Patent classifications
G06F2221/2153
Watermark and fingerprint systems for media
A number of novel watermarking applications, and improvements to watermarking methods, are disclosed. Included are techniques for selectively incorporating promotional messages into rendered video content, monitoring whether promotional messages are rendered or skipped, permitting payment for content upon rendering rather than receipt, controlling rendering of video to include or omit adult-themed sections, confirming a person's age by reference to a watermarked identification document, and watermarking digital cinema projections.
Risk-based biometric identification and authentication with trusted source for security access
A method including receiving, in a security device, a user object storing stored biometric data describing a biometric parameter of the user. Sensed biometric data is generating by sensing directly, using a sensor, the biometric parameter of the user. The stored biometric data is compared to the sensed biometric data. A confidence factor is determined using a first degree of trust, assigned to the object, combined with a second degree of match between the stored biometric data and the sensed biometric data. A user input is received indicating a desired activity. A risk factor is determined based on a combination of the confidence factor and the user input. The risk factor is compared to a selected pre-determined threshold. The user is granted a selected level of access to the security device from among different levels of access to the security device when the risk factor satisfies the selected pre-determined threshold.
Mated universal serial bus (USB) wireless dongles configured with destination addresses
A mated pair of Universal Serial Bus (USB) wireless dongles are disclosed. The dongles comprise a first USB dongle that comprises a first processor, a first read only memory (ROM) storing an address of a second USB dongle, a first radio transceiver, a first USB connector, and a first application. When executed by the first processor, the first application receives a USB formatted message from the first USB connector; transcodes the USB formatted message for wireless transmission; transmits the transcoded message to the address of the second dongle. The dongles further comprise the second dongle, which comprises a second processor, a second ROM storing an address of the first dongle, a second radio transceiver, a second USB connector, a second application that, when executed by the second processor, receives the message from the first dongle; confirms that the first USB is its mate; and communicates with the first dongle.
Method and system for preventing unauthorized processor mode switches
Disclosed embodiments relate to a system having a processor adapted to activate multiple security levels for the system and a monitoring device coupled to the processor and employing security rules pertaining to the multiple security levels. The monitoring device restricts usage of the system if the processor activates the security levels in a sequence contrary to the security rules.
MONITORING SYSTEM FOR PHYSIOLOGICAL PARAMETER SENSING DEVICE
A system for detecting a physiological parameter of a subject includes a sensing device attached to a patient and an interrogation device for monitoring an operation of the sensing device. The interrogation device is used to interrogate the sensing device to confirm that the sensing device is in proper operation while being attached to the patient. The interrogation device further performs user authentication and determines a type and/or extent of information that can be presented on the interrogation device based on the level of user authentication.
Password Management Method and Related Apparatus
A password management method and a related apparatus is provided. A TPM owner password is stored in a chip in a ciphertext form, so that security of the TPM owner password in a storage process can be improved. The method includes a chip encrypts a first TPM owner password by using a first key and a preset encryption algorithm, to obtain a first ciphertext corresponding to the first TPM owner password. After obtaining the first ciphertext, the chip stores the first ciphertext in a secure storage area in the chip.
METHOD AND APPARATUS FOR SUPPORTING MULTIPLE BROADCASTERS INDEPENDENTLY USING A SINGLE CONDITIONAL ACCESS SYSTEM
A method and apparatus for brokering the enablement of the communication of encrypted media programs from a plurality of independent broadcasters to a plurality of receivers is disclosed. The system makes use of a pairing key for each provided service, which is differently encrypted by a pairing server and by the broadcaster providing the service. The encrypted versions of the pairing key are decrypted in a first receiver module using information known to the pairing service but not the broadcaster and in a second receiver module using information known to the broadcaster. The pairing key is used to cryptographically bind the first and second receiver modules.
FACILITATING SEQUENTIAL READS IN MEMORY SUB-SYSTEMS
An example memory subsystem includes a memory component and a processing device, operatively coupled to the memory component. The processing device is configured to receive a plurality of logical-to-physical (L2P) records, wherein an L2P record of the plurality of L2P records maps a logical block address to a physical address of a memory block on the memory component; determine a sequential assist value specifying a number of logical block addresses that are mapped to consecutive physical addresses sequentially following the physical address specified by the L2P record; generate a security token encoding the sequential assist value; and associate the security token with the L2P record.
Method and apparatus for enabling machine to machine communication
A method and apparatus for performing secure Machine-to-Machine (M2M) provisioning and communication is disclosed. In particular a temporary private identifier, or provisional connectivity identification (PCID), for uniquely identifying machine-to-machine equipment (M2ME) is also disclosed. Additionally, methods and apparatus for use in validating, authenticating and provisioning a M2ME is also disclosed. The validation procedures disclosed include an autonomous, semi-autonomous, and remote validation are disclosed. The provisioning procedures include methods for re-provisioning the M2ME. Procedures for updating software, and detecting tampering with the M2ME are also disclosed.
System and method for protecting data stored on a removable data storage device
A system for protecting data stored in a removable data storage device includes a personal electronic device, a removable solid state data storage device operatively coupled to the personal electronic device, and a circuit configured to protect data stored in the data storage device in response to detecting impending removal of the data storage device from the personal electronic device.