Abstract: A system and method for conducting verifiably correct auctions that preserves the secrecy of the bids while providing for verifiable correctness and trustworthiness of the auction is disclosed. Some of the elements of the method and apparatus are that the auction operator accepts all bids submitted and follows the published rules of the auction. In one embodiment, the bids are maintained secret from the auctioneer and all bidders until the auction closes and no bidder is able to change or repudiate her bid. In another embodiment, the auction operator computes the auction results and publishes proofs of the results' correctness. In yet another embodiment, any party can check these proofs of correctness via publicly verifiable to computations on encrypted bids.
Type:
Application
Filed:
August 10, 2011
Publication date:
December 1, 2011
Applicant:
PRESIDENT AND FELLOWS OF HARVARD COLLEGE
Inventors:
David C. Parkes, Michael O. Rabin, Stuart M. Shieber, Christopher A. Thorpe
Abstract: In the field of communications, a method, a system, and devices for implementing a network banking service are provided. The method includes: after an agent device establishes a connection with a Point Of Sale (POS) device, the agent device performs identification with the POS device; after successful identification, the agent device performs authentication with the POS device; after successful authentication, the agent device establishes a connection with a network banking server according to a preset address of the network banking server through wireless access to the Internet; and the agent device forwards network banking service data between the POS device and the network banking server, thereby implementing the network banking service. Therefore, it is convenient for users to use a network banking service, the functions of POS devices are simplified, and the cost of manufacturing and maintaining POS devices is reduced.
Abstract: A computer-assisted method includes hardware, software and telecommunications components that cooperatively achieve the technical effect of an improved electronic purchasing transaction system. In various embodiments of the invention, at least one master account is established for a client. A pool of limited use account identifiers or secondary account identifiers, that are separate and distinct from the master account, is associated with the master account by a purchasing system or account management system. Each of the limited use account identifiers may be used by the client to purchase items from merchants.
Type:
Grant
Filed:
August 4, 2009
Date of Patent:
November 29, 2011
Assignee:
American Express Travel Related Services Company, Inc.
Abstract: A method of calculating the quality of a data record having a plurality of data fields involves indentifying individual fields in the data record that are incorrect and scoring those fields accordingly. Further fields are identified where any one or more of those fields may be incorrect, but it is not immediately possible to determine which one or ones. These further fields are also scored accordingly. A score for the data records as a whole is then calculated based on the scores assigned to individual fields. Different fields may be weighted according to their importance to the data record as a whole.
Type:
Grant
Filed:
August 4, 2008
Date of Patent:
November 29, 2011
Assignee:
ProPay Inc.
Inventors:
Gary B. Goodrich, Gregori Pesci, Bryce Weldon Thacker, Wayne William Peck
Abstract: A method for processing a value-added electronic transmission, which includes obtaining user identification information (110), conveying software (120) to the user, where the software enables the user to selectively send electronic transmissions to intended recipients via a mediation site, and associating with the mediation site at least one value-added processing service, including carrier indication, sender indication, transmission identification, guaranteed delivery, address verification, address correction, archiving, and transmission security. The method further includes billing the user (140) for service rendered through the mediation site.
Abstract: A method for converting coined money to another type of value proceeds by receiving a plurality of coins into a coin processing machine. The coins are processed with the coin processing machine to determine a value of the coins. An electronic record of the determined value is produced using the coin processing machine. Further, the record of the determined value is electronically transmitted from the coin processing machine to a remote storage location.
Type:
Grant
Filed:
April 9, 2002
Date of Patent:
November 22, 2011
Assignee:
The Western Union Company
Inventors:
Mark Thompson, Kenneth Algiene, Paul A. Blair
Abstract: A method for enabling a user of a client to see whether or not printing is completed is provided. A Web print server generates data in accordance with a printing request sent from the client, and sends the data to a printer device. In accordance with reception of the printing request sent from the client, the Web print server sends a request for acquiring a Web page to the client. The client receives the request for acquiring the Web page from the Web print server, and acquires a Web page indicating the state of processing of a print job in the printer device, the Web page being sent from the printer device. The Web page is displayed on a display unit.
