Abstract: Systems, methods, and apparatuses for providing chiplet binding to a disaggregated architecture for a system on a chip are described. In one embodiment, system includes a plurality of physically separate dies, an interconnect to electrically couple the plurality of physically separate dies together, a first die-to-die communication circuit, of a first die of the plurality of physically separate dies, comprising a transmitter circuit and an encryption circuit having a link key to encrypt data to be sent from the transmitter circuit into encrypted data, and a second die-to-die communication circuit, of a second die of the plurality of physically separate dies, comprising a receiver circuit and a decryption circuit having the link key to decrypt the encrypted data sent from the transmitter circuit to the receiver circuit.
Abstract: A method of obfuscating a circuit design includes, in part, receiving data representative of the circuit design. The method further includes, in part, simulating the circuit design, and obfuscating at least one output signal of the circuit design if a user performing the simulation is determined as not being an authorized user.
Abstract: Various embodiments provide methods for validating hardware modifications of an IHS (Information Handling System) by confirming that a hardware modification corresponds to a hardware component supplied for installation in the IHS by a trusted entity. During factory provisioning of an IHS, an inventory certificate that specifies the factory installed IHS hardware is uploaded to the IHS and is also stored for ongoing support of the IHS. Upon a hardware component being supplied for installation in the IHS by a trusted entity, the inventory of the stored inventory certificate is updated to identify the supplied component and the updated certificate is transmitted to the IHS. An inventory of detected hardware components of the IHS is compared against the inventory from the updated inventory certificate in order to validate the detected hardware of the IHS includes the component, supplied by the trusted entity, that is identified in the updated inventory certificate.
Type:
Grant
Filed:
October 2, 2023
Date of Patent:
September 24, 2024
Assignee:
Dell Products, L.P.
Inventors:
Jason Matthew Young, Marshal F. Savage, Mukund P. Khatri
Abstract: A method is performed with a group of chiplets. The method includes: (1) parsing a message into at least a group of ordered message blocks associated with a group of index values, which are indicative of positions of individual message blocks relative to one another; (2) generating two or more substitution values based at least in part on execution of two or more pseudo-random number generators (PNRG's) using seeds associated with the bits of blocks of the group of message blocks; (3) generating two or more sequencing values based at least in part on execution of two or more PNRG's using seeds associated with index values of the group of index values; (4) generating a group of ciphertext blocks at least in part with XOR operations using at least the substitution values and the sequencing values; (5) concatenating the group of ciphertext blocks; and (6) transmitting.
Abstract: A cryptographic method includes (1) with the first chiplet, parsing a message into one or more message blocks (2) dynamically generating a first target value that is associated with a first key (3) dynamically generating a second target value that is associated with a second key (4) encrypting at least one message block of the at least one or more message blocks to generate some ciphertext, the encryption being performed with at least one operation that includes at least one XOR operation, the at least one XOR operation performed at least in part with the first target value and with at least the second target value, the first target value and the second target value being accessed via the first and second keys, respectively; and (5) with at least one processing device associated with the first chiplet, transmitting the some ciphertext to a second chiplet.
Abstract: Various embodiments provide methods for validating hardware modifications of an IHS (Information Handling System) by confirming that a hardware modification corresponds to a hardware component supplied for installation in the IHS by a trusted entity. During factory provisioning of an IHS, an inventory certificate that specifies the factory installed IHS hardware is uploaded to the IHS and is also stored for ongoing support of the IHS. Upon a hardware component being supplied for installation in the IHS by a trusted entity, the inventory of the stored inventory certificate is updated to identify the supplied component and the updated certificate is transmitted to the IHS. An inventory of detected hardware components of the IHS is compared against the inventory from the updated inventory certificate in order to validate the detected hardware of the IHS includes the component, supplied by the trusted entity, that is identified in the updated inventory certificate.
Type:
Grant
Filed:
December 30, 2020
Date of Patent:
November 7, 2023
Assignee:
Dell Products L.P.
Inventors:
Jason Matthew Young, Marshal F. Savage, Mukund P. Khatri
Abstract: A method for partially unmasking an object in a video stream comprises: displaying a first video stream in which objects are covered by privacy masks; receiving user input regarding a selection of an object being covered by a privacy mask, wherein the object has a first portion being associated with a first privacy level and a second portion being associated with a second, higher, privacy level; checking that a permission associated with the user input grants access to video data depicting object portions being associated with the first privacy level; giving access to video data depicting the first portion of the object; and displaying a second video stream which differs from the first video stream in that it includes the video data depicting the first portion of the object, while the second portion of the object is still covered by a privacy mask.
