G09C5/00

Method and system of computer graphics processing system validation for processing of encrypted image content

Methods, articles, and systems of computer graphics processing system validation for processing of encrypted image content are disclosed herein.

Method and system of computer graphics processing system validation for processing of encrypted image content

Methods, articles, and systems of computer graphics processing system validation for processing of encrypted image content are disclosed herein.

RECYCLING METHODS AND SYSTEMS, AND RELATED PLASTIC CONTAINERS

A plastic item, such as a beverage bottle, conveys two distinct digital watermarks, encoded using two distinct signaling protocols. A first, printed label watermark conveys a retailing payload, including a Global Trade Item Number (GTIN) used by a point-of-sale scanner in a retail store to identify and price the item when presented for checkout. A second, plastic texture watermark conveys a recycling payload, including data identifying the composition of the plastic. The use of two different signaling protocols assures that a point-of-sale scanner will not spend its limited time and computational resources working to decode the recycling watermark, which lacks the data needed for retail checkout. In some embodiments, a recycling apparatus makes advantageous use of both types of watermarks to identify the plastic composition of the item (e.g., relating GTIN to plastic type using an associated database), thereby increasing the fraction of items that are correctly identified for sorting and recycling. A great number of other features and arrangements are also detailed.

DECRYPTION OF QUICK RESPONSE OR OTHER CODE TO PRESENT CONTENT ON DISPLAY

In one aspect, a device may include at least one processor, a display accessible to the at least one processor, a camera accessible to the at least one processor, and storage accessible to the at least one processor. The storage may include instructions executable by the at least one processor to identify a decryption key, receive input from the camera, identify a quick response (QR) code based on the input from the camera, and use the decryption key to decrypt at least part of the QR code. The instructions may also be executable to identify a subset of content indicated via the QR code based on the decryption of the QR code and to then present the subset of content on the display.

Visual Image Authentication
20210365539 · 2021-11-25 ·

Methods and systems described herein authenticate a user and help secure transaction. A display screen presents images that are difficult for malware to recognize but a person can recognize. In at least one embodiment, a person communicates transaction information using visual images received from the service provider system. In at least one embodiment, a user selects a sequence of visual images as a means of authenticating the user and logging into a financial account or other corporate account.

In some embodiments, methods and systems are provided for determining whether to grant access, by generating and displaying visual images on a screen that the user can recognize, and select. In an embodiment, a user presses his or her finger or fingers on a display screen to select images as a method for authenticating and protecting communication from malware.

In an embodiment, non-determinism in hardware helps unpredictably vary the image selected, the image location, generate noise in the image, or change the shape or texture of the image. In some embodiments, visual image authentication helps Alice and Bob detect if Eve has launched a man-in-the-middle attack on their key exchange.

Portable data stack holder
11183084 · 2021-11-23 ·

A data storage device includes a plurality of tiles whose faces are marked with characters. An elongated core is configured to enable slots of the tiles to fit over an openable end of the core to mount the tiles on the core with the marked faces aligned and to slide along the core. The length of the core is sufficient such that tiles of a mounted stack of tiles are slidable away from other tiles of the stack to form a gap that is sufficient to enable reading the character on the tile. A locking element is placeable on the openable end to prevent removal of tiles from the stack, and removable to enable addition of tiles or removal of tiles. A casing is closable over the core and includes a limiting structure to limit sliding of the tiles when the casing is closed.

Portable data stack holder
11183084 · 2021-11-23 ·

A data storage device includes a plurality of tiles whose faces are marked with characters. An elongated core is configured to enable slots of the tiles to fit over an openable end of the core to mount the tiles on the core with the marked faces aligned and to slide along the core. The length of the core is sufficient such that tiles of a mounted stack of tiles are slidable away from other tiles of the stack to form a gap that is sufficient to enable reading the character on the tile. A locking element is placeable on the openable end to prevent removal of tiles from the stack, and removable to enable addition of tiles or removal of tiles. A casing is closable over the core and includes a limiting structure to limit sliding of the tiles when the casing is closed.

PRINTED MARKING FOR AN AUTHENTICATION METHOD, AND METHOD OF PRINTING AND OF AUTHENTICATING A PRINTED MARKING

A method of printing and of authenticating a marking, having a visible printed anti-copy pattern produced by pseudorandom noise that is generated on the basis of a secret generation key, includes processing at least one image of the printed anti-copy pattern. The anti-copy pattern is printed onto a marking substrate using predetermined printing conditions. The phase of marking control involves: regenerating the pseudorandom noise on the basis of the secret generation key; creating, computationally, a digital file of an image of a simulated printed anti-copy pattern which corresponding to a projected printing quality of the regenerated pseudorandom noise; capturing at least one image of the printed anti-copy pattern; and comparing the captured image of the printed anti-copy pattern with the image of the simulated anti-copy pattern in order to determine, computationally, a mathematical distance between the image of the printed anti-copy pattern and the image of the simulated anti-copy pattern.

Privacy-Preserving Image Distribution

Some embodiments enable distributing data (e.g., recorded video, photographs, recorded audio, etc.) to a plurality of users in a manner which preserves the privacy of the respective users. Some embodiments leverage homomorphic encryption and proxy re-encryption techniques to manipulate the respective data so that selected portions of it are revealed according to an identity of the user currently accessing the respective data.

Out-of-band authentication to access web-service with indication of physical access to client device
11178148 · 2021-11-16 · ·

Provided is a process that affords out-of-band authentication for confirmation of physical access or when a device utilized for out-of-band authentication lacks connectivity to a network. An asymmetric cryptographic key-pair is established, a first device obtaining a key operable to decrypt data. A remote server obtaining a key operable to encrypt data and associating that key with an identifier of an identity or account associated with a user. An access attempt from the second device is received in association with the identifier of the identity associated with the user. A notification including data encrypted by the encryption key is generated by the remote server and transmitted to the second device. The first device obtains the notification data from the second device and decrypts the data to determine a notification response which is returned to the remote server for verification to permit or deny the access attempt of the second device.