SOFTWARE ACTIVATION CONTROL METHOD
    1.
    发明申请
    SOFTWARE ACTIVATION CONTROL METHOD 审中-公开
    软件激活控制方法

    公开(公告)号:US20090031430A1

    公开(公告)日:2009-01-29

    申请号:US11913834

    申请日:2005-05-13

    IPC分类号: G06F21/22

    CPC分类号: G06F21/123 G06F21/121

    摘要: A software application installation method installs a software application on a device such that the installed application can only be activated on said device. Thereto, an authorization application is installed as well on the device. During installation, the authorization application generates a software release code that is stored in a first and a second memory location, of which at least one is a memory location not accessible to a user. When the software application is later activated on the device, the authorization application compares the software release codes stored in said two memory locations. The application is only started if the software release codes correspond. Further, an authorization verification method is disclosed. A second party may verify the legitimacy of the installed application by storing device specific identification data and application specific installation data when a first connection is established and later comparing said data if a second or further connection is established.

    摘要翻译: 软件应用程序安装方法在设备上安装软件应用程序,以便只能在所述设备上激活已安装的应用程序。 此外,在设备上也安装了授权应用程序。 在安装期间,授权应用程序生成存储在第一和第二存储器位置的软件版本代码,其中至少一个是用户不可访问的存储器位置。 当软件应用程序稍后在设备上被激活时,授权应用程序比较存储在所述两个存储单元中的软件释放代码。 该应用程序仅在软件版本代码对应时启动。 此外,公开了授权验证方法。 第二方可以在建立第一连接时存储设备特定的识别数据和特定于应用的安装数据来验证所安装的应用的合法性,并且如果建立了第二或另外的连接,则稍后对所述数据进行比较。

    System and method of verifying the legitimacy of a product against
forgery
    2.
    发明授权
    System and method of verifying the legitimacy of a product against forgery 失效
    验证产品的合法性的伪造制度和方法

    公开(公告)号:US5719939A

    公开(公告)日:1998-02-17

    申请号:US290207

    申请日:1994-08-15

    申请人: Teunis Tel

    发明人: Teunis Tel

    摘要: A product, such as a credit card, passport, or bank note, is secured against forgery or fraud by the provision of a unique pattern of overlying individual fibers which are embedded in a transparent base material, and such that the fibers form differing geometrical configurations which are optically scannable through a surface of the transparent base material. The product is thus made unique and impossible to forge, and its authenticity may be verified by initially scanning the geometrical configurations, with the scanned information being converted into digital data which may be compressed and encrypted, and then stored in a permanent memory. Following the distribution of the product, an inspector may scan the product and compare the obtained data with the stored data to thereby verify the authenticity of the product.

    摘要翻译: 通过提供嵌入在透明基材中的单独纤维的独特图案,使得产品(例如信用卡,护照或钞票)被防止伪造或欺诈,并且使得纤维形成不同的几何构造 其通过透明基材的表面可光扫描。 因此,该产品是独一无二的并且不可能伪造,并且其真实性可以通过初始扫描几何构型来验证,扫描的信息被转换成可压缩和加密的数字数据,然后存储在永久存储器中。 在产品分发之后,检查员可以扫描产品并将获得的数据与存储的数据进行比较,从而验证产品的真实性。

    Device for the protected storage of objects
    4.
    发明授权
    Device for the protected storage of objects 失效
    用于受保护存储对象的设备

    公开(公告)号:US4942831A

    公开(公告)日:1990-07-24

    申请号:US265136

    申请日:1988-09-23

    申请人: Teunis Tel

    发明人: Teunis Tel

    IPC分类号: E05G1/00 E05G1/10 E05G1/14

    CPC分类号: E05G1/10 E05G1/14

    摘要: Device for the protected storage of objects, comprising a closable container having an electrical security shield enclosing a storage space, damaging means (10) for rendering the objects useless, and means (4) for feeding in from the outside a command which disables the damaging means (10), the security shield comprising one or more electrical systems which at least togther extend over essentially the entire surface of the shield and which cooperate with a processing circuit (14) which detects an electrical parameter of each system, and which is capable of delivering an activation command to the damaging means (10) when a detected parameter value deviates from a reference value.

