Unlock instant, AI-driven research and patent intelligence for your innovation.

Security system for high level transactions between devices

A technology of host equipment and remote equipment, which is applied in the field of security systems for advanced transactions, and can solve problems such as increased security risks

Inactive Publication Date: 2003-08-27
TECHLINK INT ENTERTAINMENT
View PDF0 Cites 1 Cited by
  • Summary
  • Abstract
  • Description
  • Claims
  • Application Information

AI Technical Summary

Problems solved by technology

[0013] Furthermore, as passwords, personal identification numbers (PINs), cards and tokens are increasingly used to access remote accounts, the security risks associated with users owning and managing many different security devices continue to increase

Method used

the structure of the environmentally friendly knitted fabric provided by the present invention; figure 2 Flow chart of the yarn wrapping machine for environmentally friendly knitted fabrics and storage devices; image 3 Is the parameter map of the yarn covering machine
View more

Image

Smart Image Click on the blue labels to locate them in the text.
Viewing Examples
Smart Image
  • Security system for high level transactions between devices
  • Security system for high level transactions between devices
  • Security system for high level transactions between devices

Examples

Experimental program
Comparison scheme
Effect test

example 1

[0236] In a poker game using 52 cards, the host system requests a card from the deck. As requested by the host system, the HRNG controller takes a set of random bit streams, constructs a deck of cards, and manages the distribution of the deck. If the poker game requires multiple decks of cards, the hardware random number generator controller constructs the cards to be presented to the host system as required.

example 2

[0238] A keno game using 80 numbers. The host system requests a keno number, and the HRNG controller takes a stream of random bits, constructs a set of 80 numbers, and manages its allocation as requested by the host system.

[0239] Authorization system using biometric identification

[0240] According to another embodiment of the present invention shown in FIG. 6, a system and method for verifying the identity of a user intending to access a security system of a service provider is provided. An example of such a system is the Internet or unsupervised gaming venues or sites where the user's age is a legally important parameter for operating the site and / or financial institution's website involving personal financial data.

[0241] In order to access this security system, the following registration can be performed:

[0242] 1. Potential users 50 intending to register with the service provider 52 will make their natural appearance at the registration center 54 or secure locat...

the structure of the environmentally friendly knitted fabric provided by the present invention; figure 2 Flow chart of the yarn wrapping machine for environmentally friendly knitted fabrics and storage devices; image 3 Is the parameter map of the yarn covering machine
Login to View More

PUM

No PUM Login to View More

Abstract

The invention provides a security system and methods for high level transactions between devices. The system includes a non-deterministic hardware random number generator to provide multi-level encryption between a remote and host device.

Description

technical field [0001] The present invention provides a secure system and method for advanced transactions between devices. The system includes a non-deterministic hardware random number generator (HRNG) that provides multiple levels of encryption between the remote device and the host device. Background technique [0002] In a world where the Internet and electronic transactions are becoming increasingly popular, transaction security is a top concern for all parties involved in a transaction. Such security is necessary in order to minimize the risk of unwanted third parties obtaining information about the transaction and / or obtaining information that can later gain access to a particular device or system. In today's busy electronic world, all types of transactions, including transactions between individuals, transactions between individuals and merchants / institutions, and transactions between merchants or institutions require transaction security. Additionally, in some en...

Claims

the structure of the environmentally friendly knitted fabric provided by the present invention; figure 2 Flow chart of the yarn wrapping machine for environmentally friendly knitted fabrics and storage devices; image 3 Is the parameter map of the yarn covering machine
Login to View More

Application Information

Patent Timeline
no application Login to View More
Patent Type & Authority Applications(China)
IPC IPC(8): G06F1/00G06F21/00G07F7/10
CPCG06F2211/007G06Q20/40975G06F21/32G06Q20/341G06Q20/3823G06F21/34G07F7/1008
Inventor 维克托·Y·曹约翰·西多斯
Owner TECHLINK INT ENTERTAINMENT