721 research outputs found

    Mechanism to Authenticate a Reader to a Credential

    Get PDF
    Access to data objects stored on a credential such as a badge, smart card, etc. is typically limited to user authorization through the use of a user-entered PIN or other mechanism. This disclosure describes techniques to enable a credential reader to authenticate itself to a credential and access protected objects on the credential without user interaction and without the use of any global credential. The techniques define a simplified public-key infrastructure (PKI) hierarchy appropriate for typical credentials, which are usually low-powered, passive, and offline

    Data Object Extensions for Access Control Credentials

    Get PDF
    Traditional access control credentials require authentication against a backend and have no mechanism to work offline. Also, traditional credentials such as badges typically have a photo to identify the credential holder. The forgery of the outward appearance of a credential to the extent that it will pass a visual inspection is easily possible, even when modern anti-forgery techniques are employed. This disclosure describes techniques that extend security credentials to provide secure, authenticated, offline access. An authorized person can validate a badge or other credential by tapping it against an authenticated credential reader. Data on the credential is containerized such that specific data objects are accessible by specific classes of credential readers. For example, a credential reader operated by a security officer may have access to name, image, and emergency contact information stored on the credential while a credential reader operated by a receptionist can have access to only the name and image

    Transferring Credentials Between Devices

    Get PDF
    A badge user may want to use a different device, e.g., a smartphone, a smartwatch, etc., as their credential in lieu of the badge. This disclosure describes techniques to securely transfer credentials from a first device (e.g., badge) to a second device (e.g., phone) such that only one device with valid credentials exists at any time. Per the techniques, the two devices perform a cryptographic transfer to move credentials, and the credentials on the first device are destroyed. In this manner, only one credential at a time can be authenticated for the user. The techniques can operate offline, e.g., with neither device having internet access; it is just the two devices that need communicate with each other

    How Do the Elderly Fare in Medical Malpractice Litigation, Before and After Tort Reform? Evidence from Texas

    Get PDF
    The elderly account for a disproportionate share of medical spending, but little is known about how they are treated by the medical malpractice system, or how tort reform affects elderly claimants. We compare paid medical malpractice claims brought by elderly plaintiffs in Texas during 1988–2009 to those brought by adult non-elderly plaintiffs. Controlling for healthcare utilization (based on inpatient days), elderly paid claims rose from about 20% to about 40% of the adult non-elderly rate by the early 2000s. Mean and median payouts per claim also converged, although the elderly were far less likely to receive large payouts. Tort reform strongly affected claim rates and payouts for both groups, but disproportionately reduced payouts to elderly claimants. We thus find evidence of convergence between the elderly and the adult non-elderly in both claim rates and payouts, which is interrupted by tort reform
    • …
    corecore