Patent application number | Description | Published |
20100264324 | RADIATION DETECTOR COMPRISING AN IMAGING RADIATION-COLLIMATING STRUCTURE - The invention relates to a radiation detector ( | 10-21-2010 |
20120263367 | METHOD FOR SIMULATING REDUCTION OF ACQUISITION DOSAGE OF AN X-RAY SYSTEM, COMPUTER SYSTEM AND X-RAY SYSTEM - The present invention relates to X-ray generating technology in general. It is desirable to perform an X-ray image acquisition with a minimal required dosage for obtaining a desired image quality. Accordingly, a method for simulating reduction of acquisition dosage of an X-ray image, a computer system, an X-ray system, a computer-readable medium and a program element is provided. The method ( | 10-18-2012 |
20130343631 | MEDICAL IMAGING DEVICE FOR PROVIDING AN IMAGE REPRESENTATION SUPPORTING IN POSITIONING AN INTERVENTION DEVICE - A medical imaging device and a method for providing an image representation supporting positioning of an intervention device such as a wire tip ( | 12-26-2013 |
20140307855 | REAL-TIME FEEDBACK FOR PREVENTING HIGH DOSE C-ARCH GEOMETRY POSITIONS - The present invention relates to an apparatus for aiding operation of an interventional x-ray imager during image acquisition, to a method of aiding operation of an x-ray imager, to an interventional x-ray imager, to a computer program element and to a computer readable medium. The X-ray imager is capable of varying X-ray dosages depending on differences in X-ray attenuation levels across an object of interest to be imaged and is capable of assuming any one of a plurality of imaging geometry positions when acquiring an image. An indication, visual, acoustic or haptic, to the operator of an X-ray imager is provided on the incurred change in X-ray dosage when changing from a current projection view to an updated projection view, provided that a given constant image quality is to be maintained throughout the different views. | 10-16-2014 |
Patent application number | Description | Published |
20090193511 | TWO-FACTOR USB AUTHENTICATION TOKEN - The present patent application discloses a USB token that advantageously mimics a human interface device such as a keyboard in interacting with a host computer, thus removing the need for pre-installation of a dedicated device driver. This is accomplished by requiring the host computer to direct the input of the attached human interface devices of the keyboard type, including the USB token, exclusively to the program interacting with the USB token, by using cryptographic algorithms based on a shared secret, which require less data to be transferred than PKI-based algorithms, and by employing an efficient encoding scheme that minimizes the time needed to exchange information with the USB token, and minimizes the probability of generating ambiguity with input that might legitimately be generated by other attached human interface devices. By using only symmetric encryption and the low-speed USB protocol, a single low-performance processor may be used, which results in a more cost-effective solution than PKI USB tokens emulating the combination of smart cards and smart card readers or USB tokens presenting themselves to the host computer as mass storage devices. The overall security is increased by adding a second authentication factor consisting of a static password entered by the user, and by limiting the number of valid token response that can be generated or retrieved in a usage session. | 07-30-2009 |
20090235339 | STRONG AUTHENTICATION TOKEN GENERATING ONE-TIME PASSWORDS AND SIGNATURES UPON SERVER CREDENTIAL VERIFICATION - The invention defines a strong authentication token that remedies a vulnerability to a certain type of social engineering attacks, by authenticating the server or messages purporting to come from the server prior to generating a one-time password or transaction signature; and, in the case of the generation of a transaction signature, signing not only transaction values but also transaction context information and, prior to generating said transaction signature, presenting said transaction values and transaction context information to the user for the user to review and approve using trustworthy output and input means. It furthermore offers this authentication and review functionality without sacrificing user convenience or cost efficiency, by judiciously coding the transaction data to be signed, thus reducing the transmission size of information that has to be exchanged over the token's trustworthy interfaces | 09-17-2009 |
