Patent classifications
G09C5/00
CONTENT FORMAT CONVERSION VERIFICATION
Content conversion verification, includes: converting, at a first computer system, an original content file to a target format, generating a converted content file in the target format; generating a checksum for the converted content file; and sending the original content file and the checksum to a second computer system. Key words include content verification and checksum.
METHOD AND APPARATUS FOR EMBEDDING AND EXTRACTING DIGITAL WATERMARKING FOR NUMERICAL DATA
There is provided a method for embedding a digital watermark into and extracting a digital watermark from a numerical data set. In accordance with embodiments of the present disclosure, there is provided a method for embedding a digital watermark into a numerical data set. The method includes selecting portions of the numerical data set identified as data noise, the selected portions to be used for embedding the digital watermark into the numerical data set, the digital watermark being unique for each recipient of the numerical data. The method further includes replacing the least significant bit (LSB) of at least some of the selected portions of the numerical data set with at least portion of the digital watermark.
Generating cryptographic function parameters based on an observed astronomical event
Methods, systems, and computer programs for generating cryptographic function parameters are described. In some examples, astronomical data from an observed astronomical event is obtained. A pseudorandom generator is seeded based on the astronomical data. After seeding the pseudorandom generator, an output from the pseudorandom generator is obtained. A parameter for a cryptographic function is generated by operation of one or more data processors. The parameter is generated from the output from the pseudorandom generator.
Generating cryptographic function parameters based on an observed astronomical event
Methods, systems, and computer programs for generating cryptographic function parameters are described. In some examples, astronomical data from an observed astronomical event is obtained. A pseudorandom generator is seeded based on the astronomical data. After seeding the pseudorandom generator, an output from the pseudorandom generator is obtained. A parameter for a cryptographic function is generated by operation of one or more data processors. The parameter is generated from the output from the pseudorandom generator.
System and Method for Internal Etching of Transparent Materials with Information Pertaining to a Blockchain
In one embodiment, a system includes a tangible token comprising a transparent gemstone. The transparent gemstone may be internally etched with information pertaining to a blockchain, and the information includes at least a private key, a public key, and an address. The information may pertain to a cryptocurrency transaction instruction stored on the blockchain.
Identity authentication method and apparatus
An identity authentication method, includes: at an electronic device having one or more processors and memory, the electronic device coupled with a display and one or more input devices: receiving an identity authentication request; in response to receiving the identity authentication request, performing an interactive authentication information exchange between the electronic device and a user, including: displaying, on the display, first visual information in a first manner; displaying, on the display, the first visual information in a second manner that is distinct from the first manner, wherein the first visual information displayed in the second manner includes a timing characteristic that is absent from the first visual information displayed in the first manner; receiving user input entered in accordance with the first visual information displayed in the second manner; and verifying that the user input conforms to the timing characteristic in the first visual information displayed in the second manner.
Identity authentication method and apparatus
An identity authentication method, includes: at an electronic device having one or more processors and memory, the electronic device coupled with a display and one or more input devices: receiving an identity authentication request; in response to receiving the identity authentication request, performing an interactive authentication information exchange between the electronic device and a user, including: displaying, on the display, first visual information in a first manner; displaying, on the display, the first visual information in a second manner that is distinct from the first manner, wherein the first visual information displayed in the second manner includes a timing characteristic that is absent from the first visual information displayed in the first manner; receiving user input entered in accordance with the first visual information displayed in the second manner; and verifying that the user input conforms to the timing characteristic in the first visual information displayed in the second manner.
Privacy-preserving image distribution
Some embodiments enable distributing data (e.g., recorded video, photographs, recorded audio, etc.) to a plurality of users in a manner which preserves the privacy of the respective users. Some embodiments leverage homomorphic encryption and proxy re-encryption techniques to manipulate the respective data so that selected portions of it are revealed according to an identity of the user currently accessing the respective data.
Vehicle bus message authentication using watermarking
An electronic control unit comprises circuitry to receive a combined signal via a vehicle bus of a vehicle, wherein the combined signal contains a combination of a data signal and a watermark signal, which can be a radio frequency (RF) signal or an analog baseband signal, wherein the data signal includes a message, circuitry to extract a watermark from the watermark signal, circuitry to verify the watermark based on a comparison of the watermark with a pre-defined watermark, circuitry to extract the data signal from the combined signal and obtain the message from the data signal, and circuitry to authenticate the message based on the verification of the watermark.
METHODS AND APPARATUSES FOR ACCESS CONTROL OF PRIVATE KEY INFORMATION IN UNIFORM RESOURCE LOCATORS (URLS) USING FRAGMENTS AND KEY DERIVATION FUNCTIONS
In an embodiment, a method includes receiving, via a processor of a first compute device, a request to send a digital asset associated with a digital account of a user. The method further includes generating, via the processor and in response to receiving the request, a URL that includes (1) a base URL and (2) a representation of a private key associated with the digital asset and the digital account of the user. The method further includes causing, via the processor, the URL to be received by a second compute device that is configured to have access to the digital asset in response to accessing the URL.