Abstract: Techniques for cryptographically protecting personally identifiable information in images and videos are described herein. An image may be obtained. One or more regions in the image may be detected based on an object detection algorithm. Pixels for each region of the one or more regions may be encrypted using a symmetric encryption technique and an initialization vector. The encrypted pixels for each region of the one or more regions may be written back into the image. A symmetric key of the symmetric encryption technique and the initialization vector may be encrypted using an asymmetric encryption technique. Metadata of the image may be updated to store the encrypted symmetric key and the encrypted initialization vector.
Abstract: Methods and apparatus are disclosed for supplementing partially readable and/or inaccurate codes. An example apparatus includes a watermark analyzer to select a first watermark and a second watermark decoded from media; a comparator to compare a first decoded timestamp of the first watermark to a second decoded timestamp of the second watermark; and a timestamp adjuster to adjust the second decoded timestamp based on the first decoded timestamp of the second watermark when at least a threshold number of symbols of the second decoded timestamp match corresponding symbols of the first decoded timestamp.
Type:
Grant
Filed:
April 30, 2020
Date of Patent:
November 15, 2022
Assignee:
The Nielsen Company (US), LLC
Inventors:
David Gish, Jeremey M. Davis, Wendell D. Lynch, Christen V. Nielsen
Abstract: Systems, methods, machine-readable media, and media device are provided to facilitate seamless flow content splicing to dynamically insert particularized content items in television programming content. A plurality of particularized content items may be received and stored in a content store. First content that corresponds to television programming may be received and processed to detect a first set of color characteristics of video content. A subset of the particularized content items may be selected based on matching a second set of color characteristics of the subset of the particularized content items to the first set of color characteristics of the video content corresponding to the television programming. The first content may be output for display. Then, the subset of the particularized content items may be output for display in succession so that display of the subset of the particularized content items directly follows display of the first content.
Abstract: Embodiments contemplate coding video data by generating a video encoded bitstream that may include reference picture set (RPS) extensions for inter-layer reference pictures, and the extensions may include inter-layer delta Picture Order Counts (POCs). Embodiments may also include signaling that lower layer reference pictures may be available in a lower layer decoder picture buffer (DPB), and/or an aggregate DPB, that may be added to the RPS set of a higher layer. The bitstream may include a signal indicating whether the higher layer RPS may be specified by a lower layer RPS, and the lower layer RPS may be temporal, inter-layer prediction (ILP), or both.
Type:
Grant
Filed:
January 31, 2013
Date of Patent:
September 13, 2022
Assignee:
VID SCALE, Inc.
Inventors:
Yong He, Yan Ye, George W. McClellan, Jie Dong
Abstract: Exemplary embodiments are directed to methods and systems for annotating generating training data for video quality impairment detection. A video stream recorder extracts one or more image frames from a reference video stream as it is played. A video image labeler embeds a unique label into each of the one or more extracted image frames. The video stream recorder records the one or more labeled image frames as a labeled video stream. The video stream player then plays the labeled video stream through an impaired communication channel to generate a degraded video stream. A video image comparator compares one or more corresponding frames of the labeled video stream and the degraded video stream to generate one or more difference frames. An impaired image recorder annotates at least one of the one or more difference frames according to a corrupted region of the at least one difference frame.
Type:
Grant
Filed:
July 29, 2020
Date of Patent:
July 19, 2022
Assignee:
ARRIS Enterprises LLC
Inventors:
Pierre A. Brice, Wayne D. Woodruff, Olga Malysheva, Robert Begley
Abstract: For example, an Enhanced Directional Multi-Gigabit (DMG) (EDMG) wireless communication station (STA) may be configured to scramble, according to a first scrambling sequence, a plurality of EDMG Header B bits of an EDMG Header B field of an EDMG Multi-User (MU) Physical Layer (PHY) Protocol Data Unit (PPDU) into a plurality of scrambled header bits; generate a Low-Density Parity-Check (LDPC) codeword based on the plurality of scrambled header bits; determine a data block based on the LDPC codeword; generate one or more scrambled data blocks based on the data block by scrambling the data block according to a second scrambling sequence; and transmit a wireless transmission of the EDMG Header B based on the one or more scrambled data blocks.
