摘要:
A monitoring system for a corporate network includes a client that exchanges information with a target server to establish an SSL communication channel through which cryptographically protected data is exchanged between the client and the target server using an SSL protocol and a monitoring server through which the cryptographically protected data is routed as part of its exchange between the client and the target server. The client sends enabling data to the monitoring server that enables the monitoring server to read the cryptographically protected data received at the monitoring server as decoded cryptographically protected data. The monitoring server also analyzes the decoded cryptographically protected data to determine if it is suspect data, and at times when the monitoring data determines that the decoded cryptographically protected data is suspect data the monitoring server prevents the transmission of the cryptographically protected data between the client and the target server.
摘要:
A system and method are described for establishing and managing a vendor inventory of emergency business supplies for a business. The vendor is compensated for costs of maintaining the inventory. The business supplies are released periodically, for discount sale, after they have been in the vendor inventory for a period of time expiring when a release condition occurs. The vendor inventory is then restocked, and the vendor is compensated at least partially for the discount provided in the discount sale.
摘要:
An electronic voting system includes a vote security device (VSD), a user interface for presenting a ballot to a voter, and an audit trail printer operatively coupled to the VSD. The printer prints an audit trail ballot only in response to verifying encrypted and/or digitally signed messages received from the VSD that indicates the voter's ballot selections. The printer is structured to allow the voter to view but not access the audit trail ballot. The voter is able to accept or reject the audit trail ballot using the user interface. If the ballot is rejected, the VSD causes the printer to print a rejection indicator on the ballot, and if the voter accepts the ballot, the VSD causes the printer to print an acceptance indicator on the ballot. A digitally signed record of the voter's ballot selections is generated and stored.
摘要:
A method and system for generating and printing an indicium, such as a postal indicium, on an object such as a mail piece. Other printed material, such as an address block, on the object is scanned, and the scanned image is processed to abstract characterizing information descriptive of the other printed material. Alternatively, the image to be processed can be obtained by filtering the original image wit a print/scan filter which simulates printing and scanning processes. The characterizing information can be text-based or image-based. Image-based characterizing information can be measurements of word lengths, counts of outliers in images of characters, or descriptions of the shape of the other printed material. The characterizing information is combined with other information, such as postal information and the combined information is then cryptographically authenticated with a digital signature or the like. An indicium representative of the authenticated information is then printed on the object. The object's relationship to the indicium can be verified by regenerating the characterizing information from the other printed material and comparing the regenerated characterizing information with characterizing information recovered from the indicium. Thus, copies of the indicium cannot easily be used, without detection, on other objects which do not include the other printed material.
摘要:
A method and system for generating and printing an indicium, such as a postal indicium, on an object such as a mail piece. A digital image of other printed material, such as an address block, on the object is obtained, and the image is processed to abstract characterizing information descriptive aspects of the other printed material. The aspects can be measurements of word lengths, counts of outliers in images of characters, or descriptions of the shape of the other printed material. The characterizing information is combined with other information, such as postal information, and the combined information is then cryptographically authenticated with a digital signature or the like. An indicium representative of the authenticated information is then printed on the object. The object's relationship to the indicium can be verified by regenerating the characterizing information from the other printed material and comparing the regenerated characterizing information with characterizing information recovered from the indicium. Thus, copies of the indicium cannot easily be used, without detection, on other objects which do not include the other printed material.
摘要:
A method, and deterministic random bit generator system operating in accordance with the method, for generating cryptographic keys and similar secret cryptographic inputs which are hard to guess. A seed is input from an entropy source; and an initial state is generated as a function of the seed. When a request to generate a cryptographic key is received a current state, where the current state is initially the initial state, is mixed to generate an out put string and a next state and the current state is set to the next state. The requested cryptographic key is generated from the string; and output. These steps can be repeated to generate successive output strings with assurance of forward and backward secrecy. An encryption system including such a generator is also disclosed.
摘要:
A method and deterministic random bit generator system operating in accordance with the method, for generating cryptographic keys and similar secret cryptographic inputs which are hard to guess. A entropy is input from an entropy source; and an initial seed is generated as a function of the entropy input. When a request to generate a cryptographic key is received a temporary seed is generated by applying the function to the seed. The requested cryptographic key is generated by applying a second function to the temporary seed; and output. A new seed is then generated by applying a third function to the temporary seed. In one embodiment of the subject invention all three functions are carried out by applying the same operator to appropriate inputs. In another embodiment of the subject invention new entropy is incorporated into the seed from time to time.
摘要:
A method includes scanning a check to generate image data representative of an image of the check. The method further includes detecting at least one security feature of the check. The method also includes transforming the image data to include at least one encoded indication of the detected at least one security feature of the check.
摘要:
A method of enabling a voter to vote by mail by using a secret vote code (SVC) that includes translating the SVC into a one-time code (OTC) valid only for the election, storing the OTC, and mailing to the voter a ballot, a return envelope, and a mechanism for enabling the SVC to be translated into a translated format. Further, the method includes receiving the return envelope from the voter that includes a completed ballot, the voter's signature, and the translated format, determining whether the signature obtained from the envelope matches a stored signature for the voter, obtaining a second one-time code based on the translated format and determining whether the second one-time code matches the stored one-time code. The ballot is counted only if it is determined that: (i) the signatures match, and (ii) the second one-time code matches the stored one-time code.
摘要:
A vote-by-mail return envelope that includes a pouch portion for containing the ballot and a stub portion on which the voter applies his/her signature and method for processing are provided. Each portion of the envelope contains a respective barcode that identifies the respective portion. When the envelope is received at the vote-counting location, the stub is separated from the pouch, thereby separating the voter's signature, name, etc. from the ballot. The signature is then verified from the stub, and subsequent processing of the pouch uses the pouch barcode identifier as a link to the stub barcode identifier and/or to the result of the signature verification, to determine whether the ballot in the pouch is eligible for counting or whether some remedial procedure is necessary.