Abstract: Systems and methods for providing gaming activities, these particularly relating to gaming activities implemented in conjunction with a flexible credit arrangement. A consumer is allocated one or more entries in a gaming activity based on a level of transactable flexible credit held by that consumer. For example, the allocation of entries is increased or decreased subject to a corresponding increase or decrease in transactable flexible credit held by the consumer. In some aspects of the present invention, one or more prizes for the gaming activity are funded in whole, or in part, by way of supplementary contributions realized on the basis of consumers' participation in a flexible credit infrastructure.
Abstract: A portable intelligent shopping device which can be worn as a wristwatch or carried on a belt. It makes paying for purchases more secure. The device stores the wearer's private key and digital certificate. It can also store the public keys of various stores. When the wearer (shopper) buys something from a store, the store can request a payment of the appropriate amount from the wearer's watch. The authorization for payment of the amount specified by the request for payment may be transmitted using IR or RF. The watch can then display the amount and request the shopper to confirm the transaction by entering a PIN number by tapping on the touch screen or using the roller wheel. Once the correct PIN is entered, the watch can send a message to the store authorizing payment of the requested amount. The store can verify the message based on the shopper's encrypted certificate by decrypting it using the shopper's public key.
Type:
Grant
Filed:
May 5, 2003
Date of Patent:
November 22, 2011
Assignee:
International Business Machines Corporation
Abstract: A method of improving electronic security establishes a secure trusted path between a user and an institution seeking an electronic signature to verify a transaction before any request for signature and completing electronic transaction activities occurs. The secure trusted path providing the user with a first predetermined portion of a branded watermark, for instance an advertisement, provided from the institution in conjunction with the request, and a second predetermined portion of the branded watermark being provided upon a personalized device that cannot be intercepted or manipulated by malware, allowing the user to verify that the request as displayed upon the user's primary computing device is valid.
Abstract: Transaction management is facilitated using an approach involving the use of transaction characteristics to authenticate transaction information. According to an example embodiment, a computer processing system is programmed to process a shipment transaction involving a shipper and a carrier. The system is particularly suited to efficiently automate the payment of a shipment transaction and to efficiently provide access to relevant shipment information. The system includes a shipper processor that receives transaction document information such as purchase order information and assists in generating a bill of lading for the transaction. A shipper access terminal interfaces between the shipper processor and a central processor arrangement to control the quantity, quality, and timeliness of information transferred to the central processor arrangement.
Abstract: Provided are a method and system for providing services based on authentication of college students. According to the present invention, a verification code is transmitted to an email account that is provided by a college, a college student who inputs the same verification code is authenticated, and the authenticated college student provides the services including an essay providing service or an essay review service, based on the verified identity of the college student.
Abstract: According to the invention, a method of using a one-time password for a transaction between a user and a merchant is disclosed. The method may include generating the one-time password. The method may also include authenticating the user by the authentication server in response to a request from the user to use the one-time password. The method may further include authorizing the use of the one-time password for the transaction in response to authenticating the user by the authentication server. The method may moreover include using the one-time password in combination with an account number to settle the transaction between the user and the merchant. The method may additionally include sending a message to the authentication server originating from the merchant, wherein the message comprises the one-time password, and wherein the message requests a determination whether the one-time password is authorized for use in the transaction.
Abstract: A system and method for determining the cost per unit transaction for running an application on a server system is disclosed. The total transaction capacity of a system is determined as well as the total storage capacity during a time period M. The total fixed cost and the total variable cost during the time period are also determined. A total cost per unit transaction is determined from the total transaction capacity plus the total storage capacity divided by the total fixed and variable costs. The resource usage of the system by the application is tracked during the time period M. The cost billed to the application user is the resource usage of the application multiplied by the total cost per unit time for the time period M.
Type:
Grant
Filed:
November 8, 2004
Date of Patent:
November 8, 2011
Assignee:
Sprint Communications Company L.P.
