Patent application number | Description | Published |
20090158045 | LIGHT-OVERHEAD AND FLEXIBLE WIRELESS SENSOR MESSAGE AUTHENTICATION METHOD - The present invention relates to a wireless sensor message authentication method, which is characterized by an authentication scheme of any message authentication code applied to any secure message authentication code (MAC); an authentication scheme using the concept of error correcting code (ECC) and applied to any binary ECC to provide different feature; flexible technique tuning required throughput and faulty data detection capability by adjusting the ECC in use; end-to-end authentication; and XOR operation conducted to original MAC to secure light overhead. | 06-18-2009 |
20100054479 | DRM KEY MANAGEMENT SYSTEM USING MULTI-DIMENSIONAL GROUPING TECHNIQUES - A key management system is provided. The key management system includes a key server. The key server generates secret keys by constructing a rights hierarchy and a resource hierarchy, associating the rights hierarchy with the resource hierarchy, and converting a rights-resource relationship into a node in a service hierarchy. The rights hierarchy includes a rights node and the resource hierarchy includes a resource node. The rights hierarchy is set above the resource hierarchy. The right hierarchy and the resource hierarchy are in a partial order relationship. | 03-04-2010 |
20100205430 | Network Reputation System And Its Controlling Method Thereof - A network reputation system and its controlling method are provided. A credentials and exchange component permits a user to generate credentials and exchange matching keys with those persons having a social relationship with the user. A reputation evaluation component enables other users to make evaluations about an estimatee via the sharing of social network information. A query and response component receives a query from a person having a social relationship with the user for requesting an evaluation about the estimatee, and responds an associated evaluation result to the person having a social relationship with the user, via the sharing of social network information and the evaluations made by the other users about the estimatee. | 08-12-2010 |
20120180125 | METHOD AND SYSTEM FOR PREVENTING DOMAIN NAME SYSTEM CACHE POISONING ATTACKS - A method for preventing domain name system cache poisoning attacks comprises steps of inputting a domain name by an internet application program of an Internet communication device, determining in which area the Internet communication device is located, randomly selecting at least two domain name system resolvers of the area, retrieving at least one Internet protocol address from the domain name system resolvers and evaluating the Internet protocol addresses to generate at least one security score, selecting a trustworthy Internet protocol address based on the security scores, comparing the security score of the selected Internet protocol address with a predetermined security score threshold, and sending the trustworthy Internet protocol address to the Internet application program of the Internet communication device when the security score is greater than the security score threshold. A system for preventing domain name system cache poisoning attacks comprises an Internet communication device and an optional proxy server. | 07-12-2012 |
20120253654 | CARPOOL ARRANGER AND METHOD OF OPERATION - The present invention is a carpool arranger and a method of operating the carpool arranger. The carpool arranger comprises at least one passenger internet device, at least one vehicle internet device and a central processing module. The method of operating the carpool arranger comprises steps of transmitting information from each passenger internet device and each vehicle internet device to a central processing module; planning an optimal route for a passenger internet device that transmits a carpool request; choosing appropriate vehicles; planning carpool routes for the chosen vehicles; and transmitting information from the central processing module to each passenger internet device and each vehicle internet device. | 10-04-2012 |
20120290507 | CARPOOL FARE ORGANIZER AND METHOD FOR GENERATING CARPOOL FARES - A carpool fare organizer is useful when there is at least one passenger and comprises a distance recording unit, a passenger calculating unit, a fare calculating module and at least one display device. The distance recording unit records a get-in distance, a get-out distance and an accumulated distance of each passenger. The passenger calculating unit calculates a number of passengers. The fare calculating module calculates an original fare, an accumulated discount and an economical fare. A method for generating carpool fares comprises steps of recording a get-in distance, a get-out distance and an accumulated distance of each passenger and a number of passengers, and calculating an economical fare with the get-in distance, the get-out distance, the accumulated distance and the number of passengers. | 11-15-2012 |
20130024693 | Network Reputation System And Its Controlling Method Thereof - A network reputation system and its controlling method are provided. A credential and exchange component permits a user to generate credentials and exchange matching items with those persons having a social relationship with the user. A reputation evaluation component enables other users to make evaluations about an estimatee via the sharing of social network information. A query and response component receives a query from a person having a social relationship with the user for requesting an evaluation about the estimatee, and responds with an associated evaluation result to the person having a social relationship with the user, via the sharing of social network information and the evaluations made by the other users about the estimatee. | 01-24-2013 |
20130039484 | VERIFICATION METHOD AND SYSTEM - The present disclosure relates to a verification method and system. The method comprises: applying an encryption algorithm to a secret information so as to generate at least two images; transmitting a first image of the at least two images to a first device; and aligning and overlaying a second image of the at least two images with the first image during the proceeding of a verification process for recovering and revealing the secret information. | 02-14-2013 |
20140053254 | GRAPHICAL AUTHENTICATION SYSTEM AND METHOD FOR ANTI-SHOULDER SURFING ATTACK - The present disclosure relates to a graphical authentication system and the method of the same for anti-shoulder surfing attack, With the system and method, the user is able to select a graph form a graph list, The selected graph is partitioned into M*N pieces of graph blocks, Further, one of the graph blocks is selected to generate a password, when login, the system and method create randomly a login hint to indicate a position, the user therefore scroll a set of horizontal bar and vertical bar to the position according to the login hint and confirm entry, the system and method further proceed a authentication process to verify the entry to determine the validity of the authentication. | 02-20-2014 |
20140059674 | AUTHENTICATION METHOD AND CODE SETTING METHOD AND AUTHENTICATION SYSTEM FOR ELECTRONIC APPARATUS - The present invention relates to an authentication method for electronic apparatus and authentication system, which comprises the steps of: enabling an electronic apparatus to be moved by a user from a first position to a second position; enabling an inertial sensor embedded in the electronic apparatus to detect and thus construct a three-dimensional continuous trajectory of the electronic apparatus's movement from the first position to the second position in a Cartesian coordination system composed of a first-direction axis, a second-second axis and a third-direction axis; and enabling a processor embedded in the electronic apparatus to perform either a process for registering the three-dimensional continuous trajectory as a standard movement trajectory; or a comparison between the three-dimensional continuous trajectory and a previously registered standard movement trajectory so as to authenticate the correctness of the three-dimensional continuous trajectory and thus authenticate the electronic apparatus. | 02-27-2014 |
20140317415 | MULTI-TOUCH METHODS AND DEVICES - The present disclosure relates to a multi-touch method, configured to a touch panel. The method comprises: applying a first object to touch a first image on the touch panel for inputting a first password; and determining whether inputting a second password, and if not, removing the first object from the touch panel for ending a first round of password input. | 10-23-2014 |