摘要:
An electronic key supports a plurality of authentication methods and effectively prevents bidding-down attacks. For this purpose, security information is additionally provided by the electronic key, based on which a card reading device recognizes which authentication methods are supported by the electronic key. When the reading device recognizes based on said information that the electronic key supports a stronger second authentication method, but the authentication method was not recognized by the card reading device, the electronic key is, for example, rejected.
摘要:
A magnetic strip card includes a partial encrypted card payload encrypted with a long shared key to provide a final encrypted payload. A method for encoding the magnetic strip card includes encrypting a card payload with a code key of a access controls with a short key of the access control to generate a partial encrypted payload and encrypting the partial encrypted payload with a long shared key to provide a final encrypted payload.
摘要:
A system and method for detecting duplicates during processing. The duplicate detection may be performed by a financial institution, such as a bank. The method may be implemented on a computer based system. The duplicate detection method may be automated. The method may be applied initially to incoming electronic data files prior to further processing of the electronic data to prevent processing of duplicate items. The system and method may use a function, such as a hash function, to perform the duplicate detection. Other functions, such as a Bloom filter which may use multiple hash functions, may be used to perform the duplicate detection.
摘要:
A token file is received from an e-Commerce platform having a veracity grade capability. An off-line transaction is made using the token which records events of the transaction. Subsequently, the token re-enters the e-Currency platform and transfers the recorded off-line events. The platform rebuilds the token's past state based upon the state of nearby tokens and the recorded events, so that additional transactions can be rated, including a veracity grade.
摘要:
To improve convenience of a data carrier system, a cellular phone (30) which is carried by a user and includes an RFID communication unit (36) reading identification information of an RFID from the RFID in the vicinity in a non-contact state contains a user correlation unit (311) counting the number of times of reading with respect to identification information which have been read, selecting at least one carrier identification information from the identification information which have been read, and correlating the at least one carrier identification information with the user.
摘要:
Directional albedo of a particular article, such as an identity card, is measured and stored. When the article is later presented, it can be confirmed to be the same particular article by re-measuring the albedo function, and checking for correspondence against the earlier-stored data. The re-measuring can be performed through us of a handheld optical device, such as a camera-equipped cell phone. The albedo function can serve as random key data in a variety of cryptographic applications. The function can be changed during the life of the article. A variety of other features are also detailed.
摘要:
A two-dimensional code in which given data is encoded as a two-dimensional image. The two-dimensional code includes as image elements: points each of which is placed at point placement reserved position in a two-dimensional region based on a binary data string uniquely associated with the given data according to a preset binary data string placement condition; and a line connecting each of the points and a connection target point according to a preset connection condition. The two-dimensional code is formed as a two-dimensional image by causing the line connecting the points to have a given width.
摘要:
Directional albedo of a particular article, such as an identity card, is measured and stored. When the article is later presented, it can be confirmed to be the same particular article by re-measuring the albedo function, and checking for correspondence against the earlier-stored data. The re-measuring can be performed through us of a handheld optical device, such as a camera-equipped cell phone. The albedo function can serve as random key data in a variety of cryptographic applications. The function can be changed during the life of the article. A variety of other features are also detailed.
摘要:
This invention relates to a secured identification medium and a method for securing such a medium. The secured identification medium comprises an integrated circuit and, printed on one side, identification information (Ip) about the holder of the medium. It further comprises a set of characteristic attributes Att(Ipi) of the identification information, generated from a capture (Ipi) of the identification information and an extraction algorithm. The set of characteristic attributes of the printed analog image is stored in the integrated circuit and is designed to be compared, during an authentication stage, with a second set of characteristic attributes of the same printed image on the medium.
摘要:
A method and device for visual code transaction verification enables more secure electronic transactions. The method includes generating a window having a first pattern of elongated segments. A second pattern of elongated segments is then generated, wherein a dynamic visual code is produced when the window and the first pattern of elongated segments are superimposed with the second pattern of elongated segments. A transaction with a user is then verified by matching the dynamic visual code with a code string entered by the user.