Inventors:
Sameer Akbar Khan, Nasir Mahmood Mirza, Usman Mohammed Naim
Abstract: Techniques for transferring secured data from a vending device to a portable data storage device are described herein. The vending device receives a request from a user of the portable data storage device for digital contents to be stored on the portable data storage device and requests for a payment for the requested digital contents to be paid by the user. The vending device locates a first portable storage identification (PSID) parameter unique to the portable data storage device, and then generates a rights object including a second PSID parameter that is equal to the first PSID parameter to prevent the digital contents from being accessed at a data storage medium other than the portable data storage device. It is to be appreciated some or all of the above processing, such as location or generation of parameters, can be completed by a back-end device separate from the vending device.
Abstract: A method, system and computer program product relating to automatically validating a transaction between an issuer having a signing key, an emitter having an emitter key, an acceptor having a unique identity and a limit on transactions and a validator.
Type:
Grant
Filed:
May 24, 2007
Date of Patent:
November 1, 2011
Assignee:
International Business Machines Corporation
Abstract: The claimed subject matter relates to an architecture or arrangement that can limit access to sensitive information by means of encryption. In particular, data obtained from a payment instrument at, e.g., a Point-Of-Sale (POS) location can be encrypted at an early stage such that a POS (or another) application does not have access to the data in an unencrypted form and/or does not have access to a means for decrypting the data. For example, a Public Key Infrastructure (PKI) arrangement can be employed such that a back-end payment processor can define encryption algorithms, associate itself with a public key, and maintain a private key for decryption. The public key can be delivered to the POS location and employed for data encryption, and, moreover, the PKI can be regulated by the more trusted parties.
Type:
Application
Filed:
July 8, 2011
Publication date:
October 27, 2011
Applicant:
MICROSOFT CORPORATION
Inventors:
Sergey Bykov, Charles J. Williams, Craig Jensen
Abstract: A wireless telephone and messaging system provides Secure Immediate Wireless Access (SIWA) to wireless telephones onto existing wireless networks. The SIWA protocol uses existing wireless network messaging to exchange information between wireless devices and a network server, referred to herein as an Intelligent Service Manager (ISM). The ISM acts as a gateway between wireless devices and wireless service provider, and provides the wireless devices with an immediate limited or unlimited access to the wireless network. The ISM can also deny access to the wireless network from unauthorized wireless devices.
Abstract: Devices, systems, and methods for tokenizing sensitive information are provided herein. Methods may include the steps of receiving sensitive information via an input device, the input device being communicatively coupled to a transaction terminal, tokenizing the sensitive information at the input device to generate a token, and associating the token and the sensitive information together in a storage medium associated with the input device.
Abstract: A system and method enables gradual transitioning of a server, such as a filer, to a new security domain and/or IP address scheme. A single physical platform may comprise multiple logical servers, such as virtual filers (vfilers), that simultaneously participate in different security domains and IP address schemes. Each logical server is allocated its own set of storage resources, such as volumes and qtrees, and network resources, such as network addresses. Additionally, a common set of storage resources may store a data set that is accessible to logical servers that participate in the different security domains and/or IP address schemes. Therefore, the server can transition from an old security domain to a new, e.g., upgraded, security domain, by gradually phasing out file access requests sent to a logical server in the old domain and redirecting those requests to a logical server in the new security domain.
Abstract: An online payment method is disclosed which permits users to make realtime debit card payments over the Internet. The payor and payee pre-register with the system by sending their PAN, encrypted PIN and encryption key to the system database using a debit card reader, and then enter user names and secret IDs to be associated with the PAN and PIN numbers. When an online transaction is made the payor enters its user name and ID which is sent to the system along with the transaction amount and the payee user name. The system sends out a standard POS transaction using the stored PAN, encrypted PIN and encryption key. If approved it sends out a credit POS transaction to the payee in the same way.
Abstract: A system, device and method for allowing protected content to be transferred to end user communication devices that support different digital rights management (DRM) formats or schemes than the DRM format of the content provider. The method includes providing a Limited Rights Issuer (LRI) that issues content and associated digital rights to one or more of the end user devices within a domain defined by a Domain Authority with which the LRI has registered. The Limited Rights Issuer also translates content and associated digital rights information from the DRM format of an upstream DRM system to the DRM format of a downstream DRM system, which includes the end user devices within the defined domain. The system allows select end user devices to enjoy interoperability of content protected under different DRM schemes, while allowing content providers to still maintain a suitable level of DRM protection for their content.
