Patents
Literature
Hiro is an intelligent assistant for R&D personnel, combined with Patent DNA, to facilitate innovative research.
Hiro

30results about How to "Prevent unauthorized" patented technology

Apparatus and method to electromagnetically shield portable consumer devices

An apparatus and method is provided to shield contactless portable electronic consumer devices such as radio frequency identification devices (RFID), tokens, mini-cards, key fobs, cellular phones, smartcards, etc. from wireless interrogation. In one embodiment, a contactless portable consumer device which includes a first antenna is shielded from unauthorized wireless interrogation with a radio frequency (RF) shield. The RF shield includes electrically conductive, non-ferromagnetic material and is configured to prevent unauthorized data transfer between a second antenna external to the portable consumer device and the first antenna.
Owner:VISA USA INC (US)

Apparatus and method to electromagnetically shield portable consumer devices

An apparatus and method is provided to shield contactless portable electronic consumer devices such as radio frequency identification devices (RFID), tokens, mini-cards, key fobs, cellular phones, smartcards, etc. from wireless interrogation. In one embodiment, a contactless portable consumer device which includes a first antenna is shielded from unauthorized wireless interrogation with a radio frequency (RF) shield. The RF shield includes electrically conductive, non-ferromagnetic material and is configured to prevent unauthorized data transfer between a second antenna external to the portable consumer device and the first antenna.
Owner:VISA USA INC (US)

Computed radiography license method and system

A method for licensing a system for obtaining an X-ray image of a subject. The system employs flexible information carrier plates for computed radiography, which are exposed to X-rays and then scanned in a scanner. A license media is provided with a RFID transponder, which stores in its memory identification information referring to the system components as well as information referring to an amount of valid licenses available for use of the system components. When the identification information stored in the memory of the license media RFID transponder matches the identification information transmitted to the scanner by a processing and acquisition station the carrier plates are scanned automatically.
Owner:CARESTREAM DENTAL TECH TOPCO LTD

Privacy-aware content protection system

A method for preventing rendering of content at overlapping time periods on more rendering devices than permitted by a license associated with the content is disclosed. The method includes: transmitting the following to a rendering device of a user: the content, first software that is operative to receive the content and to associate keys with the content, identification information (ID) that is associated with the user, and second software that comprises a player for rendering the content, receiving the following information from the rendering device during rendering of the content: a number representation X which comprises a number representation in bits of a result obtained from encrypting together a number representation of a present time interval and the ID, both encrypted with a public key of a key pair generated at the rendering device, and a number representation which comprises a number representation in bits of a share (SH) of a private key of the key pair generated at the rendering device, and detecting an attempt to render the content at overlapping time periods on more rendering devices than permitted by the license associated with the content based on a determination that number representations X received from separate rendering devices are identical, and number representations Y received from the separate rendering devices and paired with the number representations X received from the separate rendering devices are different. Related apparatus and methods are also disclosed.
Owner:SYNAMEDIA LTD

Privacy-aware content protection system

A method for preventing rendering of content at overlapping time periods on more rendering devices than permitted by a license associated with the content is disclosed. The method includes: transmitting the following to a rendering device of a user: the content, first software that is operative to receive the content and to associate keys with the content, identification information (ID) that is associated with the user, and second software that comprises a player for rendering the content, receiving the following information from the rendering device during rendering of the content: a number representation X which comprises a number representation in bits of a result obtained from encrypting together a number representation of a present time interval and the ID, both encrypted with a public key of a key pair generated at the rendering device, and a number representation which comprises a number representation in bits of a share (SH) of a private key of the key pair generated at the rendering device, and detecting an attempt to render the content at overlapping time periods on more rendering devices than permitted by the license associated with the content based on a determination that number representations X received from separate rendering devices are identical, and number representations Y received from the separate rendering devices and paired with the number representations X received from the separate rendering devices are different. Related apparatus and methods are also disclosed.
Owner:SYNAMEDIA LTD

Distributed subscriber management system

A distributed subscriber management system and method that controls access to a network preventing unauthorized traffic through the access network and providing centralized access control between user networks are disclosed. The controlled access is provided through the use of one of several technologies including user authentication, using PAP, CHAP, RADIUS, TACACS+. The method includes the steps of receiving a connection request from a user located on one of the User Networks; interrogating the user for userid and password information; encrypting the userid and password information; transmitting the encrypted information, via the access network, to an authentication server attached to one of a plurality of external networks; decrypting the information at the authentication server; and transmitting an authentication message from the authentication server of the external network to the access control node via the access network. Additionally, the method includes the step of challenging all data leaving the access control node.
Owner:WSOU INVESTMENTS LLC

Electronic voting system and method of preventing unauthorized use of ballot cards therein

InactiveUS6997383B2Prevent unauthorized usePreventing unauthorized useVoting apparatusData processing applicationsReal-time computing
An electronic voting system includes a ballot card, accepting apparatus, and at least one voting apparatus. The accepting apparatus issues a ballot card in accordance with a vote acceptance request. The voting apparatus performs voting processing in accordance with a vote request using the ballot card. The accepting apparatus includes an acceptance time recording section which records the acceptance time on the ballot card when issuing the ballot card. The voting apparatus includes a timeout detecting section and unauthorized use warning display section. Before performing voting processing upon reception of a vote request, the timeout detecting section determines whether or not a preset timeout time has elapsed from the acceptance time recorded on the ballot card to the time of voting. The unauthorized use warning display section outputs a warning message when the timeout detecting section determines that the timeout time has elapsed.
Owner:NEC CORP
Who we serve
  • R&D Engineer
  • R&D Manager
  • IP Professional
Why Eureka
  • Industry Leading Data Capabilities
  • Powerful AI technology
  • Patent DNA Extraction
Social media
Try Eureka
PatSnap group products