Patent classifications
G06F2221/2121
WEARABLE ELECTRONIC DEVICE HAVING HETEROGENEOUS DISPLAY SCREENS
Particular embodiments described herein provide for a wearable electronic device, such as a bracelet, watch, wristband or armband. One particular example implementation of a wearable electronic device may include a first display screen, a second display screen, and logic. At least a portion of the logic is implemented in hardware. The logic is configured to receive a communication over a wireless network, and to display, in the first display screen, a communication alert. The communication alert can be a graphic design. The logic is also configured to receive input data indicative of a screen transition input to view information associated with the communication, and to display, in the second display screen, the information associated with the communication. In further embodiments, the graphic design includes a notification pattern indicating one or more attributes of the communication. In further embodiments, the first and second display screens form a single display screen.
Circuit and method for using capacitive touch to further secure information in RFID documents
A system for limiting access to confidential information including storage circuitry for storing the confidential information. An access enabling circuit allows access to the storage circuitry in response to a first level of an enabling signal. A processor generates the enabling signal for a predetermined amount of time in response to sensing of a change of a predetermined value that is produced in response to an act by a person responsible for the confidentiality of the confidential information. The enabling signal assumes a second level after the predetermined amount of time to block access to the storage circuitry.
Silicon key attestation
Systems and methods are disclosed for generating one or more hardware reference keys (HRK) on a computing device, and for attesting to the validity of the hardware reference keys. An initial hardware reference key can be a silicon attestation key (SIK) generated during manufacture of a computing system, such as a system-on-a-chip. The SIK can comprise an asymmetric key pair based at least in part on an identifier of the processing system type and a unique identifier of the processing system. The SIK can be signed by the computing system and stored thereon. The SIK can be used to generate further HRKs on the computing device that can attest to the processing system type of the computing device and an operating system version that was running when the HRK was generated. The computing device can generate an HRK attestation (HRKA) for each HRK generated on the computing system.
MOBILE RFID CONTAINER AND DISTRIBUTION METHOD
A transportable container is enabled with radio frequency identification (RFID) technologies to maintain automated inventory levels of those items that are inside the container. The inventory data is communicated via wireless methods, such as cellular or Wi-Fi, to a remote device such as enterprise resource planning (ERP) system. The ERP system may use the inventory data received from the remote device to automatically update appropriately and generate appropriate records (e.g., container inventory, restocking, invoicing, etc.). In some embodiments, automated RFID scans are triggered when the container is opened and subsequently closed. The container may include RF containment/screening to prevent inadvertent scanning of RFID tags outside of the container. The container may also include a location device to allow the location of the container to be readily determined.
Processes for distribution and use of a mobile RFID container
A mobile RFID container, such as a case, cargo container, vehicle, etc., includes an RFID detector configured to conduct an RFID scan to generate scan data concerning the items carried in the mobile RFID container, and location determining circuitry for generating location data concerning the location of the mobile RFID container. A method for distributing RFID-tagged items using the mobile RFID container includes placing a plurality of RFID-tagged items in the mobile RFID container, conducting one or more RFID scans to generate scan data concerning the contents of the RFID container, and processing the scan data and location data to determine the location of the mobile RFID container at times when the contents of the RFID container have changed. The RFID scans may be performed, for example, in response to (a) sensing that the contents of the container have been accessed, (b) a request from a remote device, and/or (c) the location of the RFID container relative to geofence boundary corresponding to a particular geographical location.
Device, system and method for verifying the authenticity integrity and/or physical condition of an item
A physical uncloneable function (PUF) pattern is used for verifying a physical condition of an item. The PUF pattern is arranged to be damaged in the event that said item is exposed to a predetermined environmental condition. Verification of the physical condition of the item, is carried out by obtaining a measured response from the PUF pattern, and comparing the measured response with a stored response in respect of the PUF.
DETECTING PHYSICAL PENETRATION OF SECURE DEVICE
An example device in accordance with an aspect of the present disclosure includes an interleaved connector including a plurality of layers of conducting material interspersed with insulating material. A plurality of electrodes are to identify a change in capacitance of the interleaved connector to indicate a penetration of the device.
KEY-LADDER PROTECTED PERSONALIZATION DATA TRANSCRIPTION FOR PROVISIONING
A method and system is provided that simplifies the key management by allowing personalization data protected for one chip model to be used to provision device with another chip model with different global hardware root keys. The solution minimizes the changes needed to be performed on the device during provisioning and remains secure.
Remotely verifying an identity of a person
A computer-implemented method for remotely verifying an identity of a user is presented. The method comprises a first data processing device (120) receiving a live video stream (102) of the user from a second data processing device (140) via a video data connection (108) having a video bandwidth. Establishing a separate data connection (110) between the first (120) and second (140) data processing devices, the data connection (110) having a data bandwidth. The first data processing device (120) receiving, via the data connection (110), identifying data (104) captured from an identifying means from the second data processing device (140), or another data processing device. The first data processing device (120) determining first biometric data based on the identifying data (104) and comparing to second biometric data based on the live video stream (102). The first data processing device (120) then verifying an identity of the user based on a correspondence between the first biometric data and the second biometric data.
PROCESSES FOR DISTRIBUTION AND USE OF A MOBILE RFID CONTAINER
A mobile RFID container, such as a case, cargo container, vehicle, etc., includes an RFID detector configured to conduct an RFID scan to generate scan data concerning the items carried in the mobile RFID container, and location determining circuitry for generating location data concerning the location of the mobile RFID container. A method for distributing RFID-tagged items using the mobile RFID container includes placing a plurality of RFID-tagged items in the mobile RFID container, conducting one or more RFID scans to generate scan data concerning the contents of the RFID container, and processing the scan data and location data to determine the location of the mobile RFID container at times when the contents of the RFID container have changed. The RFID scans may be performed, for example, in response to (a) sensing that the contents of the container have been accessed, (b) a request from a remote device, and/or (c) the location of the RFID container relative to geofence boundary corresponding to a particular geographical location.