Abstract: A portable data storage device has a non-volatile memory 3 for storing user data, an interface section 7 for receiving and transmitting data to a host, and a master control unit 1 for transferring data to and from the non-volatile memory 3. The portable data storage device further includes an integrated circuit 13 for generating a public/private key pair. The portable data storage device is arranged to transmit at least one of the keys out of the device. In different embodiments, the host can verify that the data it receives is correct, and the device can verify that the host has received the correct data.
Type:
Grant
Filed:
April 26, 2004
Date of Patent:
October 11, 2011
Assignee:
Trek 2000 International Ltd.
Inventors:
Chin Shyan Raymond Ooi, Lay Chuan Lim, Teng Pin Poo, Henry Tan
Abstract: Facilitating transactions using unsupported transaction identifier types entails receiving a unique transaction indicator having a transaction indicator type, and an indication that a corresponding transaction is to be carried out with a device that does not adequately support the transaction indicator type, and sending information to the device to allow the corresponding transaction to be completed. In one example, an encoded version of the unique transaction indicator is prepared by dividing an image constituting the unique transaction indicator into a plurality of sub-areas, and representing each of the sub-areas using the characters, which respectively represent the content of each sub-area.
Abstract: Process for encoding and/or decoding of the contents of data fields of a form, the contents of several data fields being combined into a first character chain, this first character chain being encoded in the corresponding number of bits into a corresponding first bit code, and this first bit code by means of second encoding, especially using 6 bits per character, being converted into a second character chain, this second character chain conversely being decodable/decoded into the contents of the data fields.
Abstract: The utility of a portable consumer device is extended by allowing account holders the ability to gain entry into access-controlled venues (e.g., baseball or soccer game, cinema, public transit) using a portable consumer device that is associated with an account that was used to purchase the admission or tickets to the event at the access-controlled venue. Techniques disclosed allow cardholder authentication in a non-payment setting that enables cardholders access to a location or a specific event. A first validation cryptogram is generated in the purchase cycle and is stored. A second validation cryptogram is generated in the validation cycle at the venue. If the second validation cryptogram matches the first validation cryptogram, the consumer is granted access. Validation cryptograms may be based on input data that is specific to the payment card holder (e.g., primary account number), specific to the ticket selling merchant (e.g., merchant identifier), specific to the event (e.g.
Type:
Application
Filed:
March 29, 2011
Publication date:
October 6, 2011
Inventors:
Marcelo Gomes de Oliveira, Percival Jatoba
Abstract: A standalone notification system, including a notification server which generates electronic messages for alerting customers of potentially fraudulent activity on one or more of their financial accounts. Alternatively, or in addition thereto, the notification system may be used to forward transaction code(s) to customers for verification of a request for high risk transaction(s) with respect to a customer's financial account. The transaction code is generated in response to a high risk transaction request and sent to through an identified customer notification means, e.g., e-mail, short message service (“SMS”), facsimile, mobile phone, telephone, etc. The customer must enter the transaction code within a predetermined amount of time in order to verify the high-risk transaction request.
Type:
Grant
Filed:
April 3, 2006
Date of Patent:
October 4, 2011
Inventors:
Arun Ahuja, Ramadurai Vaidyanathan, Anand Tata, Grigor Markarian, Joe Pan, Peter Tompkins
Abstract: A server printing apparatus which can communicate with a plurality of processors for respectively executing any of not less than one processes included in a print-related process according to a print order, includes a storage unit for storing execution content information indicating execution contents using at least one processor in association with the print-related process according to the print order, an encryption key storage unit for storing encryption keys uniquely and respectively given to the plurality of processors, and an encryption processing unit for encrypting information associated with each of the processors in the execution content information using the encryption key unique to that processor, and the processors are controlled to execute the print-related process according to the print order using the execution content information.
Abstract: The system disclosed includes at least a consumer item, such as a cigarette box, medication package or piece of clothing, and a detection device that can be operated by a buyer of the consumer item, which is configured for the detection of a coding in the consumer item, and a server, wherein the coding is hidden in the consumer item, but can be accessed by the buyer of the consumer item, so that the coding can be detected by means of a detection device and be transmitted to the manufacturer via a telecommunications connection to the server, wherein the server verifies if the coding is registered as valid, and wherein, depending upon the verification of the coding, a monetary benefit in favor of the telecommunications number of the buyer is credited by means of the server, and/or the server is configured for transmission of information to the buyer.
