G06F7/582

Electronic device with display panel copy protection module and method for determining duplicate display panel

A method for determining whether or not a display panel is a duplicate is provided. The method includes: generating, by a code generator in an electronic module, a code, the electronic module including a plurality of electronic components; transmitting, by the code generator, the code to each of a first sequence generator in the electronic module and a second sequence generator in a display panel, the display panel being configured to be mounted to the electronic module; generating, by the first sequence generator, a first response value, and transmitting the first response value to a certification component in the electronic module; generating, by the second sequence generator, a second response value, and transmitting the second response value to the certification component; and comparing, by the certification component, the received first response value and the received second response value.

Deterministic jitter generator with controllable probability distribution
11515860 · 2022-11-29 · ·

A jitter generator may include a duty cycle code generator that generates a duty cycle control signal and an input buffer that outputs a signal based on its duty cycle. The input buffer may be coupled to the duty cycle code generator and to a source of a clock signal. After receiving the clock signal, the input buffer outputs the clock signal having jitter relative to the clock signal received from the source. The jitter may be added at least in part by components of the input buffer offsetting different transitions of the clock signal according to the duty cycle. Jitter may be added when the duty cycle changes in response to changes in the duty cycle control signal, such as in response to number generator circuitry of the duty cycle code generator update its output number, in response to a mode change received from a controller, or the like.

SIGNAL RANDOMNESS VALUE ESTIMATION

A system comprising at least one hardware processor and a non-transitory computer-readable storage medium having stored thereon program code, the program code executable by the at least one hardware processor to receive a sequence comprising n bits, apply a transformation to the sequence to obtain a time-frequency signal representation of the sequence, analyze the signal to measure one or more intensity values of the transformed sequence, and determine the presence of a periodic segment within the sequence when one of the intensity values deviates from a specified value range.

SYSTEMS AND METHODS FOR USING SEEDS TO STORE OUTCOMES AND RECREATING OUTCOMES USING SEEDS WITH A RANDOM NUMBER GENERATOR
20220370890 · 2022-11-24 ·

An electronic gaming machine and a method are provided which generates outcome presentations from a Class 2 or a central determination game outcome. A database stores RNG seeds that correspond to various presentations. To generate the outcome presentations, the RNG seeds are retrieved from the database and random numbers are generated from the RNG seeds. These random numbers are then used to generate the outcome presentations for the Class 2 or central determination game outcome. The RNG seeds may be stored as a series of RNG seeds which may be individually accessed to eliminate certain outcomes or sort certain outcomes prior to presentation.

SELF-TIMED RANDOM NUMBER GENERATOR
20170344343 · 2017-11-30 ·

The embodiments described herein describe a chain of pattern generators organized in a ring topology. Each of the pattern generators in the chain includes asynchronous digital logic and implements an update rule that generates a bidirectional pattern within the chain of pattern generators. The asynchronous digital logic of a first pattern generator in the chain asynchronously updates a next state of the first pattern generator based on at least (a) a current state of the first pattern generator, (b) a second state of a second pattern generator that is before the first pattern generator in the chain, and (c) a third state of a third pattern generator that is after the first pattern generator in the chain.

Data reduction in block-based storage systems using content-based block alignment
11507273 · 2022-11-22 · ·

A method of data reduction in a block-based data storage system includes selecting a starting position in a block based on a deterministic function of block data content. Then for an unaligned block beginning at the selected starting position, a block digest (e.g., block hash) is generated and compared with stored block digests of stored data blocks. If there is a match, and the stored block matches the unaligned block, then a reference to the stored block is stored in place of the unaligned block, and otherwise the unaligned block and a corresponding digest are stored. The storing of references to already stored blocks, without the constraint of observing aligned-block boundaries, realizes increased savings of physical storage space.

RANDOMIZED AUCTION NOTIFICATION
20230177608 · 2023-06-08 ·

A method for performing an auction implemented via an exchange computer system includes receiving, from a user device, a security transaction order, receiving a first matching order, initiating a delay timer that runs for a first period of time, initiating an auction timer that runs for a second period of time, determining that the first period of time has expired, notifying a plurality of market participants of an auction, receiving, during the second period of time, one or more additional matching orders, wherein each of the one or more additional matching orders includes a request for participation in the auction, determining that the second period of time has expired, and facilitating a transaction based on the security transaction order.

PRIVATE KEY CREATION USING LOCATION DATA
20230179412 · 2023-06-08 ·

Methods and a system of generating a master seed using location-based data. The system includes a pseudo-random number generator configured to generate a random number and a global positioning system module configured to determine a location of the system. The system also includes an encryption module configured to generate a signing request message. The signing request message includes the random number and the location. The system further includes a communication device configured to transmit the signing request message to a location authority for authorization. The communication device further configured to receive a signature from the location authority upon authorization of the signing request message. The system is further configured to generate a master seed based on the signature.

COUNTERFEIT PREVENTION
20170330200 · 2017-11-16 · ·

Generating a uniquely authentic copy of information uses a physical device that consistently produces unpredictable outputs based on inputs and the microstructure of the device. The device is verified to satisfy a given property. It is substantially difficult to manufacture another device that satisfies the given property and that produces a particular output in response to a particular input. Generating the uniquely authentic copy of information includes causing the device to be provided with a specific input to produce a specific output, causing the generation of a digital signature of the response and the information, and causing at least the device and the digital signature to be made available. Generating the uniquely authentic copy of information may also include making available the information, the specific input, and/or the specific output. The information may be a value of a banknote. The digital signature may be produced on behalf of an issuer.

SYSTEMS AND METHODS FOR ANONYMIZED STATISTICAL DATABASE QUERIES

A computer system contains a module configured to receive a query, to request rows and columns from a data store, to add or remove rows in such a way that combinations of queries cannot be used to infer information about individuals in the data store. The module executes a statistical computation over the adjusted rows and columns to produce a perturbed answer so that neither the perturbed answer alone, nor repeats of the perturbed answer can be used to infer information about individuals in the data store.