Type:
Grant
Filed:
March 26, 2020
Date of Patent:
May 17, 2022
Assignee:
INTEL CORPORATION
Inventors:
Artyom Lomayev, Alexander Maltsev, Michael Genossar, Claudio Da Silva, Carlos Cordeiro
Abstract: Methods and systems for invisible watermarking of images and video are disclosed. According to one embodiment, a method for watermarking video comprises selecting a block corresponding to a subset of pixels in a video frame. The block has quantized coefficients generated during encoding of the block. A modification function is applied to a candidate quantized coefficient (QC) in the block to incorporate a bit of a watermark message. The modification function is based on a set of configuration parameters.
Abstract: Techniques for encrypting content in a content distribution network are disclosed. The content distribution network may comprise a number of national and local sites, and a number of hubs at each local sites. A content segment encrypting device may be operative at a local site to encrypt and cache segments of content. The segment encrypting device may provide the segments to streaming devices that encode content for delivery downstream to network or user devices.
Type:
Grant
Filed:
July 27, 2016
Date of Patent:
April 19, 2022
Assignee:
Comcast Cable Communications, LLC
Inventors:
Robert Gaydos, Weidong Mao, James Barkley
Abstract: This invention relates to a network interface device. A first capture device interfaces with a first external information source to capture first external information. A processor processes the captured first external information and stores it in a first media. The processor initiates the storage of the first captured information at an initial time and completes storage of the first captured information at a completion time, thus providing a stored defined set of first captured information. A transmitter transmits the defined set of stored captured information to a remote location on a network. A remote processing system is disposed at the remote node on the network and includes a database and a receiver for receiving the transmitted defined set of first captured information. A data converter is operable to convert the received defined set of first captured information to a second format. The database stores the set of converted captured information.
Abstract: Methods and systems for embedding data in an image. The methods include, by a computing device: receiving data indicative of a source of an image that is one of a series of images that collectively provide a visual representation of a state of an application of the computing device, identifying, region of the image that is the same in another image of the series of images, determining a size of the identified region, and embedding the data within the identified region of the image in response to a comparison between the determined size of the identified region and a threshold.
Abstract: A communication system uses multiple communications links, preferably links that use different communications media. The multiple communications links may include a high latency/high bandwidth link using a fiber-optic cable configured to carry large volumes of data but having a high latency. The communications links may also include a low latency/low bandwidth link implemented using skywave propagation of radio waves and configured to carry smaller volumes of triggering data with a lower latency across a substantial portion of the earth's surface. The triggering data may be sent in a data stream as data frames without headers, security information, or error checking codes. The two communications links may be used together to coordinate various activities such as the buying and selling of financial instruments.
Abstract: The implementations of the present specification provide an image privacy protection method, apparatus, and device. The method includes: performing privacy content recognition on an original image; in response to a privacy content being recognized, determining a local region including the privacy content from the original image; performing privacy protection processing on image data for the determined local region to generate data of a privacy-protected original image, the privacy protection processing including at least one of image scrambling processing or image obfuscation processing; and performing image compression processing on the data of the privacy-protected original image to generate data of a compressed image, and using the compressed image as image data to be transmitted or stored.
Type:
Grant
Filed:
June 29, 2021
Date of Patent:
January 25, 2022
Assignee:
Alipay (Hangzhou) Information Technology Co., Ltd.
Abstract: Methods, systems, and apparatus, including computer programs encoded on computer storage media, for video buffering are provided. One of methods includes: determining a buffered video interval in a video according to a video play position and a video buffered position of the video; determining a to-be-buffered target video interval in the video based on the buffered video interval; performing fragmentation on a video part that is not buffered, not fragmented, and in the to-be-buffered target video interval, to obtain at least one fragment; and buffering each of the at least one fragment.
Abstract: An image processing apparatus which extracts a region of a foreground object in a captured image obtained by an imaging unit, and controls a display unit to display an output image formed by superimposing, on a predetermined image, a first image formed by anonymizing the extracted region, and a second image formed by anonymizing a region designated by a user on the captured image, wherein an appearance of the second image is different from an appearance of the first image, a region of a foreground object is extracted from a region other than at least the designated region in the captured image, and even when the designated region contains the foreground object, the first image in the designated region is not displayed on the output image.
