Patent application number | Description | Published |
20090158045 | LIGHT-OVERHEAD AND FLEXIBLE WIRELESS SENSOR MESSAGE AUTHENTICATION METHOD - The present invention relates to a wireless sensor message authentication method, which is characterized by an authentication scheme of any message authentication code applied to any secure message authentication code (MAC); an authentication scheme using the concept of error correcting code (ECC) and applied to any binary ECC to provide different feature; flexible technique tuning required throughput and faulty data detection capability by adjusting the ECC in use; end-to-end authentication; and XOR operation conducted to original MAC to secure light overhead. | 06-18-2009 |
20100054479 | DRM KEY MANAGEMENT SYSTEM USING MULTI-DIMENSIONAL GROUPING TECHNIQUES - A key management system is provided. The key management system includes a key server. The key server generates secret keys by constructing a rights hierarchy and a resource hierarchy, associating the rights hierarchy with the resource hierarchy, and converting a rights-resource relationship into a node in a service hierarchy. The rights hierarchy includes a rights node and the resource hierarchy includes a resource node. The rights hierarchy is set above the resource hierarchy. The right hierarchy and the resource hierarchy are in a partial order relationship. | 03-04-2010 |
20100205430 | Network Reputation System And Its Controlling Method Thereof - A network reputation system and its controlling method are provided. A credentials and exchange component permits a user to generate credentials and exchange matching keys with those persons having a social relationship with the user. A reputation evaluation component enables other users to make evaluations about an estimatee via the sharing of social network information. A query and response component receives a query from a person having a social relationship with the user for requesting an evaluation about the estimatee, and responds an associated evaluation result to the person having a social relationship with the user, via the sharing of social network information and the evaluations made by the other users about the estimatee. | 08-12-2010 |
20120180125 | METHOD AND SYSTEM FOR PREVENTING DOMAIN NAME SYSTEM CACHE POISONING ATTACKS - A method for preventing domain name system cache poisoning attacks comprises steps of inputting a domain name by an internet application program of an Internet communication device, determining in which area the Internet communication device is located, randomly selecting at least two domain name system resolvers of the area, retrieving at least one Internet protocol address from the domain name system resolvers and evaluating the Internet protocol addresses to generate at least one security score, selecting a trustworthy Internet protocol address based on the security scores, comparing the security score of the selected Internet protocol address with a predetermined security score threshold, and sending the trustworthy Internet protocol address to the Internet application program of the Internet communication device when the security score is greater than the security score threshold. A system for preventing domain name system cache poisoning attacks comprises an Internet communication device and an optional proxy server. | 07-12-2012 |
20120253654 | CARPOOL ARRANGER AND METHOD OF OPERATION - The present invention is a carpool arranger and a method of operating the carpool arranger. The carpool arranger comprises at least one passenger internet device, at least one vehicle internet device and a central processing module. The method of operating the carpool arranger comprises steps of transmitting information from each passenger internet device and each vehicle internet device to a central processing module; planning an optimal route for a passenger internet device that transmits a carpool request; choosing appropriate vehicles; planning carpool routes for the chosen vehicles; and transmitting information from the central processing module to each passenger internet device and each vehicle internet device. | 10-04-2012 |
20120290507 | CARPOOL FARE ORGANIZER AND METHOD FOR GENERATING CARPOOL FARES - A carpool fare organizer is useful when there is at least one passenger and comprises a distance recording unit, a passenger calculating unit, a fare calculating module and at least one display device. The distance recording unit records a get-in distance, a get-out distance and an accumulated distance of each passenger. The passenger calculating unit calculates a number of passengers. The fare calculating module calculates an original fare, an accumulated discount and an economical fare. A method for generating carpool fares comprises steps of recording a get-in distance, a get-out distance and an accumulated distance of each passenger and a number of passengers, and calculating an economical fare with the get-in distance, the get-out distance, the accumulated distance and the number of passengers. | 11-15-2012 |