    Security of objects or documents
    5.
    发明授权
    Security of objects or documents 失效
    对象或文件的安全

    公开(公告)号:US5354097A

    公开(公告)日:1994-10-11

    申请号:US955711

    申请日:1992-12-15

    申请人: Teunis Tel

    发明人: Teunis Tel

    摘要: An object or document, such as a credit card, passport, or bank note, is secured against forgery or fraud by the provision of a unique pattern of overlying individual fibers which are embedded in a sheet of transparent base material, and such that the fibers form geometrical configurations which are optically scannable through a surface of the transparent base material. The object or document is thus made unique and impossible to forge, and its authenticity may be verified by initially scanning the geometrical configurations with the scanned information being converted into digital data which may be compressed and encrypted, and then stored in a permanent memory. Following the distribution of the object or document, an inspector may scan the object or document and compare the obtained data with the stored date to thereby verify the authenticity of the object or document.

    摘要翻译: PCT No.PCT / NL91 / 00098 Sec。 371日期:1992年12月15日 102(e)日期1992年12月15日PCT提交1991年6月14日PCT公布。 第WO91 / 19614号公报 1991年12月26日。对象或文件,如信用卡,护照或银行券,通过提供嵌入在透明基板片上的单独纤维的独特图案来防范伪造或欺诈 材料,并且使得纤维形成通过透明基材的表面可光扫描的几何构型。 因此,该对象或文档是唯一的且不可能伪造的,并且其真实性可以通过初始扫描几何配置来验证,其中扫描的信息被转换成可压缩和加密的数字数据,然后存储在永久存储器中。 在分发对象或文档之后,检查员可以扫描对象或文档,并将获得的数据与存储的日期进行比较,从而验证对象或文档的真实性。

    Transaction method and verification method
    6.
    发明申请
    Transaction method and verification method 审中-公开
    交易方式和验证方法

    公开(公告)号:US20090119505A1

    公开(公告)日:2009-05-07

    申请号:US11913748

    申请日:2005-05-10

    IPC分类号: G06F1/00

    摘要: In a method for performing an electronic transaction a first transaction part generates a digital signature and an encrypted digital signature. The second transaction party receives both signatures. The second party is enabled to verify the digital signature, but cannot verify or (re)generate the encrypted digital signature. A trusted third party is enabled to verify the encrypted digital signature if the digital signature is also provided, since the trusted third party cannot (re)generate the digital signature. Thus, no other party than the first transaction party can (re)generate both the digital signature and the encrypted digital signature. Therefore, no other party presenting himself as the first transaction party can be verified as being the first transaction party.

    摘要翻译: 在执行电子交易的方法中,第一交易部分生成数字签名和加密的数字签名。 第二个交易方收到两个签名。 第二方能够验证数字签名,但不能验证或(重新)生成加密的数字签名。 如果还提供了数字签名,则可信任的第三方能够验证加密的数字签名,因为可信第三方不能(重新)生成数字签名。 因此,除第一交易方之外,其他方不能(再)生成数字签名和加密的数字签名。 因此,任何其他表现自己为第一交易方的其他方都可以被验证为第一交易方。

    Method and system for identifying one or more objects
    7.
    发明授权
    Method and system for identifying one or more objects 失效
    用于识别一个或多个对象的方法和系统

    公开(公告)号:US06565002B1

    公开(公告)日:2003-05-20

    申请号:US09621171

    申请日:2000-07-21

    申请人: Teunis Tel

    发明人: Teunis Tel

    IPC分类号: G06K710

    摘要: In a method and system for identifying one or more objects, a two-dimensional, optically readable pattern and an identification code are generated. The pattern and the identification code are paired in one-to-one correspondence by means of a predetermined algorithm and are arbitrary. A two-dimensional representation of the pattern is provided on the object or on a pattern support connected thereto. The identification code is stored together with associated identification information. In order to identify the object, the representation of the pattern thereof is optically scanned and the associated identification code determined, by means of which the identification information can be determined.