Abstract: An encrypted gallery management system and an implementation method thereof, comprising a management server and at least one information device, wherein the system converts one or more sets of corresponding time digital information into a time digital information totem and an encryption key totem, the time digital information totem and the encryption key totem are synthesized into an encrypted image. After user scans the encrypted image with his information device to obtain the totems, the information device can upload the totems to the management server for verification and comparison so that the management server is enabled to respond a specific service information to the information device so as to restrict the access of the information and thus prevent other unauthorized persons from obtaining the service information.
Abstract: For example, an Enhanced Directional Multi-Gigabit (DMG) (EDMG) wireless communication station (STA) may be configured to scramble, according to a first scrambling sequence, a plurality of EDMG Header B bits of an EDMG Header B field of an EDMG Multi-User (MU) Physical Layer (PHY) Protocol Data Unit (PPDU) into a plurality of scrambled header bits; generate a Low-Density Parity-Check (LDPC) codeword based on the plurality of scrambled header bits; determine a data block based on the LDPC codeword; generate one or more scrambled data blocks based on the data block by scrambling the data block according to a second scrambling sequence; and transmit a wireless transmission of the EDMG Header B based on the one or more scrambled data blocks.
Type:
Grant
Filed:
June 18, 2018
Date of Patent:
October 26, 2021
Assignee:
INTEL CORPORATION
Inventors:
Artyom Lomayev, Alexander Maltsev, Michael Genossar, Claudio Da Silva, Carlos Cordeiro
Abstract: A data transmission method, a terminal, and an access-network network element are disclosed. An interface is disposed on a policy client of UE and an operating system or an application layer of the UE. The interface is used to provide the operating system or the application layer with a policy related to the operating system or the application layer, and collect, from the operating system or the application layer, information required for a report. In this way, a dedicated transport channel is implemented by a bottom layer of the UE, reports and policies are transmitted on the dedicated transport channel, and during implementation, a protocol is not coupled with the application layer or the operating system, so that the system is simple to implement.
Abstract: Apparatus and methods for encrypting captured media. In one embodiment, the method includes capturing media data via use of a lens of an image capture apparatus; obtaining a number used only once (NONCE) value from the captured media data; obtaining an encryption key for use in encryption of the captured media data; using the obtained NONCE value and the obtained encryption key for encrypting the captured media data; and storing the encrypted media data. In some variants, the media is encrypted prior to storage, thereby obviating any instances in which the captured media data resides in a wholly unencrypted instance. Apparatus and methods for decrypting encrypted captured media are also disclosed.
Abstract: In an embodiment of the present disclosure, an embodiment includes a user device comprises a conversion engine configured to receive a biometric file comprising biometric identification information of a user and convert the biometric file into a first numeric representation. The user device further comprises a hashing engine configured to create a superimposed numeric representation by performing a convolution operation on the first numeric representation and a second numeric representation, wherein the second numeric representation is based on a key file that is different from the biometric file. The hashing engine is further configured to convert the superimposed numeric representation into a hash value, send, over a network connection, the hash value for authentication, and receive a message indicating whether authentication was successful.
Abstract: In an embodiment of the present disclosure, a biometric identification device comprises a conversion engine configured to receive a key file, receive a biometric file, wherein the biometric file is different from the key file and comprises biometric identification information of a user, convert the key file into a first numeric representation, and convert the biometric file into a second numeric representation. The biometric identification device further comprises a hashing engine configured to create a superimposed numeric representation by performing a convolution operation on the first numeric representation and the second numeric representation, convert the superimposed numeric representation into a hash value, and store the hash value.
Abstract: A method for covertly transmitting a packet of data over a network is provided. A datagram for transmission is fragmented. A portion of the data in the datagram is encrypted and stored within a fragment section of the datagram which is not a first fragmented section. Only the fragmented section that contains the encrypted data is transmitted. No other fragment of the fragmented datagram is transmitted such that the lone fragment transmission will appear as error.
Abstract: The present disclosure relates to systems, methods, and computer-readable media to selectively enhance digital image and video content. For example, systems disclosed herein can encode original video content to compress and decompress the original video content. Systems described herein can further identify area of interest information for use in identifying portions of decompressed video content to analyze and remove one or more compression artifacts found therein. Systems described herein can further enhance the decompressed video content by increasing resolution for display. By identifying areas of interest and selectively enhancing digital video content, the systems described herein can reduce consumption of bandwidth and processing resources while maintaining high visual quality of the digital content.
