Abstract: A biomedical recognition system includes diagnostic image information obtained by taking an image of a patient, a workstation storing the diagnostic image information, and a display device for displaying the diagnostic image information. A sensor is provided for capturing a biomedical information of a doctor. A biomedical information recognition system is connected to the sensor and integrated in the workstation for comparing a previously registered biomedical information and the biomedical information captured by the sensor. A display device control system is provided for causing the display device to display a diagnostic image linked to the biomedical information if a comparing result indicates a correspondence between the previously registered biomedical information and the biomedical information captured by the sensor, and for causing the display device to discontinue a part of functions thereof if the comparing result indicates a non-correspondence between the information.
Type:
Grant
Filed:
November 24, 2000
Date of Patent:
October 2, 2007
Assignee:
Eizo Nanao Corporation
Inventors:
Chiaki Todaka, Mitsuo Ohashi, Ron Simpson, Toshihiko Furukawa
Abstract: A highly secure “Design Zones” system is described that promotes collaboration between a manufacturer and owner of compute systems and its partners such as sub-contractors, customers and suppliers offers flexibility in the compute and design process. A partner starts a VPN tunnel between his workstations to establish a secure encrypted tunnel end to end wherein each partner is identified with a different VPN group/password. A session is started by the partner in a Web page on a portal machine through a thin client technology that authenticates thru LDAP the user/password of the person.
Abstract: The present invention provides a data updating method and a data updating system, which can update data of an IC card through a network without mistaking the IC card targeted for updating. When each of issuer client authentication, personal authentication, issuer server authentication and device authentication is performed, a server transmits update data encrypted by a public key used for the device authentication to a client. Then, the client outputs the encrypted update data to an IC card. In the IC card, the update data is decrypted by a secret key used for the device authentication. Based on the decrypted update data, rewriting is carried out in the IC card.
Abstract: In a device for calculating a result of a modular exponentiation, the Chinese Residue Theorem (CRT) is used, wherein two auxiliary exponentiations are calculated using two auxiliary exponents and two sub-moduli. In order to improve the safety of the RSA CRT calculations against cryptographic attacks, a randomization of the auxiliary exponents and/or a change of the sub-moduli are performed. Thus, there is a safe RSA decryption and RSA encryption, respectively, by means of the calculating time efficient Chinese Residue Theorem.
Abstract: A single-photon “watch dog” detector for a two-way quantum key distribution (QKD) system. The detector can detect weak probe signals associated with a Trojan horse attack, or weak substitute signals associated with a “man in the middle” attacks. The detector provides for a significant increase in security for a two-way QKD system over the prior art that employs a conventional detector such as a photodiode. By counting the number of weak pulses entering and/or leaving the reflecting QKD station (Alice), an eavesdropper that attempts to add weak pulses to the quantum channel in order to gain phase information from the phase modulator at Alice can be detected.
Abstract: A portable electronic security module including an electronic data storage device, a secret private customer key and a public customer key stored in the electronic data storage device as a first digital key pair, a signature module configured to generate a digital customer signature from object data to be signed using the secret private customer key, a secret private key of a security provider and a public key of the security provider stored in the electronic data storage device as a second digital key pair, and a certification module, installed in the signature module, and configured to generate a digital signature certificate from the digital customer signature using the secret private key of the security provider.