Patent classifications
G09C5/00
Solid-state imaging device, method for driving solid-state imaging device, and electronic apparatus
A solid-state imaging device includes a pixel part, a reading part for reading a pixel signal from the pixel part and a response data generating part including a fuzzy extractor. The response data generating part generates response data including a unique key in association with at least one selected from among variation information of pixels and variation information of the reading part. The response data generating part generates, when regenerating a key, a unique key using helper data acquired in generation of an initial key, variation information acquired in the regeneration of the key, and reliability information determined based on the variation information acquired in the regeneration of the key.
Image distribution using composite re-encrypted images
Some embodiments enable distributing data (e.g., recorded video, photographs, recorded audio, etc.) to a plurality of users in a manner which preserves the privacy of the respective users. Some embodiments leverage homomorphic encryption and proxy re-encryption techniques to manipulate the respective data so that selected portions of it are revealed according to an identity of the user currently accessing the respective data.
Integrating and detecting visual data security token in displayed data via graphics processing circuitry using a frame buffer
An apparatus, method, and computer readable medium that include establishing a video connection between the apparatus and a first device, in response to establishing the video connection, transmitting a token to a second device equipped with a display, the token being displayed on the display of the second device, receiving visual data comprising the token displayed on the display of the second device, the visual data being generated by the first device, that includes a camera, capturing the token displayed on the display of the second device, accessing a frame buffer of a graphics processing unit (GPU), analyzing, in the frame buffer of the GPU, a frame representing a section of the visual data to detect the token, and in response to the token being detected in the visual data, generating an authentication to authenticate the video connection between the apparatus and the first device.
INTEROPERABLE MOBILE-INITIATED TRANSACTIONS WITH DYNAMIC AUTHENTICATION
A transaction is pre-staged by providing transaction preferences, such as a financial instrument, a transaction type, and a transaction amount, to a user device. The user device captures a visual code at a terminal, such as an ATM. The visual code includes terminal attributes, including a signed hash and call-back URI. The user device authenticates the visual code using the signed hash and requests the transaction through the issuer server. The issuer server creates and sends the card data to the call-back URI. The terminal uses the card data to create a transaction request it routes to through its acquirer server.
Display of encrypted content items
A method of displaying content items, for example message items in a messaging application or service, is disclosed. The method comprises receiving encrypted content items in a chronological sequence; decrypting the content items; causing display of a display sequence, in order of the chronological sequence, of a respective place holder in place of each of the decrypted content items, and, in response to a user input, causing display of the respective content item in place of one or more of the place holders. Each place holder has an appearance of a scrambled version of the respective content item. The display sequence may be contiguous in received items or sent content items may be interleaved with received content items in the display sequence, in which case sent content items may be displayed with place holders in the same way as received items. A corresponding system and corresponding computer readable medium or media are also disclosed.
CLOUD DOOR LOCK CONTROL SYSTEM WITH IDENTIFICATION OF TIME VARIED 2D CODES
A cloud door lock control system with identification of time varied 2D codes is provided. A cloud device transmits the encryption codes of doors to be opened, the time periods for opening the doors, and the user's encryption codes to the handset through a communication channel and the handset stores these values in a memory. A mobile phone APP receives these values and encrypts them by using a specific encrypting code. The encoding way for the encoding unit is time varied, that is, the QR code from the encoding unit is only retained for a preset time period; after the preset time period has elapsed, the encoding unit generates another QR code. When the cloud device receives the QR code from a card reader, it is decoded. These decoded data is compared with those stored in the cloud device to determine whether the door is necessary to be opened.
Perturbation-based techniques for anonymizing datasets
In various embodiments, a dataset generation application generates a new dataset based on an original dataset. The dataset generation engine perturbs a first data item included in the original dataset to generate a second data item. The dataset generation application then generates a test dataset based on the original dataset and the second data item. The test dataset includes the second data item instead of the first data item. Subsequently, the dataset generation application determines that the test dataset is characterized by a first property value that is substantially similar to a second property value that characterizes the original dataset. The first property value and the second property value are associated with the same property. Finally, the dataset generation application generates a new dataset based on the test dataset. The new dataset conveys aspect(s) of the original dataset without revealing the first data item.
Perturbation-based techniques for anonymizing datasets
In various embodiments, a dataset generation application generates a new dataset based on an original dataset. The dataset generation engine perturbs a first data item included in the original dataset to generate a second data item. The dataset generation application then generates a test dataset based on the original dataset and the second data item. The test dataset includes the second data item instead of the first data item. Subsequently, the dataset generation application determines that the test dataset is characterized by a first property value that is substantially similar to a second property value that characterizes the original dataset. The first property value and the second property value are associated with the same property. Finally, the dataset generation application generates a new dataset based on the test dataset. The new dataset conveys aspect(s) of the original dataset without revealing the first data item.
Long-term offline management of cryptographic parameters
A method for the interception-proof transmission of at least one cryptographic parameter from a user to an encrypted offline storage medium, comprising steps of: cloaking an upward portion of a substrate with an upper plate, characterized in that said upper plate comprises a multitude of indicia, wherein each indicium has a corresponding manipulation indicator; sequentially positioning a manipulation apparatus over one or more of the manipulation indicators; mechanically manipulating the substrate, after each sequential positioning of the manipulation apparatus, using said manipulation apparatus, characterized in that the manipulation indicator of the desired indicium overlaps with one mechanical manipulation unit of the substrate; and deconstructing said substrate in two or more complementary units, characterized in that said complementary units each comprises at least one mechanical manipulation unit administered by the manipulation apparatus.
Long-term offline management of cryptographic parameters
A method for the interception-proof transmission of at least one cryptographic parameter from a user to an encrypted offline storage medium, comprising steps of: cloaking an upward portion of a substrate with an upper plate, characterized in that said upper plate comprises a multitude of indicia, wherein each indicium has a corresponding manipulation indicator; sequentially positioning a manipulation apparatus over one or more of the manipulation indicators; mechanically manipulating the substrate, after each sequential positioning of the manipulation apparatus, using said manipulation apparatus, characterized in that the manipulation indicator of the desired indicium overlaps with one mechanical manipulation unit of the substrate; and deconstructing said substrate in two or more complementary units, characterized in that said complementary units each comprises at least one mechanical manipulation unit administered by the manipulation apparatus.