    摘要翻译: 在用于识别一个或多个对象的方法和系统中,生成二维光学可读模式和识别码。 图案和识别码通过预定的算法成对地一一对应,并且是任意的。 图案的二维表示被提供在对象上或连接到其上的图案支撑上。 识别码与关联的识别信息一起存储。 为了识别对象,对其图案的表示进行光学扫描,并且确定相关联的识别码,借此可以确定识别信息。

    Method and system for performing a transaction and for performing a verification of legitimate access to, or use of digital data

    公开(公告)号:US11063766B2

    公开(公告)日:2021-07-13

    申请号:US10560579

    申请日:2004-06-14

    IPC分类号: H04L9/32

    摘要: A method for performing an electronic transaction is disclosed. The method provides authentication data and authentication software to an electronic device and preferably stored in a secure storage location or other location inaccessible to the user or the operating system of the device. When digital data is requested from a transaction party that requests a digital signature, the authentication software is activated to generate said digital signature from the authentication data. Next, the digital signature is provided to the other transaction party, which then provides the requested digital data. The digital signature may be embedded in the requested and provided digital data. Further, a method for performing a verification of legitimate use of digital data is disclosed. Digital data digitally signed according to the present invention may only be accessed if the embedded digital signature is identical to a regenerated digital signature that is regenerated by the authentication software, using user inaccessible authentication data installed on the device. If the embedded and regenerated digital signatures are not identical, the data may not be accessed and an error signal is generated.

    Method and System for Performing a Transaction and for Performing a Verification of Legitimate Access to, or Use of Digital Data
    9.
    发明申请
    Method and System for Performing a Transaction and for Performing a Verification of Legitimate Access to, or Use of Digital Data 审中-公开
    执行交易和执行验证合法访问或使用数字数据的方法和系统

    公开(公告)号:US20070271456A1

    公开(公告)日:2007-11-22

    申请号:US10560579

    申请日:2004-06-14

    申请人: Scott Ward Teunis Tel

    发明人: Scott Ward Teunis Tel

    IPC分类号: H04L9/00

    CPC分类号: H04L9/3247 H04L2209/56

    摘要: A method for performing an electronic transaction is disclosed. The method provides authentication data and authentication software to an electronic device and preferably stored in a secure storage location or other location inaccessible to the user or the operating system of the device. When digital data is requested from a transaction party that requests a digital signature, the authentication software is activated to generate said digital signature from the authentication data. Next, the digital signature is provided to the other transaction party, which then provides the requested digital data. The digital signature may be embedded in the requested and provided digital data. Further, a method for performing a verification of legitimate use of digital data is disclosed. Digital data digitally signed according to the present invention may only be accessed if the embedded digital signature is identical to a regenerated digital signature that is regenerated by the authentication software, using user inaccessible authentication data installed on the device. If the embedded and regenerated digital signatures are not identical, the data may not be accessed and an error signal is generated.

    摘要翻译: 公开了一种执行电子交易的方法。 该方法向电子设备提供认证数据和认证软件,并且优选地存储在设备的用户或操作系统不可访问的安全存储位置或其他位置。 当从请求数字签名的交易方请求数字数据时,认证软件被激活以从认证数据生成所述数字签名。 接下来,将数字签名提供给另一个交易方,然后提供所请求的数字数据。 数字签名可以嵌入在所请求和提供的数字数据中。 此外,公开了一种用于执行数字数据的合法使用验证的方法。 如果嵌入式数字签名与由认证软件重新生成的再生数字签名相同,则可以使用安装在设备上的用户不可访问的认证数据来访问根据本发明数字签名的数字数据。 如果嵌入和再生的数字签名不相同,则可能无法访问数据,并生成错误信号。

    Device for rinsing objects
    10.
    发明授权
    Device for rinsing objects 失效
    漂洗物品的装置

    公开(公告)号:US5839457A

    公开(公告)日:1998-11-24

    申请号:US882441

    申请日:1997-06-25

    IPC分类号: A45D27/46 B08B3/04 B08B3/10

    CPC分类号: B08B3/102 A45D27/46 B08B3/108

    摘要: A device for rinsing objects has a holder (1) for supporting an object (4) to be cleaned, two passages (8, 9) at opposite sides of the object situated in the holder in operation, and two reservoirs (10, 11) for holding rinsing liquid (18), a first reservoir (10) communicating with a first passage (8) and a second reservoir (11) communicating with a second passage (9), and at least the first reservoir (10) having a variable volume.

    摘要翻译: 用于冲洗物品的装置具有用于支撑待清洁物体(4)的保持器(1),位于操作中的保持器中的物体的相对侧的两个通道(8,9)和两个储存器(10,11) 用于保持冲洗液体(18),与第一通道(8)连通的第一储存器(10)和与第二通道(9)连通的第二储存器(11),以及至少第一储存器(10) 卷。