摘要:
A software application installation method installs a software application on a device such that the installed application can only be activated on said device. Thereto, an authorization application is installed as well on the device. During installation, the authorization application generates a software release code that is stored in a first and a second memory location, of which at least one is a memory location not accessible to a user. When the software application is later activated on the device, the authorization application compares the software release codes stored in said two memory locations. The application is only started if the software release codes correspond. Further, an authorization verification method is disclosed. A second party may verify the legitimacy of the installed application by storing device specific identification data and application specific installation data when a first connection is established and later comparing said data if a second or further connection is established.
摘要:
A product, such as a credit card, passport, or bank note, is secured against forgery or fraud by the provision of a unique pattern of overlying individual fibers which are embedded in a transparent base material, and such that the fibers form differing geometrical configurations which are optically scannable through a surface of the transparent base material. The product is thus made unique and impossible to forge, and its authenticity may be verified by initially scanning the geometrical configurations, with the scanned information being converted into digital data which may be compressed and encrypted, and then stored in a permanent memory. Following the distribution of the product, an inspector may scan the product and compare the obtained data with the stored data to thereby verify the authenticity of the product.
摘要:
A device for determining from one or more different directions the geometrical pattern of a mark being randomly shaped in three dimensions and being embedded in a transparent material and securely fixed to an object. A radiation source is designed to emit radiation to a matrix of radiation detectors. The object is placed with the mark in the path of the radiation for projecting a silhouette of the mark onto the matrix of radiation detectors by the radiation sources.
摘要:
Device for the protected storage of objects, comprising a closable container having an electrical security shield enclosing a storage space, damaging means (10) for rendering the objects useless, and means (4) for feeding in from the outside a command which disables the damaging means (10), the security shield comprising one or more electrical systems which at least togther extend over essentially the entire surface of the shield and which cooperate with a processing circuit (14) which detects an electrical parameter of each system, and which is capable of delivering an activation command to the damaging means (10) when a detected parameter value deviates from a reference value.
摘要:
An object or document, such as a credit card, passport, or bank note, is secured against forgery or fraud by the provision of a unique pattern of overlying individual fibers which are embedded in a sheet of transparent base material, and such that the fibers form geometrical configurations which are optically scannable through a surface of the transparent base material. The object or document is thus made unique and impossible to forge, and its authenticity may be verified by initially scanning the geometrical configurations with the scanned information being converted into digital data which may be compressed and encrypted, and then stored in a permanent memory. Following the distribution of the object or document, an inspector may scan the object or document and compare the obtained data with the stored date to thereby verify the authenticity of the object or document.
摘要:
In a method for performing an electronic transaction a first transaction part generates a digital signature and an encrypted digital signature. The second transaction party receives both signatures. The second party is enabled to verify the digital signature, but cannot verify or (re)generate the encrypted digital signature. A trusted third party is enabled to verify the encrypted digital signature if the digital signature is also provided, since the trusted third party cannot (re)generate the digital signature. Thus, no other party than the first transaction party can (re)generate both the digital signature and the encrypted digital signature. Therefore, no other party presenting himself as the first transaction party can be verified as being the first transaction party.
摘要:
In a method and system for identifying one or more objects, a two-dimensional, optically readable pattern and an identification code are generated. The pattern and the identification code are paired in one-to-one correspondence by means of a predetermined algorithm and are arbitrary. A two-dimensional representation of the pattern is provided on the object or on a pattern support connected thereto. The identification code is stored together with associated identification information. In order to identify the object, the representation of the pattern thereof is optically scanned and the associated identification code determined, by means of which the identification information can be determined.
摘要:
A method for performing an electronic transaction is disclosed. The method provides authentication data and authentication software to an electronic device and preferably stored in a secure storage location or other location inaccessible to the user or the operating system of the device. When digital data is requested from a transaction party that requests a digital signature, the authentication software is activated to generate said digital signature from the authentication data. Next, the digital signature is provided to the other transaction party, which then provides the requested digital data. The digital signature may be embedded in the requested and provided digital data. Further, a method for performing a verification of legitimate use of digital data is disclosed. Digital data digitally signed according to the present invention may only be accessed if the embedded digital signature is identical to a regenerated digital signature that is regenerated by the authentication software, using user inaccessible authentication data installed on the device. If the embedded and regenerated digital signatures are not identical, the data may not be accessed and an error signal is generated.
摘要:
A method for performing an electronic transaction is disclosed. The method provides authentication data and authentication software to an electronic device and preferably stored in a secure storage location or other location inaccessible to the user or the operating system of the device. When digital data is requested from a transaction party that requests a digital signature, the authentication software is activated to generate said digital signature from the authentication data. Next, the digital signature is provided to the other transaction party, which then provides the requested digital data. The digital signature may be embedded in the requested and provided digital data. Further, a method for performing a verification of legitimate use of digital data is disclosed. Digital data digitally signed according to the present invention may only be accessed if the embedded digital signature is identical to a regenerated digital signature that is regenerated by the authentication software, using user inaccessible authentication data installed on the device. If the embedded and regenerated digital signatures are not identical, the data may not be accessed and an error signal is generated.
摘要:
A device for rinsing objects has a holder (1) for supporting an object (4) to be cleaned, two passages (8, 9) at opposite sides of the object situated in the holder in operation, and two reservoirs (10, 11) for holding rinsing liquid (18), a first reservoir (10) communicating with a first passage (8) and a second reservoir (11) communicating with a second passage (9), and at least the first reservoir (10) having a variable volume.