Patent application number | Description | Published |
20110286596 | SYSTEM AND METHODS FOR ENCRYPTION WITH AUTHENTICATION INTEGRITY - A data integrity system including a transmitter, having a TX pseudorandom function generator, a TX switching function having a transmitting option and a TX combiner operative to receive, from a Host, an initialization data entity including at least one word, [TA1], in an initialization phase, to receive, during normal operation, two data entities of interest each including at least one data word of interest [TA2] and [TA3] respectively; to receive a first data entity including at least one word [TC1] comprising a randomized data entry, from the TX pseudorandom function generator, to generate a first XOR sum of the initialization data entity's word [TA1] and the at least one randomized data entity [TC1], in at least one iteration of an initialization phase; and, during normal operation, to generate and to output a second XOR sum [TA2⊕TC2=TB2] and a third XOR sum [TA3⊕TC3=TB3], wherein TB2 and TB3 are randomized data entities, wherein the words TA1, TA2 and TA3 are operative to initialize the data integrity system including enabling the data integrity system to encrypt the TA2 word and to generate an identifying hash value output using the TA3 word. | 11-24-2011 |
Patent application number | Description | Published |
20090304179 | SYSTEM AND METHOD TO PRECLUDE MESSAGE MODIFICATION IN DATA AUTHENTICATION SYSTEMS THROUGH EFFICENT USE OF FEEDBACK IN CRYPTOGRAPHIC FUNCTIONS - A data hashing system operative to hash an incoming string of message words, thereby to generate a hash value tag comprising a deterministic random number string which uniquely identifies the incoming string, the system comprising at least first and second register arrays, at least one 1-way at least pseudo-randomizing functionality; and a set of at least first and second orthogonal feedback word stream generators operative to generate a set of at least first and second orthogonal feedback streams of message words respectively, including applying respective permutations to the incoming string, wherein the first and second feedback streams are combined into the first and second register arrays respectively, the at least pseudo-randomizing functionality accepts input from the register arrays and generates at least pseudo-random output which, in combination with a present word in the incoming string, is provided to the stream generators, and the first feedback stream is a first function of a present word in the incoming stream and the second feedback stream is a second function of a present and previous words, in the incoming stream. | 12-10-2009 |
20110022655 | SMART-CARD BASED FAULT RESISTANT ON-LINE/OFF-LINE LOYALTY POINT ACCUMULATION SYSTEM FOR SPECTATOR EVENT VENUES - A computerized venue management system for managing a venue serving clients, the system comprising a multiplicity of portable computing devices each associated with a loyalty rating representing a client of the venue; a plurality of computerized delivery terminals each capable of communicating with and serving any one of the multiplicity of portable computing devices wherein at least a subset of the plurality of terminals is operative to enable delivery of at least one Loyalty based entitlement to at least one client of the venue and, in conjunction with delivery of the at least one entitlement, to enhance the individual portable computing device's loyalty rating, wherein the entitlement is computed to encourage more even distribution of clients over time by weighting at least one client's entitlement positively as a function of presence of the client's portable computing devices at the venue at times of lesser client attendance. | 01-27-2011 |
20110145570 | Certified Abstracted and Anonymous User Profiles For Restricted Network Site Access and Statistical Social Surveys - An arrangement, system, and methods for creating and distributing authenticated personal information for users of network services and participants in social surveys, and in chat rooms and other forums. A trusted organization verifies that personal information presented by a user is correct, and authenticates the information in an encapsulated form as “certified profiles” within a smart card or other secure portable hardware device issued to the user Certified profiles are authenticated by digital signatures of the trusted organization and the profile users. Personal information in certified profiles can be in raw and/or in statistically-processed and abstracted form, and can be tailored by the user for specific needs to include whatever personal information is required, and to exclude all other personal information. By the use of unique aliases, it is possible for users to anonymously access restricted network sites and participate in surveys, while still satisfying recipients that supplied personal information is accurate, and for surveys that the user has not responded to the same survey more than once. Users enroll for certified profiles via trusted enrollment vendors who market the service to the public and also make hardware and software available to users for managing, maintaining, and distributing the certified profiles. | 06-16-2011 |
