Patent classifications
G09C5/00
RELATIONSHIPS MANAGEMENT SYSTEMS, METHODS, AND APPARATUSES
Relationships management systems, methods, and apparatuses are discussed herein. Techniques may include establishing, in a relationships management system, a user profile. The user profile may be associated with at least a first access level comprising a first plurality of functions and a second access level comprising a second plurality of functions. The first access level and the second access level may be defined based at least in part on input via a user interface.
THREE-DIMENSIONAL PUZZLE
A three-dimensional puzzle comprising a plurality of cuboid puzzle blocks together forming a predetermined three-dimensional puzzle shape, wherein each puzzle block comprises either a male or a female connecting element on each of at least three sides of the puzzle block; wherein the connecting elements for the respective puzzle block are configured such that each puzzle block is unique.
METHODS AND SYSTEMS FOR NETWORK-ENABLED ACCOUNT CREATION USING OPTICAL DETECTION
Provided is a network-enabled method for creating an online account using a network of devices. The method comprises: receiving by an authentication system, a request to create an online account with an online server; generating a visual graphical code by the authentication system, which is displayed on a display screen and comprises a validation identity; acquiring image data of the visual graphical code from a user device with aid of optical detection apparatus, by capturing an image of the visual graphical code displayed on the display screen; processing the image data to extract the validation identity; based on the validation identity identifying an online serve provider associated with the online server and user information categories associated with the online account; and based on identification information related to the user identifying the user, and the data to the online server for the online account with the online server.
Authentication method for a computing device using interactive game board and game piece images
An authentication method and system includes a computing device, such as a smart phone, which includes a display for presenting a graphical and interactive game board that is used for entering a user's passcode. During the authentication process, the user selects a game board (e.g. chess, checkers, poker, backgammon, etc.) and associated game pieces for presentation on the display. The user then moves one or more game pieces to locations on the game board. Together, the selected game board, selected game pieces, and the movements and/or locations which the game pieces are moved on the game board form an entered passcode. This generated passcode is then compared with a stored passcode to authenticate the user before granting access to the computing device.
Authentication method for a computing device using interactive game board and game piece images
An authentication method and system includes a computing device, such as a smart phone, which includes a display for presenting a graphical and interactive game board that is used for entering a user's passcode. During the authentication process, the user selects a game board (e.g. chess, checkers, poker, backgammon, etc.) and associated game pieces for presentation on the display. The user then moves one or more game pieces to locations on the game board. Together, the selected game board, selected game pieces, and the movements and/or locations which the game pieces are moved on the game board form an entered passcode. This generated passcode is then compared with a stored passcode to authenticate the user before granting access to the computing device.
OPTICAL ENCRYPTION TERMINAL, CRYPTOGRAPHY KEY DISTRIBUTION SYSTEM AND METHOD OF GENERATING CRYPTOGRAPHY KEYS IN A CRYPTOGRAPHY KEY DISTRIBUTION SYSTEM
In an aspect, the present invention provides an optical encryption terminal for generating and distributing a cryptographic key signal in a cryptography key distribution system having at least two optical encryption terminals. The optical encryption terminal comprises an electronic processing unit and the optical encryption terminal is configured to selectively receive optical input signals generated by a source of electromagnetic radiation and optical input signals generated by a further optical encryption terminal, and to selectively output first optical output signals to a detection element and second optical output signals to the further optical encryption terminal, wherein the first optical output signals are based on the optical input signals generated by the further optical encryption terminal and transformed in accordance with an optical encryption pattern provided at the optical encryption terminal. Furthermore, the optical encryption terminal is configured to determine, using the electronic processing unit, a cryptographic key signal on the basis of at least one radiometric and/or photometric quantity associated with the optical output signals detected by the detection element.
Onboard vehicle digital identification transmission
A computer-implemented method includes: establishing a connection between a user device of a user and a system onboard a vehicle being driven by the user; requesting access, through the established connection, to user information on the user device; in response to a grant of access, retrieving at least a portion of the user information from the user device, the portion of user information including a digital identification document of the user that had been issued by an entity after having vetted the user, the digital identification document including a digital biometric of the user as well as a digital watermark indicating the issuing entity; and retaining, on the system onboard the vehicle, data encoding the digital identification document of the user on the vehicle such that when the vehicle is inspected by a third-party agent, the digital identification document of the user is presented to the third-party agent.
Onboard vehicle digital identification transmission
A computer-implemented method includes: establishing a connection between a user device of a user and a system onboard a vehicle being driven by the user; requesting access, through the established connection, to user information on the user device; in response to a grant of access, retrieving at least a portion of the user information from the user device, the portion of user information including a digital identification document of the user that had been issued by an entity after having vetted the user, the digital identification document including a digital biometric of the user as well as a digital watermark indicating the issuing entity; and retaining, on the system onboard the vehicle, data encoding the digital identification document of the user on the vehicle such that when the vehicle is inspected by a third-party agent, the digital identification document of the user is presented to the third-party agent.
METHOD AND SYSTEM OF COMPUTER GRAPHICS PROCESSING SYSTEM VALIDATION FOR PROCESSING OF ENCRYPTED IMAGE CONTENT
Methods, articles, and systems of computer graphics processing system validation for processing of encrypted image content are disclosed herein.
METHOD AND SYSTEM OF COMPUTER GRAPHICS PROCESSING SYSTEM VALIDATION FOR PROCESSING OF ENCRYPTED IMAGE CONTENT
Methods, articles, and systems of computer graphics processing system validation for processing of encrypted image content are disclosed herein.