Type:
Grant
Filed:
June 10, 2019
Date of Patent:
June 8, 2021
Assignee:
MICROSOFT TECHNOLOGY LICENSING, LLC
Inventors:
Daniel Gilbert Kennett, Eric Cameron Walston, Matthew Gordon
Abstract: An autonomous driving controller includes a plurality of parallel processors operating on common input data received from the plurality of autonomous driving sensors. Each of the plurality of parallel processors includes communication circuitry, a general processor, a security processor subsystem (SCS), and a safety subsystem (SMS). The communication circuitry supports communications between the plurality of parallel processors, including inter-processor communications between the general processors of the plurality of parallel processors, communications between the SCSs of the plurality of parallel processors using SCS cryptography, and communications between the SMSs of the plurality of parallel processors using SMS cryptography, the SMS cryptography differing from the SCS cryptography. The SCS and/or the SMS may each include dedicated hardware and/or memory to support the communications.
Type:
Grant
Filed:
April 18, 2019
Date of Patent:
May 11, 2021
Assignee:
Tesla, Inc.
Inventors:
Thaddeus Fortenberry, Samuel Douglas Crowder, Patryk Kaminski, Daniel William Bailey, David Glasco
Abstract: Described embodiments provide systems and methods for data encryption. A server communicating data with a client can determine a level of data encryption on the data that the server is capable of handling according to resources available to the server. A level of data encryption can include a type of encryption and a strength of the type of data encryption. The server can receive a level of data encryption on the data that the client is capable of handling according to resources available to the client. The server can identify a level of data encryption with which the server and the client agree to proceed, according to the determined level of data encryption and the received level of data encryption. The server, following a predefined interval, can identify an updated level of data encryption with which the server and the client agree to proceed.
Type:
Grant
Filed:
January 10, 2018
Date of Patent:
April 6, 2021
Assignee:
Citrix Systems, Inc.
Inventors:
Marcos Alejandro Di Pietro, Thierry Duchastel
Abstract: In the embodiments of the present invention, a transmit optical signal includes a reference optical signal and a quantum optical signal, optical splitting processing and coherent coupling are performed on the transmit optical signal by using a local oscillator optical signal to obtain at least two coherently coupled optical signals, and then optical-to-electrical conversion and amplification are separately performed on a first coherently coupled optical signal that includes the reference optical signal and a second coherently coupled optical signal that includes the quantum optical signal, to obtain a first electrical signal and a second electrical signal. Then, phase frequency information between the local oscillator optical signal and the reference optical signal is obtained from the first electrical signal, and an original key is recovered from the second electrical signal based on the phase frequency information.
Abstract: A method, an information handling system (IHS) and a license file generating system for generating a license file. The method includes receiving, via a processor of a first information handling system (IHS), a plurality of input parameters associated with a product and generating license data at least partially based on the input parameters. The license data is transmitted to a hardware security module (HSM). The method further includes triggering the HSM to retrieve a certificate containing allowable use data. The allowable use data at least partially identifies a permitted installation of a license for the product. The HSM is triggered to embed a signer identifier within the certificate and the HSM is triggered to sign the certificate. The method further includes receiving a signed certificate from the HSM and generating a license file including the license data and the signed certificate. The license file is transmitted to a second IHS.
Type:
Grant
Filed:
August 2, 2017
Date of Patent:
February 16, 2021
Assignee:
Dell Products, L.P.
Inventors:
Jason M. Young, Wayne R. Weilnau, Marshal F. Savage
Abstract: A method for the display of an image in a display area, the method comprising: requesting, from a server, a scrambled image file using an image identifier, the scrambled image file containing the image in a scrambled form; receiving the scrambled image file; dividing the scrambled image file into a plurality of image fragments, the image fragments having a first order within the scrambled image file; and rendering the image fragments on to the display area in a second order derived from the image identifier to display the image in unscrambled form.
Type:
Grant
Filed:
September 15, 2016
Date of Patent:
January 12, 2021
Assignee:
SmartFrame Technologies Limited
Inventors:
Shaun Curry, Patrick Krupa, Artur Wisniewski
Abstract: A mechanism is described for facilitating protection and recovery of identities in surveillance camera environments according to one embodiment. An apparatus of embodiments, as described herein, includes detection and reception logic to receive a video stream of a scene as captured by a camera, wherein the scene includes persons. The apparatus may further include recognition and application logic to recognize an abnormal activity and one or more persons associated with the abnormal activity in a video frame of the video stream. The apparatus may further include identity recovery logic to recover one or more identities of the one or more persons in response to the abnormal activity, where the one or more identities are recovered from masked data and encrypted residuals associated with the one or more persons.
