G09C5/00

System and method for simplified wifi set up of client devices
11251955 · 2022-02-15 · ·

A wireless communication device for use with a communication device and a network gateway connected to the Internet, wherein the communication device can communicate with the network gateway. The wireless communication device includes: a communication component operable to communicate with the network gateway; a memory component having temporary network access credentials stored therein; and a credential feature associated with the temporary network access credentials and being accessible by the communication device. The communication component can further establish a temporary network connection with the gateway based on the temporary network access credentials, and can further join a permanent network with the gateway.

Providing Low Risk Exceptional Access
20170272248 · 2017-09-21 · ·

A method and system for providing unencrypted access to encrypted data that may be stored on a device, sent as a message, or sent as a real-time communications stream. The method may include using public key cryptography to securely enable accessing the encrypted data stored on a device or communicated by a device. For instance, the method may include using a device vendor's public key to securely enable that vendor to enable only authorized parties to themselves decrypt previously-encrypted device storage, messages, or real-time communications streams.

Authentication method and system

The present invention provides a method and apparatus for the production and labeling of objects in a manner suitable for the prevention and detection of counterfeiting. Thus, the system incorporates a variety of features that make unauthorized reproduction difficult. In addition, the present invention provides an efficient means for the production of labels and verification of authenticity, whereby a recording apparatus which includes a recording medium, having anisotrophic optical domains, along with a means for transferring a portion of the recording medium to a carrier, wherein a bulk portion of the recording medium has macroscopically detectable anisotrophic optical properties and the detecting apparatus thereon.

Authentication method and system

The present invention provides a method and apparatus for the production and labeling of objects in a manner suitable for the prevention and detection of counterfeiting. Thus, the system incorporates a variety of features that make unauthorized reproduction difficult. In addition, the present invention provides an efficient means for the production of labels and verification of authenticity, whereby a recording apparatus which includes a recording medium, having anisotrophic optical domains, along with a means for transferring a portion of the recording medium to a carrier, wherein a bulk portion of the recording medium has macroscopically detectable anisotrophic optical properties and the detecting apparatus thereon.

Visible-light communication-based encryption, decryption and encryption/decryption method and system

Embodiments of the present invention provide a method and system of encryption, decryption, and encryption and decryption based on visible light communication. A transmit end performs a logical operation on an original data signal and a pseudocode signal varying with a unit interval to obtain a scrambling code signal, and sends the scrambling code signal in a form of a visible light signal. A receive end receives the visible light signal sent by the transmit end, and converts the visible light signal into a digital signal; and decodes the digital signal and a pseudocode signal varying with a unit interval, so as to obtain the original data signal. The visible light signal transmitted between the transmit end and the receive end is not original data, but a scrambling code signal varying with a unit interval, thereby improving security of the photonic Internet of Things.

Visible-light communication-based encryption, decryption and encryption/decryption method and system

Embodiments of the present invention provide a method and system of encryption, decryption, and encryption and decryption based on visible light communication. A transmit end performs a logical operation on an original data signal and a pseudocode signal varying with a unit interval to obtain a scrambling code signal, and sends the scrambling code signal in a form of a visible light signal. A receive end receives the visible light signal sent by the transmit end, and converts the visible light signal into a digital signal; and decodes the digital signal and a pseudocode signal varying with a unit interval, so as to obtain the original data signal. The visible light signal transmitted between the transmit end and the receive end is not original data, but a scrambling code signal varying with a unit interval, thereby improving security of the photonic Internet of Things.

System for real-time authenticated obfuscation of electronic data

A system for real-time authenticated obfuscation of electronic data provides real-time visual obfuscation of the data by transforming displayed data into undecipherable data when viewed by an unauthorized user while maintaining access for an authorized user. The system may further provide application-level obfuscation of electronic data via cryptographic keys such that only authorized applications may decrypt the encrypted data. In this way, the system provides secure access control of electronic data within a networked environment.

TRANSMIT AN AUTHENTICATION MARK
20170262861 · 2017-09-14 ·

Examples disclosed herein relate to transmitting an authentication mark. For example, a processor creates an authentication mark for a two factor authentication system. The authentication mark is created according to data represented by a data bearing image. The processor transmits via a network the authentication mark to a computing device.

Decryption of quick response or other code to present content on display

In one aspect, a device may include at least one processor, a display accessible to the at least one processor, a camera accessible to the at least one processor, and storage accessible to the at least one processor. The storage may include instructions executable by the at least one processor to identify a decryption key, receive input from the camera, identify a quick response (QR) code based on the input from the camera, and use the decryption key to decrypt at least part of the QR code. The instructions may also be executable to identify a subset of content indicated via the QR code based on the decryption of the QR code and to then present the subset of content on the display.

Method for generating cryptographic “one-time pads” and keys for secure network communications
09762560 · 2017-09-12 · ·

A method of generating random and pseudo-random material which is incorporated in devices located at each end of a communications network for secure communications through a channel of the network. The material is used to generate time based one-time pads, one-time keys, and the keys themselves. The one-time pads, one-time keys, and the keys support a key-based or pad based cryptographic technique employed to produce secure communications of messages transmitted through the channel with a one-time pad, one-time key, or a key generated at one interval of time being different and unique from a one-time pad, one-time key, or a key generated at any other interval of time.