Type:
Grant
Filed:
October 22, 2009
Date of Patent:
October 4, 2011
Assignee:
Rocks Intertainment GmbH
Inventors:
Marcus Regensburger, Torsten Suter, Jochen Claussen
Abstract: Systems and methods are disclosed to detect fraud by displaying on a buyer's computer a high value item next to one or more commonly purchased items to attract a fraudster; analyzing customer purchasing behavior on the high value item for an indication of fraud; and indicating fraud if the buyer buys the high value item without prior history.
Abstract: Charitable donations are increased by automatically providing immediate on-line recognition of on-line donors. A list of donors is maintained on a Web page acknowledging the on-line contributions. Donor names on the list can be links to additional information about the donation or the donor. Information about donor and donation is entered by the donor, who can specify what information is to be published on the Web and what information is to remain unpublished. The donor list can be arranged in order of donation size, and donors can compete for position on the list. The donor information can indicate membership in a group, and donations can also be totaled by group to encourage donation competition between groups.
Abstract: In general, this disclosure describes techniques of dynamically selecting deposit clearing methods based on business rules. As described in this disclosure, a financial institution receives checks drawn on other financial institutions as customer deposits. When the financial institution receives a check, the financial institution automatically applies one or more customizable business rules to identify a method to clear the check. The financial institution then uses the identified method to clear the check.
Type:
Grant
Filed:
May 9, 2008
Date of Patent:
September 27, 2011
Assignee:
Wells Fargo Bank, N.A.
Inventors:
Alan W. Hecht, Jr., Laura Lee Orcutt, Jeffrey Allen Harmon, Michelle Marie Young, Stephanie A. Sturgis-Griffin
Abstract: Embodiments of the present invention are drawn to systems and methods for securing information using cryptographically keyed units. Specifically, in one embodiment of the present invention, a system is provided for securing information that uses two cryptographically keyed units to encrypt information flowing between a fuel pump device and a remote device. Thus, even if the information is intercepted, it could not be used to perpetrate fraud.
Type:
Application
Filed:
May 26, 2011
Publication date:
September 22, 2011
Inventors:
Michael C. Finley, James Fortuna, James Hervey
Abstract: A method and system to authenticate users with a one time password by using a visual communication channel. The method and system may include using a device to capture a sequence of images being displayed and decrypt an encrypted one time password contained in the sequence of images.
Type:
Grant
Filed:
March 31, 2008
Date of Patent:
September 20, 2011
Assignee:
International Business Machines Corporation
Abstract: A system and method for conducting verifiably correct auctions that preserves the secrecy of the bids while providing for verifiable correctness and trustworthiness of the auction is disclosed. Some of the elements of the method and apparatus are that the auction operator accepts all bids submitted and follows the published rules of the auction. In one embodiment, the bids are maintained secret from the auctioneer and all bidders until the auction closes and no bidder is able to change or repudiate her bid. In another embodiment, the auction operator computes the auction results and publishes proofs of the results' correctness. In yet another embodiment, any party can check these proofs of correctness via publicly verifiable computations on encrypted bids.
Type:
Grant
Filed:
May 7, 2007
Date of Patent:
September 20, 2011
Assignee:
President and Fellows of Harvard College
Inventors:
David C. Parkes, Michael O. Rabin, Stuart M. Shieber, Christopher A. Thorpe
Abstract: A method for authenticating a user of certain service provided by a system through a first communication channel, in one aspect including receiving an access request from a first terminal of the user through the first communication channel; receiving an address or number of a second terminal of the user through the first communication channel; transferring data including an identification code, to the second terminal of the user through a second communication channel; receiving a user confirmation response, including the user identification code, from the second terminal of the user through the second communication channel; determining whether the identification code transferred to the second terminal is identical to the user identification code received from the second terminal; generating an authentication code if it is determined that both the user identification codes are identical to each other; transferring the user authentication code to the first terminal of the user through the first communication ch
Abstract: A card activated cash dispensing automated banking machine is provided that is operative to send a message to a host banking system, which message includes data representative of a request to transfer an encrypted terminal master key from the host banking system to the automated banking machine. A processor in an encrypting pin pad (EPP) in the automated banking machine is operative to decrypt a received encrypted terminal master key using an asymmetric encryption algorithm with a first private asymmetric key previously stored in the EPP. The EPP is operative to store the terminal master key in the EPP for use with decrypting at least one further key received from the host banking system.
