Abstract

The replacement of secret keys is a central problem in key management. Typical solutions exchange handshaking messages, involve complex computations, or require the cooperation of trusted third parties. Disclosed herein is a key replacement method that exploits the randomness of Markov models to efficiently provide fresh keys to users. Unlike other methods, the proposed method removes the need for extra communications, intensive computation, or third parties. It is demonstrated that the proposed method has perfect forward secrecy as well as resistance to known-key attacks.


Top

Abstract

Methods and apparatuses for authenticating a biometric scanner, such as area type finger print scanners, involves estimating unique intrinsic characteristics of the scanner (scanner pattern), that are permanent over time, and can identify a scanner even among scanners of the same manufacturer and model. Image processing and analysis are used to extract a scanner pattern from images acquired with the scanner.


Top

Abstract

Methods and apparatuses for authenticating a biometric scanner, such as swipe type finger print scanners, involves estimating unique intrinsic characteristics of the scanner (scanner pattern), that are permanent over time, and can identify a scanner even among scanners of the same manufacturer and model. Image processing and analysis are used to extract a scanner pattern from images acquired with the scanner.


Top

Abstract

Methods and systems involving image processing extract from an image and estimate unique intrinsic characteristics (scanner pattern) of a biometric scanner, such as area type fingerprint scanner. The scanner pattern is permanent over time, can identify a scanner even among scanners of the same manufacturer and model, and can be used to verify if a scanner acquired an image is the same as the scanner used for biometric enrollment, i.e., to authenticate the scanner and prevent security attacks on it.


Top

Top

Top

Top

Top

Abstract

A method is provided for generating a graph data representation having a plurality of nodes corresponding to respective systems engineering requirements. The method includes accessing a first data representation of a collection of systems requirements and relationships therebetween and generating a second data representation of the collection of systems requirements.


Top

Abstract

A parallel dilating-filters switched-capacitor filter bank is described in simulation of the cochlea. Area-saving is achieved by filter-sharing, effective sum-gain amplifier designs, and using area efficient nth-order filter designs, and in particular using a biquadratic filter design using charge-differencing. The structure is easily expandable to include more channels by extending with additional filters and output amplifiers, or by using several chips with different sampling frequencies in parallel connection.


Top

Pages