20120018512 | SYSTEM AND METHODS FOR VENUE CONTROLLED BUY-BACK AND RESELLING OF ACCESS PRIVILEGES AND TICKETS TO CLOSED GROUP EVENTS - Methods and apparatus for controlling venue buy-back and resale of access privileges to controlled group events limiting third party trading of subscription. | 01-26-2012 |
20120022902 | ONLINE/OFFLINE EVENT RELATED ACCESS CONTROLLED SYSTEMS WITH EVENT SPECIFIC CLOSED VENUE WIRELESS APPLICATIONS - Systems and methods for off line/online access controlled environments to implement temporal applications in wireless devices via near field communications in closed group venues; e.g., concert halls, race horse betting, and university scheduling, are disclosed. | 01-26-2012 |
20140074719 | SYSTEM AND METHOD FOR COMPUTERIZED NEGOTIATIONS BASED ON CODED INTEGRITY - An accelerated transparent authenticated Data Exchange system wherein the chronology of alternating senders' and receivers' messages are authenticated typically at each step, with an easy to use provision for resending, in the event of faulty transmission, such that the final message hash value authenticates the negotiation chronologically from first to final message, wherein the final hash value is operative to enable a signature of an entity or entities which binds such entity to the whole data exchange, which signature can be in clear text, encoded, and/or encrypted with authentication integrity. The system is useful for managing computerized negotiations including client-initiated computerized negotiations and including computerized financial transactions. | 03-13-2014 |
Patent application number | Description | Published |
20120047224 | METHODS FOR DETECTION OF CONTENT SERVERS AND CACHING POPULAR CONTENT THEREIN - A method for identification of popular content provided over a first portion of a network to a second portion of a network in the form of packets containing, the method comprises identifying a source of content in the first portion of a network. Deep-packet-inspection (DPI) is performed to determine if content in each packet related to the content is to be stored in a storage that is in a path between the content source and at least a user node in the second portion of the network. The content is stored. A request is received from the user node for a requested content. It is determined if the requested content or portions of the requested content is in the storage. if the requested content or portions of the requested content is missing in the storage, a request is sent to the content source for the requested content or missing portions of the requested content. | 02-23-2012 |
20120047252 | SYSTEM FOR DETECTION OF CONTENT SERVERS AND CACHING POPULAR CONTENT THEREIN - An apparatus comprising a network interface to at least a first portion of a network and at least a second portion of a network. A deep-packet-inspection (DPI) unit identifies at least a source of content, the DPI unit further inspecting one or more packets provided from the identified at least a source of content over the first portion of the network, each packet having at least a specific source address and a specific destination address. A storage stores at least a portion of the content. A content delivery unit receives a request from the second portion of the network for requested content from the identified at least a source of content and responsive thereto provides the requested content, or portions of the requested content, from the storage to the second network if the requested content, or portions of the requested content, is stored in the storage, or otherwise sending the request over the first portion of the network to the identified at least a source of content for the requested content, or missing portions of the requested content. | 02-23-2012 |
20150193567 | SYSTEM AND METHOD OF PERFORMING ANALYTICS WITH RESPECT TO CONTENT STORING SERVERS CACHING POPULAR CONTENT - Methods and systems are provided for generating a traffic simulation respective of at least one content storing server, the content storing server operative for caching popular content. One method includes sniffing traffic between at least a first portion of a network and at least a second portion of the network, identifying, from the sniffed traffic, at least a source of content and at least a destination of the content, determining if the content is stored on a cache, simulating a notification respective of the content, and generating a simulation of traffic respective at least of: the content and the simulated notification. | 07-09-2015 |