H04L9/10

ENCRYPTION DEVICE, A COMMUNICATION SYSTEM AND METHOD OF EXCHANGING ENCRYPTED DATA IN A COMMUNICATION NETWORK
20210194855 · 2021-06-24 ·

The present disclosure provides in various aspects an encryption device (100), a communication system and a method of exchanging encrypted data in such a network. In accordance with some illustrative embodiments of an aspect, the encryption device (100) comprises a communication interface (110), a variable key generator (120) configured to generate at least two keys, a memory (130) configured to store keys that are either generated by the variable key generator (120) and/or received at the communication interface (110), and an encryption/decryption component (140) configured to successively use keys stored in the memory (130) for encrypting a plaintext received at the communication interface (110) and for decrypting a ciphertext received at the communication interface (110), wherein the communication interface (110) is configured to communicate with an associated separate communication device which is used by a user of the encryption device (100) for communicating in a communication network.

Control device
11036846 · 2021-06-15 · ·

A control device in a vehicle: determines whether the control device is detached from the vehicle; communicates with other control devices mounted in the vehicle; stores an encryption key; performs a calculation process necessary for communication; and prohibits execution of the calculation process using the encryption key when determining that the control device is detached from the vehicle.

SOLID-STATE IMAGING DEVICE, METHOD FOR DRIVING SOLID-STATE IMAGING DEVICE, AND ELECTRONIC APPARATUS

A solid-state imaging device includes a pixel part, a reading part for reading a pixel signal from the pixel part and a response data generating part including a fuzzy extractor. The response data generating part generates response data including a unique key in association with at least one selected from among variation information of pixels and variation information of the reading part. The response data generating part generates, when regenerating a key, a unique key using helper data acquired in generation of an initial key, variation information acquired in the regeneration of the key, and reliability information determined based on the variation information acquired in the regeneration of the key.

INTEGRATION OF VERIFICATION TOKENS WITH MOBILE COMMUNICATION DEVICES
20210073787 · 2021-03-11 ·

Apparatuses, methods, and systems pertaining to the verification of portable consumer devices are disclosed. In one implementation, a verification token is communicatively coupled to a computer by a USB connection so as to use the computer's networking facilities. The verification token reads identification information from a user's portable consumer device (e.g., credit card) and sends the information to a validation entry over a communications network using the computer's networking facilities. The validation entity applies one or more validation tests to the information that it receives from the verification token. If a selected number of tests are passed, the validation entity sends a device verification value to the verification token, and optionally to a payment processing network. The verification token may enter the device verification value into a CVV field of a web page appearing on the computer's display, or may display the value to the user using the computer's display.

INTEGRATION OF VERIFICATION TOKENS WITH MOBILE COMMUNICATION DEVICES
20210073787 · 2021-03-11 ·

Apparatuses, methods, and systems pertaining to the verification of portable consumer devices are disclosed. In one implementation, a verification token is communicatively coupled to a computer by a USB connection so as to use the computer's networking facilities. The verification token reads identification information from a user's portable consumer device (e.g., credit card) and sends the information to a validation entry over a communications network using the computer's networking facilities. The validation entity applies one or more validation tests to the information that it receives from the verification token. If a selected number of tests are passed, the validation entity sends a device verification value to the verification token, and optionally to a payment processing network. The verification token may enter the device verification value into a CVV field of a web page appearing on the computer's display, or may display the value to the user using the computer's display.

Electrically Powered Surgical Instrument with Manual Release

A surgical device comprising a surgical end effector, an actuation assembly having a part operable to move between a first position and a second position, an electrically-powered motor, a transmission mechanically connecting the motor to the part and being operable to selectively displace the part between the first and second positions when the motor is operated, and a manual release mechanically coupled to the transmission to selectively interrupt the transmission and, during interruption, displace the part towards the first position independent of operation of the motor.

INFORMATION PROTECTION DEVICE AND ELECTRONIC APPARATUS
20200410141 · 2020-12-31 · ·

An information protection device includes: a random-contact mechanical Hall element provided with a conductive plate that has a prescribed conductive pattern, and a contact plate that is stacked on the conductive plate and that has, in an interior thereof, a connection potion partially contacting the conductive pattern; a communication line having multiple signal wires that are respectively connected to the connection portion in the random-contact mechanical Hall element; and a control unit configured to, through the communication line, monitor connection information between the connection portion and the conductive pattern in the random-contact mechanical Hall element, and determine, based on the connection information, whether or not iniquity has occurred in accordance with whether or not a connection state between the conductive pattern and the connection portion has changed from an initial setting.

INFORMATION PROTECTION DEVICE AND ELECTRONIC APPARATUS
20200410141 · 2020-12-31 · ·

An information protection device includes: a random-contact mechanical Hall element provided with a conductive plate that has a prescribed conductive pattern, and a contact plate that is stacked on the conductive plate and that has, in an interior thereof, a connection potion partially contacting the conductive pattern; a communication line having multiple signal wires that are respectively connected to the connection portion in the random-contact mechanical Hall element; and a control unit configured to, through the communication line, monitor connection information between the connection portion and the conductive pattern in the random-contact mechanical Hall element, and determine, based on the connection information, whether or not iniquity has occurred in accordance with whether or not a connection state between the conductive pattern and the connection portion has changed from an initial setting.

System and method for providing security for robots

The present disclosure discloses a security system for robots. The security system comprises a lock located on a platform, configured to restrict power supply to a plurality of actuators of a robotic arm, a key configured to release the lock for providing power supply to the plurality of actuators and a processing unit. The processing unit is configured to restrict power supply to the robotic arm by initiating the lock, relocate the lock to a random location on the platform, generate an encrypted code based on the random location of the lock and a time-stamp and provide the encrypted code to the control unit for decryption. Upon decryption, the control unit configures the lock to supply power to the plurality of actuators. The plurality of actuators operates the robotic arm to pick the key and release the lock for supplying power to the plurality of actuators.

System and method for providing security for robots

The present disclosure discloses a security system for robots. The security system comprises a lock located on a platform, configured to restrict power supply to a plurality of actuators of a robotic arm, a key configured to release the lock for providing power supply to the plurality of actuators and a processing unit. The processing unit is configured to restrict power supply to the robotic arm by initiating the lock, relocate the lock to a random location on the platform, generate an encrypted code based on the random location of the lock and a time-stamp and provide the encrypted code to the control unit for decryption. Upon decryption, the control unit configures the lock to supply power to the plurality of actuators. The plurality of actuators operates the robotic arm to pick the key and release the lock for supplying power to the plurality of actuators.