Type:
Grant
Filed:
October 31, 2007
Date of Patent:
September 13, 2011
Assignee:
Diebold, Incorporated
Inventors:
Timothy Zajkowski, Anne Doland, Mark D. Smith
Abstract: A method for facilitating biometric security in a smartcard-reader transaction system is provided. The method includes determining if a transaction violates an established rule, such as a preset spending limit. The method also includes notifying a user to proffer a biometric sample in order to verify the identity of said user, and detecting a proffered biometric at a sensor to obtain a proffered biometric sample. The method additionally comprises verifying the proffered biometric sample and authorizing a transaction to continue upon verification of the proffered biometric sample.
Type:
Grant
Filed:
August 9, 2010
Date of Patent:
September 13, 2011
Assignee:
American Express Travel Related Services Company, Inc.
Abstract: Methods for purchasing of goods or services over the internet. A customer has a customer account set up at a bank with associated account information. The account information includes verification information for verification parameters, such as authorized computer identification, authorized delivery addresses, authorized user identification, authorized telephone caller identification, and/or other account information. An order is placed by a user via an ordering computer which provides order information. Such order information includes verification variables used by the bank. Verification and/or authentication using one or more variables of the customer account information is used by the bank to validate the order before assuring payment to the merchant.
Abstract: A reputation server is coupled to multiple clients. Each client has a security module that detects submissions of personally identifiable information (PII) from the client to a web site. The security module reports the identity of the web site and the type of submitted PII to the reputation server. The reputation server computes a reputation score for the web site based on the number and type of PII submissions to it. The reputation score represents an assessment of whether the web site is trustworthy. The reputation server provides the reputation scores for the web site to a client. The security module at the client evaluates the reputation score of the web site and optionally generates an alert advising the user not to submit PII to the web site because the site is untrustworthy.
Abstract: A system and method are disclosed. The method includes receiving, at a server computer, a transaction clearing request for a transaction, and then determining, using the server computer, if the transaction satisfies a stored blocking parameter. The method further includes allowing, using the server computer, the transaction clearing request if the transaction does not satisfy the stored blocking parameter, and denying, using the server computer, the transaction clearing request if the transaction satisfies the stored blocking parameter.
Abstract: A method of rewarding loyalty of a user may include providing a personal terminal to the user, detecting whether the personal terminal is within proximity of an interaction terminal, and based at least in part on the proximity of the personal terminal to the interaction terminal, providing a benefit to the user.
Type:
Grant
Filed:
March 3, 2008
Date of Patent:
September 6, 2011
Assignee:
The Coca-Cola Company
Inventors:
Anthony James Phillips, Leonard Frank Antao, Gerard E. Insolia, Haven Brock Kolls
Abstract: A system and method for anonymous reporting. Specifically, the method includes collecting user information about a user and generating a user profile based on the user information. The user profile is stored such that the user profile is used to achieve delivery of data that is targeted to the user based on the user profile without requiring a release of user information in the user profile. A signed authorization number is generated. The signed authorization number is signed by the third party but unknown to the third party. The signed authorization number is attached to a report detailing activities of the user. The report along with the signed authorization number is sent to the third party to preserve reporting privacy of the user. The third party is able to authenticate the report using the signed authorization number.
Type:
Grant
Filed:
April 27, 2006
Date of Patent:
September 6, 2011
Assignee:
Hewlett-Packard Development Company, L.P.
Abstract: A method for managing access to application software contained on a computer system or network. The computer system utilizes an authentication component that is configured to receive a unique user account identifier and to generate an authentication passkey by using an identifying data element, typically called a “password”. The identifying data elements are collected from one or more input devices and used as an encryption key for the user account identifier. The generated authentication passkey is used in an authentication transaction associated with the application software instead of the identifying data element thereby reducing data security risks if the identifying data element alone were discovered due to other unknowns including the encryption elements.
