data scramble and a scramble analysis, a channel selection and a transmission, an effectiveness and an ineffectiveness setting of a group transmission, a correlation determination, and the technique of collision relaxation. COPYRIGHT: (C)2008,JPO&INPIT
Abstract:
PROBLEM TO BE SOLVED: To provide an enhanced communication method and device for speedily and efficiently transmitting information from a plurality of transmission source devices to a transmission destination device. SOLUTION: A communication method and device is disclosed for enabling a plurality of transmission source devices 110, 120, 130 to transmit information to a transmission destination device 100. The information to be transmitted from the transmission source devices to the transmission destination device 100 ordinarily takes a form of an electronic product code "EPC" or identification "ID" information of binary numbers. The method utilizes techniques of data scrambling/descrambling, channel selection/transmission, group transmission validity/invalidity setting, correlative relationship determination and collision mitigation. COPYRIGHT: (C)2008,JPO&INPIT
Abstract:
La comunicación y validación de transferencia de información desde un transmisor hacia un receptor se logra al generar una cifra (400) a partir de un mensaje m (410) utilizando los parámetros de una curva elíptica, un punto generador P (406) en la curva elíptica y una clave pública Q (416) del receptor. La cifra incluye un primer elemento que es el producto kP de un número aleatorio k (404) con el punto generador P y un segundo elemento que es el producto de m y la coordenada x del producto kQ. El mensaje m se genera a partir de dos representaciones matemáticamente independientes de la información y, opcionalmente, un número aleatorio. La cifra se comunica al receptor y se decodifica para recuperar un mensaje m´ (502). Una ficha de validación (500) es generada por el receptor y se le pasa al transmisor, el cual valida la comunicación de la información al receptor si el producto mkQ es igual a la ficha de validación.
Abstract:
Communication and validation of information transfer from a transmitter to a receiver is achieved by generating a cipher (400) from a message m (410) using parameters of an elliptic curve, a generator point P (406) on the elliptic curve and a public key Q (416) of the receiver. The cipher includes a first element that is the product kP of a random number k (404) with the generator point P and a second element that is the product of m and the x-coordinate of the product kQ. The message m is generated from two mathematically independent representations of the information and, optionally, a random number. The cipher is communicated to the receiver and decoded to recover a message m' (502). A validation token (500) is generated by the receiver and passed to the transmitter, which validates communication of the information to the receiver if the product mkQ is equal to the validation token.
Abstract:
A method and device for using a partial public key in a cryptosystem. The cryptosystem may be based on a group, such as an elliptic curve over a finite field. The device includes a first memory for storing system parameters of the cryptosystem and a second memory for storing a portion of a public key of the cryptosystem. The device receives the complete public key, or the remainder of the public key, via communication with another device. The received portion of the public key is used to form a validated public key. A processor of the device uses the validated public key for encrypting messages and/or verifying signatures. The size of the second memory is reduced since only part of the public key is stored.
Abstract:
Authentication is performed to a confidence level (CL) desired by a verifier (220). A prover (210) picks and sends certain same size, square matrices to the verifier (220). A random request bit is sent (234) from the verifier (220) to the prover (210) after the receipt of a certain square matrix. Depending on the request bit, calculations are made (244, 264) by the verifier (220) to determine if the matrices sent from the prover are verifiable. The prover (210) is iteratively authenticated by the verifier (220). Iterations are continued until (320) a count of the iterations (IL) reaches a number sufficient to achieve the desired confidence level (CL). After a delay, more iterations can achieve a higher confidence level by building on previous result of authentication without having to begin at zero. During this delay, the verifier (220) can perform tasks in reliance on the result of authentication.
Abstract:
Methods and system for managing secure access to data by a user in a network are disclosed. The method includes receiving (402, 404) a key and a biometric sample of the user transmitted by a user device (104) at a server (102). The method also includes decrypting (406) an encrypted biometric profile (212) corresponding to the user by using the key, to yield an unencrypted biometric profile. The method further includes authenticating (408) the user by using the biometric sample of the user and the unencrypted biometric profile corresponding to the user. The method further includes discarding (410) the key, the biometric sample of the user, and the unencrypted biometric profile corresponding to the user after authentication.
Abstract:
A communications method and device that enables multiple source devices (110, 120, 130) to communicate information to a destination device (100) is disclosed. The information communicated from any source device to the destination device (100) typically takes the form of binary electronic product codes ("EPC") or identification ("ID") information. The preferred embodiment of the invention utilizes the techniques of: data scrambling and descrambling; channel selection and transmission; enabling and disabling group transmissions; correlation; and collision mitigation.
Abstract:
A method is provided for identifying and verifying a person using hand biometrics with an anti-spoofing measure. The method comprises acquiring (51) a first image (10) of a hand in a first configuration, acquiring (52) a second image (30, 40) of the hand in one of the first and a second configuration for comparison with the first image (10), determining (52) whether a person can be identified from at least one of the first image (10) and the second image (30, 40), and determining (55) from a comparison of the second image (30, 40) with the first image (10) whether the hand is a counterfeit.