Patent classifications
H04K1/00
LIGHT-BASED COMMUNICATION PROCESSING
Disclosed are methods, devices, systems, media, and other implementations that include a method to process a light-based communication, including providing a light-capture device with one or more partial-image-blurring features, and capturing at least part of at least one image of a scene, that includes at least one light source emitting the light-based communication, with the light-capture device including the one or more partial-image-blurring features. The partial-image-blurring features are configured to cause a blurring of respective portions of the part of the captured image affected by the partial-image-blurring features. The method also includes decoding data encoded in the light-based communication based on the respective blurred portions, and processing the at least part of the at least one image including the blurred respective portions affected by the one or more partial-image-blurring features to generate a modified image portion (e.g., relatively less blurry, etc.) for the at least part of the at least one image.
Device pairing via device to device contact
A system may include and/or involve a first device, a second device, and logic to effect pairing of the first and second devices upon detection of physical contact between the devices.
TECHNOLOGIES FOR RADIO EQUIPMENT CYBERSECURITY AND MULTIRADIO INTERFACE TESTING
The present disclosure is related to reconfigurable radio equipment and edge computing, and in particular, to technologies for cyber security and radio equipment supporting certain features ensuring protection from fraud, and testing interfaces related to reconfigurable radio equipment. Other embodiments may be described and/or claimed.
Data encryption in medical devices with limited computational capability
A medical device with limited computational capability includes medical hardware, a first register to store a static, substantially unique identifier of the medical device, a second register to store a static encryption key, an interface to receive and transmit data over a short-range communication link, and processing hardware. The processing hardware is configured to apply the static encryption key to the identifier of the medical device to generate an encrypted identifier, transmit the encrypted identifier of to another device via the interface, receive an encrypted identifier of the other device, decrypt the encrypted identifier of the other device using the static encryption key to determine an identifier of the other device, generate a dynamic encryption key using the identifier of the medical device and the identifier of the other device, and apply the dynamic encryption key to medical data transmitted between the medical device and the other device.
Pairing device
A pairing device for establishing a secure wireless communication path between a first device having a first body-coupling communication interface and a second device having a screen. The pairing device includes a screen communication interface having a light sensor, which, in conjunction with the screen of the second device, allows definition of a light-based communication path for the transmission of a first pairing information from the second device to the pairing device, a calculator for generating a second pairing information once the first pairing information has been received by the pairing device, a second body-coupling communication interface, which in conjunction with the first body-coupling communication interface allows the definition of a body-coupling communication path for the transmission of the second pairing information from the pairing device to the first device, the second pairing information allowing the establishment of a secure wireless communication path between the first device and the second device.
Authentication system, authentication apparatus, and authentication method
An authentication system includes a plurality of authentication apparatuses, each of which includes first biological information of a same set of users; a crosschecking unit for crosschecking input biological information with a part of the first biological information; a transmitter for assigning second biological information included in the first biological information other than the part of the first biological information to the other authentication apparatuses without assigning same information in the second biological information to other authentication apparatuses, and to request the other authentication apparatuses to crosscheck the input biological information with the assigned second biological information; and a receiver for receiving, from the one or more other authentication apparatuses, one or more results of crosschecking the input biological information with the assigned second biological information by the one or more other authentication apparatuses in response to the requesting.
METHOD FOR PHYSICAL LAYER SECURED MESSAGE SCRAMBLING
Methods, systems, and devices for wireless communications are described. A first wireless device may communicate, with a second wireless device, a first set of messages of a first message type that are acknowledged according to an acknowledgement procedure. The first wireless device, the second wireless device, or both may select a first subset of messages of the first plurality of messages and a first subset of bits from each message of the first subset of messages based on the first set of messages being acknowledged and according to a sampling configuration common to both the first wireless device and the second wireless device. The first wireless device, the second wireless device, or both may generate a key using bit values of the first subset of bits from each message of the first subset of messages, encoding a message using the key, and communicate the encoded message.
System and method for cross-contamination prevention
Cross-contamination prevention systems and cross-contamination prevention methods are provided for defining and automatically enforcing access restrictions between environments where cross-contamination may occur. The system and methods can evaluate a person's exposure to contaminants in one or more locations against contamination risk posed for another location. The system can prevent or allow access to the other location based on that evaluation. Some embodiments can be implemented in a laboratory setting and configured to prevent cross-contamination between different laboratories and/or experiments being conducted.
Digital signature method
A method for signing and subsequently verifying a digital message, including the following steps implemented using at least one processor-based subsystem: selecting parameters including an integer q and a relatively smaller integer p that is coprime with q; generating random polynomial f relating to p and random polynomial g relating to q; producing a public key that includes h, where h is equal to a product that can be derived using g and the inverse of f mod q; producing a private key from which f and g can be derived; storing the private key and publishing the public key; producing a message digest by applying a hash function to the digital message; producing a digital signature using the message digest and the private key; and performing a verification procedure utilizing the digital signature and the public key to determine whether the signature is valid.
Host based rekeying
A system and method for re-keying ciphertext on a storage system is resident on a host/client communicating with a storage system. The generation of encryption keys and tracking which storage system blocks are encrypted with what keys remain with the security appliance or storage system, but the policy governing re-keying and initiating actions in accordance with that policy reside with the client/host.