Abstract: A system for printing a webpage and retrieving content via the printed webpage. The system includes a print medium provided with first and second coded data encoding a print media identifier in different formats, and a mobile telecommunications device. The mobile telecommunications device includes: a media feed path; a printer positioned in the media feed path for printing the webpage onto the print medium; an optical encoder for reading the first coded data; a transceiver; and a sensor module for sensing at the second coded data. The processor determines a print media identifier from the first coded data, initiates linking of the webpage to the print media identifier, determines the print media identifier and a coordinate location from the second coded data, and initiates retrieval of the content using the print media identifier and the coordinate location.
Type:
Grant
Filed:
July 8, 2010
Date of Patent:
August 30, 2011
Assignee:
Silverbrook Research Pty Ltd
Inventors:
Kia Silverbrook, Paul Lapstun, Simon Robert Walmsley
Abstract: A method and apparatus for preventing unauthorized access to information temporarily stored in memory, such as a hard disk drive, associated with a digital document processor, such as a digital copier, printer, or facsimile machine. This invention includes storing information to memory, conducting an operation on the information, and automatically overwriting the information one or more times with a bit mask. Bit masks may be non-random or random sequences of binary values.
Abstract: An integrated shuffle validity proving device (300) is provided correspondingly to an ordinal number K which is an integer representing an order. The device (300) has a permutation proof commitment unit (310) which, on receiving a commitment public key and a permutation storage commitment containing a permutation proof text made by first to (??1)-th integrated shuffle validity proving devices from outside, encrypts a permutation proof commitment created by adding a permutation proof text made by the ?-th integrated shuffle validity proving device to the received permutation storage commitment with the commitment public key and sends the encrypted permutation proof commitment to the outside.
Abstract: A database system for encryption and protection of confidential data is provided. The database system includes a data source system receiving confidential data and first associated data. A secure data network interface system is connected to the data source system over an open network, the data network interface system receives the confidential data and the first associated data from the data source system and further comprises a secure data storage system coupled to the data network interface system and isolated from the open network, a data encryption system generating a unique encrypted identifier for the confidential data, and a data association system associating the confidential data with the unique encrypted identifier and storing the confidential data, the first associated data and the unique encrypted identifier in the secure data storage system.
Type:
Grant
Filed:
October 13, 2008
Date of Patent:
August 30, 2011
Assignee:
Merchant Link, LLC
Inventors:
Stephanie Bauer, Jonathan N. Freedman, Daniel J. Lane, Miriam Jaffe, Susan M. Zloth
Abstract: A mobile terminal is provided. A scanner unit reads code information attached to a commodity. A RAM stores the code information read by the scanner unit as commodity-for-purchase information. The scanner unit, to confirm whether the commodity-for-purchase information stored in the RAM is correct, the scanner unit reads the code information of one part of the commodity-for-purchase. A CPU switches from reading for storage to reading for confirmation. It is determined whether information contained in the code information read by the scanner unit is stored in the RAM. A display displays a result of the determination.
Type:
Grant
Filed:
April 17, 2009
Date of Patent:
August 30, 2011
Assignee:
Teraoka Seiko Co., Ltd.
Inventors:
Naokazu Sato, Naofumi Narita, Kunio Mori
Abstract: An electronic commerce process that facilitates online transactions among multiple participants, that prevents consumer fraud due to pirated payment card numbers, with calculated risk, involving at least one trusted payment card host (3), where buyer's payment card number is registered and corresponding secret keys are set up. The buyer (1b) initiates an online transaction by selecting a host from a list of hosts that served by the seller's web server (2a). Then, the buyer participant (1a) sends an order online (4), SSL encrypted. The seller participant (2a) receives and decrypts the order, confirms the availability of ordered items, assigns an orderID to the order, and sends a response (5a), SSL encrypted, to the buyer participant (1a) with the assigned orderID. The buyer participant (1a) encrypts and notifies the selected host (3) of this order and orderID, and authorizes the payment (6a) using secret keys.