Abstract: This invention relates to a network interface device. A first capture device interfaces with a first external information source to capture first external information. A processor processes the captured first external information and stores it in a first media. The processor initiates the storage of the first captured information at an initial time and completes storage of the first captured information at a completion time, thus providing a stored defined set of first captured information. A transmitter transmits the defined set of stored captured information to a remote location on a network. A remote processing system is disposed at the remote node on the network and includes a database and a receiver for receiving the transmitted defined set of first captured information. A data converter is operable to convert the received defined set of first captured information to a second format. The database stores the set of converted captured information.
Abstract: A method of identifying an item of video content involves providing a spatial hash value and a temporal hash value for each image in a video collection. Each hash value is based on a measure of the entropy in differences between pixel values. A table of the pair of hash values against timecode is created and ordered according to one of the hash values. A search for a given pair of hash values can then be confined to that part of the table that matches the first value.
Abstract: The disclosure includes a system and method for associating protection data to a video object and verifying the content and source of the video object based on the protection data. A video processing application receives, at a producer, a video object; computes, at the producer, a digital signature based on content of the first video object; adds, at the producer, identification information of the producer to the digital signature of the first video object, the producer being a source of the first video object; transmits the first video object along with the digital signature from the producer to a first consumer; and authenticates, at the first consumer, the content and source of the first video object based on the digital signature.
Type:
Grant
Filed:
March 8, 2018
Date of Patent:
July 14, 2020
Assignee:
Ricoh Co., Ltd.
Inventors:
Hector H. Gonzalez-Banos, Ramya Narasimha
Abstract: Some demonstrative embodiments include apparatus, system and method of communicating a transmission encoded according to a Low-Density Parity-Check (LDPC) code. For example, an apparatus may include logic and circuitry configured to cause a wireless station to encode a plurality of data bits into a plurality of codewords according to an LDPC code having an encoding rate of 7/8 and a codeword length of 1248 bits; and to transmit a transmission over a millimeter Wave (mmWave) frequency band based on the plurality of codewords.
Type:
Grant
Filed:
September 9, 2018
Date of Patent:
May 19, 2020
Assignee:
INTEL CORPORATION
Inventors:
Artyom Lomayev, Iaroslav P. Gagiev, Alexander Maltsev, Michael Genossar, Carlos Cordeiro
Abstract: In one aspect, a computerized method includes the step of obtaining an original digital image to scrambled. The computerized method includes the step of creating a copy of the digital image. The computerized method includes the step of delineating a first pixel-box grid on the digital image. The computerized method includes the step of delineate a second pixel-box grid on the copy of the digital image. The computerized method includes the step of joining the original digital image and the copy of the digital image. The he first pixel-box grid of the original digital image and of the second pixel-box grid are offset by a specified number of pixels; and scrambling the first pixel-box grid of the original digital image and of the second pixel-box grid of the copy of the digital image into an encoded digital image.
Abstract: This disclosure relates to a method for securely transmitting secret information to a user, including receiving by the user terminal, from a secure processor, a software component protected against tampering and reverse-engineering and configured to generate sets of adjacent pixels having a probability lower than 100% to be in a visible or invisible state, executing the software component by the user terminal, at a frame display refresh rate, to generate the pixel sets at the display refresh rate, inserting the pixel sets generated by each execution of the software component into one respective image frame, and activating display of the image frames at the frame display refresh rate, the image frames including information which is machine unintelligible as being formed of the pixel sets, the information becoming intelligible to a user at the display refresh rate based on a human visual system.
Abstract: Methods and systems for dynamically generating a verification value for a transaction and for utilizing such value to verify the authenticity of the payment service application. The dynamically created verification value may be generated on a payment device, such as an integrated circuit credit card or smart card, embedded into the payment data, and transmitted to a point of sale terminal. Alternatively, payment data is sent by a payment device to a point of sale terminal, which generates a verification value and embeds it into the payment data. The embedded verification value is used by a service provider to verify the authenticity of the transaction. The methods and systems may be used in a contactless (wireless) environment or a non-wireless environment.