20130024693 | Network Reputation System And Its Controlling Method Thereof - A network reputation system and its controlling method are provided. A credential and exchange component permits a user to generate credentials and exchange matching items with those persons having a social relationship with the user. A reputation evaluation component enables other users to make evaluations about an estimatee via the sharing of social network information. A query and response component receives a query from a person having a social relationship with the user for requesting an evaluation about the estimatee, and responds with an associated evaluation result to the person having a social relationship with the user, via the sharing of social network information and the evaluations made by the other users about the estimatee. | 01-24-2013 |
20130039484 | VERIFICATION METHOD AND SYSTEM - The present disclosure relates to a verification method and system. The method comprises: applying an encryption algorithm to a secret information so as to generate at least two images; transmitting a first image of the at least two images to a first device; and aligning and overlaying a second image of the at least two images with the first image during the proceeding of a verification process for recovering and revealing the secret information. | 02-14-2013 |
20140053254 | GRAPHICAL AUTHENTICATION SYSTEM AND METHOD FOR ANTI-SHOULDER SURFING ATTACK - The present disclosure relates to a graphical authentication system and the method of the same for anti-shoulder surfing attack, With the system and method, the user is able to select a graph form a graph list, The selected graph is partitioned into M*N pieces of graph blocks, Further, one of the graph blocks is selected to generate a password, when login, the system and method create randomly a login hint to indicate a position, the user therefore scroll a set of horizontal bar and vertical bar to the position according to the login hint and confirm entry, the system and method further proceed a authentication process to verify the entry to determine the validity of the authentication. | 02-20-2014 |
20140059674 | AUTHENTICATION METHOD AND CODE SETTING METHOD AND AUTHENTICATION SYSTEM FOR ELECTRONIC APPARATUS - The present invention relates to an authentication method for electronic apparatus and authentication system, which comprises the steps of: enabling an electronic apparatus to be moved by a user from a first position to a second position; enabling an inertial sensor embedded in the electronic apparatus to detect and thus construct a three-dimensional continuous trajectory of the electronic apparatus's movement from the first position to the second position in a Cartesian coordination system composed of a first-direction axis, a second-second axis and a third-direction axis; and enabling a processor embedded in the electronic apparatus to perform either a process for registering the three-dimensional continuous trajectory as a standard movement trajectory; or a comparison between the three-dimensional continuous trajectory and a previously registered standard movement trajectory so as to authenticate the correctness of the three-dimensional continuous trajectory and thus authenticate the electronic apparatus. | 02-27-2014 |
20140317415 | MULTI-TOUCH METHODS AND DEVICES - The present disclosure relates to a multi-touch method, configured to a touch panel. The method comprises: applying a first object to touch a first image on the touch panel for inputting a first password; and determining whether inputting a second password, and if not, removing the first object from the touch panel for ending a first round of password input. | 10-23-2014 |
Patent application number | Description | Published |
20090110196 | Key management system and method for wireless networks - A key management method for wireless networks is disclosed. Before a mobile station residing in a first ASN switches to a neighboring second ASN, an authentication process between the mobile station and the second ASN is implemented. Thus, the authentication process is not required when the mobile station is switching to the second ASN. | 04-30-2009 |
20100050204 | USER GROUP ASSIGNMENT METHOD FOR KEY MANAGEMENT - A method for assigning a plurality of users of a broadcasting system, wherein each of the plurality of users subscribes to at least one of a plurality of receiver groups provided by the broadcasting system. The method includes dividing the plurality of users into a plurality of temporary groups each including ones of the plurality of users that subscribe to a same one of the plurality of receiver groups; and assigning the ones of the plurality of users to at least one user group. | 02-25-2010 |
20100138661 | MOBILE STATION, ACCESS POINT, GATEWAY APPARATUS, BASE STATION, AND HANDSHAKE METHOD THEREOF FOR USE IN A WIRELESS NETWORK FRAMEWORK - A mobile station, an access point, a gateway apparatus, a base station, and a handshake method thereof for use in a wireless network framework are provided. The wireless network framework comprises a first wireless network comprising the access point, and a second wireless network comprising the gateway apparatus and base station. There is an IP security tunnel between the access point and the gateway apparatus. When the mobile station handovers from the first wireless network to the second wireless network, it transmits a master session key to the gateway apparatus via the access point and the IP security tunnel. Additionally, when the mobile station handovers from the second wireless network to the first wireless network, it transmits a master session key to the access point. As a result, the authentication time, which is needed in handover procedure between the first wireless network and the second wireless network, is reduced effectively. | 06-03-2010 |
