Patent application number | Description | Published |
20080199011 | Transponder System for Transmitting Key-Encrypted Information and Associated Keys - A transponder ( | 08-21-2008 |
20080209214 | Method of Authentication Based on Polyomials - There is provided an authentication method for a system ( | 08-28-2008 |
20080222426 | Security Device - A security device comprising means for authenticating an entity using biometric data, characterized by means for alternatively authenticating the entity using a security code such as a personal identification number. Also a system configured to grant an authorization upon a successful authorization by the security device, in which the authorization granted after the authentication using the security code is restricted in scope compared to the authorization granted after the authentication using the biometric data. | 09-11-2008 |
20080256600 | Device, System and Method for Determining Authenticity of an Item - This invention relates to physical uncloneable function (PUF) devices for determining authenticity of an item, systems for determining authenticity of a physical item, and methods for determining authenticity of an item. A PUF pattern of the PUF device is damaged when using the item for the first time. | 10-16-2008 |
20080262788 | On-Chip Estimation of Key-Extraction Parameters for Physical Tokens - The present invention relates to a method and a device ( | 10-23-2008 |
20080271115 | Method and System for Authentication of a Low-Resource Prover - A method is presented for enabling authentication of a prover in a Radio Frequency Identification system comprising the prover and a verifier, the method comprising the steps of: the prover sending a prover identifier and a parent identifier to the verifier, the verifier sending a verifier identifier to the prover, the prover calculating a first common secret by means of a prover polynomial, where an unknown in the prover polynomial is substituted by a result calculated using a function of at least the verifier identifier, and the verifier calculating the first common secret by means of a first verifier polynomial, wherein a first unknown in the first verifier polynomial is substituted by the prover identifier and a second unknown in the first verifier polynomial is substituted by the parent identifier, the prover creating a first message by modulating a first core secret with regard to at least the first common secret, aid prover sending the first message to the verifier, and the verifier creating a first candidate for the first core secret by demodulating the first message with the first common secret, whereby the candidate for the first core secret is for use in the authentication. This allows the verifier and prover to independently create a common secret, used for modulating the core secret. Furthermore, no pre-registration of the prover with the verifier is required and calculation using polynomials requires little processing power. A corresponding system, prover and verifier are also presented. | 10-30-2008 |
20080282343 | Digital Rights Management Using Biometric Data - Present inventions relates to a method of digital rights management for content data, comprising the steps of: obtaining ( | 11-13-2008 |
20100026461 | EXTENDED FUNCTIONALITY OF RFID DEVICES - It is described a RFID device ( | 02-04-2010 |
20110215829 | IDENTIFICATION OF DEVICES USING PHYSICALLY UNCLONABLE FUNCTIONS - A method of generating a response to a physically unclonable function, said response being uniquely representative of the identity of a device having challengeable memory, the memory comprising a plurality of logical locations each having at least two possible logical states, the method comprising applying a challenge signal to an input of said memory so as to cause each of said logical locations to enter one of said two possible logical states and thereby generate a response pattern of logical states, said response pattern being dependent on said physically unclonable function which is defined by, the physical characteristics of said memory, the method further comprising reading out said response pattern. | 09-08-2011 |