20100065646 | METHOD FOR POST-MANUFACTURING DATA TRANSFER TO AND FROM A SEALED DEVICE - The present invention is directed towards authentication tokens that are completely embedded in a non-conductive enclosure. The invention is based on the insight that it would be advantageous to separate the electronic data personalization of such tokens from the visual device personalization. The present application concerns an authentication token that allows communication with an external unit after the production of the nonconductive enclosure, in order to transmit or receive device identification data. As this communication need only take place during the manufacturing process, a low-power close-range transmission technique such as inductive coupling, capacitive coupling, or RFID communication suffices for this purpose. Accordingly, the present application discloses a method for manufacturing authentication tokens, and a token manufactured according to said method. | 03-18-2010 |
20110099377 | COMPACT SECURITY DEVICE WITH TRANSACTION RISK LEVEL APPROVAL CAPABILITY - The present invention relates to the field of securing electronic transactions and more specifically to methods to indicate and verify the approval of the risk level of a transaction and to apparatuses for generating transaction risk level approval codes. | 04-28-2011 |
20110099384 | STRONG AUTHENTICATION TOKEN USABLE WITH A PLURALITY OF INDEPENDENT APPLICATION PROVIDERS - The present invention defines a strong authentication token for generating different dynamic credentials for different application providers comprising an input interface providing an output representing an application provider indicator; a secret key storage for storing one or more secret keys; a variability source for providing a dynamic variable value; a key providing agent for providing an application provider specific key as a function of said application provider indicator using one or more keys stored in said secret key storage; a cryptographic agent for cryptographically combining said application provider specific key with said dynamic variable value using symmetric cryptography; a transformation agent coupled to said cryptographic agent for transforming an output of said cryptographic agent to produce a dynamic credential; and an output interface to output said dynamic credential. | 04-28-2011 |
20110258452 | REMOTE AUTHENTICATION AND TRANSACTION SIGNATURES - The invention provides a method, apparatus, computer readable medium and signal which allows the usage of devices containing PKI private keys such as PKI-enabled smart cards or USB sticks to authenticate users and to sign transactions. The authenticity of the user and/or the message is verified. Furthermore the operation (authentication and/or signing) occurs without the need for an application to have some kind of a direct or indirect digital connection with the device containing the private key. In addition the operation occurs without the need for the PKI-enabled device containing the private key (e.g. a PKI smart card or USB stick) to either support symmetric cryptographic operations or to have been personalized with some secret or confidential data element that can be read by a suitable reader. | 10-20-2011 |
20120221860 | METHOD AND APPARATUS FOR ENCODING AND DECODING DATA TRANSMITTED TO AN AUTHENTICATION TOKEN - Methods and apparatus for encoding and decoding data transmitted acoustically and/or optically to strong authentication tokens to generate dynamic security values are disclosed. The tokens may also include a selection mechanism to select either an acoustical or an optical input interface to receive data. A communication interface may be provided to communicate with a removable security device such as a smart card and the token may be adapted to generate dynamic security values in cooperation with the removable security device. | 08-30-2012 |
20140189359 | REMOTE AUTHENTICATION AND TRANSACTION SIGNATURES - Authentication devices and methods for generating dynamic credentials are disclosed. The authentication devices include a communication interface for communicating with a security device such as a smart card. A dynamic credential such as a one-time password (OTP) or a message authentication code (MAC) may be generated by receiving from a server an encrypted initialization seed encrypted with an asymmetric encryption algorithm using a public key of a public/private key pair, submitting the encrypted initialization seed to a security device, decrypting at the security device the encrypted initialization seed with a private key of the public/private key pair, returning the decrypted initialization seed to the authentication device, deriving at the authentication device a secret credential generation key from the decrypted initialization seed, and generating the dynamic credential by combining a dynamic variable with the secret credential generation key using a symmetric cryptographic dynamic credential generation algorithm. | 07-03-2014 |
20140237242 | COMPACT SECURITY DEVICE WITH TRANSACTION RISK LEVEL APPROVAL CAPABILITY - The present invention relates to the field of securing electronic transactions and more specifically to systems to indicate and verify the approval of the risk level of a transaction and to systems for generating transaction risk level approval codes. | 08-21-2014 |