Patent application number | Description | Published |
20090164617 | NETWORK APPARATUS HAVING A DATABASE, MANAGEMENT METHOD AND TANGIBLE MACHINE-READABLE MEDIUM FOR MANAGING INTERNET PROTOCOL CONNECTION RULES OF THE DATABASE - A network apparatus having a database, a management method and a tangible machine-readable medium for managing internet protocol (IP) connection rules of the database are provided. The database stores at least one first IP connection rule. The management method comprises the following steps: writing a second IP connection rule through one of a plurality of management programs; determining there is a conflict between the at least one first IP connection rule and the second IP connection rule, and eliminating the conflict according to a weight value of the at least one first IP connection rule and a weight value of the second IP connection rule. The at least one first IP connection rule and the second IP connection rule are used in one network connection. | 06-25-2009 |
20090325478 | MOBILE JAMMING ATTACK METHOD IN WIRELESS SENSOR NETWORK AND METHOD DEFENDING THE SAME - Mobile jamming attack method in wireless sensor network and method defending the same The present invention relates to a mobile jamming attack method applied in a wireless sensor network (WSN) and method defending the same. The mobile jamming attack method is a power exhaustion denial-of-service attack, possesses mobility and self-learning capability and is unable to be defended with existing defending scheme due to its attack to the routing layer of the WSN; the mobile jamming defending method employs multi-topologies scheme to defend the mobile jamming attack so that the affected area is reduced, the base station can still receive reply packets under the attack, and the jammed area can be roughly located and the track of the mobile jammer can be traced. | 12-31-2009 |
20100046467 | METHOD AND SYSTEM FOR HANDOVER AUTHENTICATION - A handover authentication method includes performing, by a wireless network server, a first authentication between a client and the wireless network server via a first network gateway; obtaining first authentication keys for the wireless network server and the client based on the first authentication; determining, by the wireless network server, a need to handover the client from the first network gateway to a second network gateway; deriving, by the wireless network server and from the first authentication keys, a handover authentication key shared by the client and the wireless network server; obtaining, by the wireless network server, second authentication keys for the network server and the client; and serving, by the wireless network server, the client via the second network gateway. | 02-25-2010 |
20120131407 | LAYER-AWARE FORWARD ERROR CORRECTION ENCODING AND DECODING METHOD, ENCODING APPARATUS, DECODING APPARATUS, AND SYSTEM THEREOF - A layer-aware Forward Error Correction (FEC) encoding and decoding method for encoding and decoding an information content, an encoding apparatus, a decoding apparatus, and a system thereof are provided, wherein the information content has a plurality of layer source symbol sets. In the encoding method, source symbols of each layer are encoded into encoding symbols corresponding to the layer by using an FEC encoder. In addition, final encoding symbols of an upper layer are generated by aggregating encoding symbols of both the upper layer and a lower layer. Thereby, the layer-aware FEC encoding method can maintain the encoding/decoding dependency between different layers of data without increasing the complexity of the encoding/decoding operations. | 05-24-2012 |
20130019278 | CAPTCHA IMAGE AUTHENTICATION METHOD AND SYSTEMAANM SUN; HUNG-MINAACI Hsinchu CityAACO TWAAGP SUN; HUNG-MIN Hsinchu City TWAANM YEH; CHUN-HAOAACI New Taipei CityAACO TWAAGP YEH; CHUN-HAO New Taipei City TWAANM CHEN; YAO-HSINAACI New Taipei CityAACO TWAAGP CHEN; YAO-HSIN New Taipei City TW - The present disclosure relates to a Completely Automated Public Turing Test to tell Computers and Humans Apart (CAPTCHA) image authentication method and system. The CAPTCHA image authentication method comprises the steps of: collecting a plurality of first objects; defining a plurality of variables so as to be used as basis for classifying and dividing the plural first objects into M groups accordingly while allowing each group in the M groups to correspond to at least one variable selected from the plural variables; selecting at least one group from the M groups while further grading and dividing the first objects in the selected group into subgroups of N grades based upon a standard unit of the variable corresponding to the selected group; sorting and storing the subgroups of N grades; and selecting a plurality of authentication objects from the subgroups of N grades to be used in an authentication process. | 01-17-2013 |
20140068386 | APPARATUS AND METHOD FOR ACCELERATING THE ENCODING OF RAPTOR CODES - In one exemplary embodiment of an apparatus for accelerating the encoding of Raptor codes, based on an inputted block length, a pre-encoding matrix generation device determines to generate an encoding matrix M corresponding to the inputted block length and computes an inverse matrix M | 03-06-2014 |