Abstract: In an embodiment of the present disclosure, an embodiment includes a user device comprises a conversion engine configured to receive a biometric file comprising biometric identification information of a user and convert the biometric file into a first numeric representation. The user device further comprises a hashing engine configured to create a superimposed numeric representation by performing a convolution operation on the first numeric representation and a second numeric representation, wherein the second numeric representation is based on a key file that is different from the biometric file. The hashing engine is further configured to convert the superimposed numeric representation into a hash value, send, over a network connection, the hash value for authentication, and receive a message indicating whether authentication was successful.
Abstract: In an embodiment of the present disclosure, a biometric identification device comprises a conversion engine configured to receive a key file, receive a biometric file, wherein the biometric file is different from the key file and comprises biometric identification information of a user, convert the key file into a first numeric representation, and convert the biometric file into a second numeric representation. The biometric identification device further comprises a hashing engine configured to create a superimposed numeric representation by performing a convolution operation on the first numeric representation and the second numeric representation, convert the superimposed numeric representation into a hash value, and store the hash value.
Abstract: An information processing apparatus includes a storage device configured to store data, an encryption chip configured to store an encryption key therein, a nonvolatile memory configured to store a backup encryption key, and a control unit configured to confirm whether the data stored in the storage device has been correctly decrypted by using the encryption key, and when the data has not been correctly decrypted, restore the backup encryption key to the encryption chip, and when the data has been correctly decrypted, back up the backup encryption key, which is a backup of the encryption key, stored in the encryption chip into the nonvolatile memory.
Abstract: A portable communication system (100) maintains mission critical functionality. An accessory (120) and a handset (130) are tethered and interoperate such that the accessory operates as the primary controlling device and the handset operates as a secondary device. The accessory (120) contains a main applications processor (102) that handles non-mission critical functions. The accessory further contains a mission critical processor (104) for handling mission critical functions of transmit and receive audio as well as PTT and emergency. In response to a failure of the mission critical processor (104), the mission critical functions are maintained by handing over the mission critical functions to the non-controlling device in a manner transparent to the user. The handover is triggered in response to status changes of the mission critical processor or as a result of battery depletion. Audio paths are re-routed through backup paths (146b, 148) negating reliance on processors of the accessory (120).
Type:
Grant
Filed:
June 4, 2018
Date of Patent:
July 2, 2019
Assignee:
MOTOROLA SOLUTIONS, INC.
Inventors:
Javier Alfaro, Kurt S. Fienberg, Daniel Landron, Kevin D. Elliott, David Corvino, Hua Li
Abstract: An imaging unit captures an image. A communication unit communicates with a base station device and acquires ease information related to ease of communication with at least one base station device and associated with positional information. A display unit displays an image captured by the imaging unit, and displays the ease information in the image, associating the positional information in the ease information with coordinates in the image.
Abstract: This invention relates to a network interface device. A first capture device interfaces with a first external information source to capture first external information. A processor processes the captured first external information and stores it in a first media. The processor initiates the storage of the first captured information at an initial time and completes storage of the first captured information at a completion time, thus providing a stored defined set of first captured information. A transmitter transmits the defined set of stored captured information to a remote location on a network. A remote processing system is disposed at the remote node on the network and includes a database and a receiver for receiving the transmitted defined set of first captured information. A data converter is operable to convert the received defined set of first captured information to a second format. The database stores the set of converted captured information.
Abstract: A method and an apparatus for controlling access to a surveillance video are provided. The method includes: acquiring from a user account a view request for viewing a surveillance video file, the view request including authorization information of the user account; performing an identity authentication on the user account according to the authorization information; and allowing a user with the user account to view the surveillance video file when the identity authentication is passed. The present disclosure is used to prohibit freely viewing the surveillance video file.
Type:
Grant
Filed:
April 4, 2016
Date of Patent:
January 29, 2019
Assignee:
XIAOMI INC.
Inventors:
Wei Wang, Bo Zhang, Ziguang Gao, Mingjun Yin
Abstract: A portable video delivery device includes data storage, a secure processor, and a wireless network interface that acts as an access point for a secure personal wireless network. Transcoded media files are stored in the data storage so that the portable device maintains a library of stored media programs that can be carried along with the user during commuting, travel and/or other activities. To playback the stored programming, other media player devices use the personal wireless network to securely connect to the portable device and to obtain previously-transcoded content from the data storage of the device.