H04L9/36

Self-test of an asynchronous circuit
10884058 · 2021-01-05 · ·

An indication of an operating mode of an asynchronous circuit may be received. A determination may be made as to whether the operating mode of the asynchronous circuit corresponds to a self-test of the asynchronous circuit. In response to determining that the operating mode of the asynchronous circuit corresponds to the self-test, a first clock signal may be provided to a first portion of a self-test component in a feedback path of the asynchronous circuit and a second clock signal may be provided to a second portion of the self-test component in the feedback path of the asynchronous circuit. Furthermore, a test value may be generated based on the first clock signal and the second clock signal.

ENTERPRISE SECURITY IN METERS
20200389499 · 2020-12-10 ·

The present disclosure provides for enterprise security in intelligent electronic devices such as electric power meters. In accordance with the present disclosure, enterprise security is a security system in which each individual device, instead of configuring and storing security configurations locally, use a security server for security verifications. Such a security server of the present disclosure may be a dedicated computer on a network, that is used to manage the security configuration for all users. This makes it simpler for administrators to configure users and devices, which in turn improves security by encouraging security to be properly configured.

ENTERPRISE SECURITY IN METERS
20200389499 · 2020-12-10 ·

The present disclosure provides for enterprise security in intelligent electronic devices such as electric power meters. In accordance with the present disclosure, enterprise security is a security system in which each individual device, instead of configuring and storing security configurations locally, use a security server for security verifications. Such a security server of the present disclosure may be a dedicated computer on a network, that is used to manage the security configuration for all users. This makes it simpler for administrators to configure users and devices, which in turn improves security by encouraging security to be properly configured.

Detecting an identity of a brand and/or an obfuscated identity of the brand within an image based on embeddings corresponding to regions of interest within the image
10824897 · 2020-11-03 · ·

An online system receives an image associated with a set of pixel values and provides the set of pixel values to a deep learning or machine-learned model that is trained to assign a set of regions of interest within the image to one or more classes. The model is structured to identify the set of regions of interest based on the pixel values, in which each region of interest is associated with an embedding corresponding to a vector representation of the region of interest. The online system compares each embedding to a database of embeddings associated with multiple labeled images, in which the labels indicate an identity of a brand and/or an obfuscated identity of the brand. The online system then determines whether the identity of the brand and/or the obfuscated identity of the brand is/are detected within each region of interest based on the comparison.

Detecting an identity of a brand and/or an obfuscated identity of the brand within an image based on embeddings corresponding to regions of interest within the image
10824897 · 2020-11-03 · ·

An online system receives an image associated with a set of pixel values and provides the set of pixel values to a deep learning or machine-learned model that is trained to assign a set of regions of interest within the image to one or more classes. The model is structured to identify the set of regions of interest based on the pixel values, in which each region of interest is associated with an embedding corresponding to a vector representation of the region of interest. The online system compares each embedding to a database of embeddings associated with multiple labeled images, in which the labels indicate an identity of a brand and/or an obfuscated identity of the brand. The online system then determines whether the identity of the brand and/or the obfuscated identity of the brand is/are detected within each region of interest based on the comparison.

Data communication device, communication system, data relay method, and recording medium with stored program
10749849 · 2020-08-18 · ·

A data communication device includes a first communicator that receives encrypted data; a second communicator that transmits the encrypted data; an identification information acquisition unit that, when the first communicator has received information for encryption that is used for establishing encrypted communications including encrypted part and plaintext part where the plaintext part includes identification information of a transmission source of the encrypted data, acquires the identification information from the information for encryption; and a configurator that sets data transmission of the second communicator, based on the identification information.

Data communication device, communication system, data relay method, and recording medium with stored program
10749849 · 2020-08-18 · ·

A data communication device includes a first communicator that receives encrypted data; a second communicator that transmits the encrypted data; an identification information acquisition unit that, when the first communicator has received information for encryption that is used for establishing encrypted communications including encrypted part and plaintext part where the plaintext part includes identification information of a transmission source of the encrypted data, acquires the identification information from the information for encryption; and a configurator that sets data transmission of the second communicator, based on the identification information.

ENCRYPTION METHOD
20200235922 · 2020-07-23 ·

Examples discussed herein disclose, among other things, a method. The method includes, among other things, obtaining a plaintext, obtaining a key from a plurality of keys, and determining whether the plaintext is longer than a predefined threshold length. If the plaintext is longer than the predefined threshold length, the method may encrypt the plaintext with the key to generate a first ciphertext having a length of the plaintext, where the character at a predefined position within the first ciphertext belongs to a first subset of characters. And if the plaintext is not longer than the predefined threshold length, the method may encrypt the plaintext with the key to generate a second ciphertext, which is longer than the plaintext, where the character at the same predefined position in the second ciphertext belongs to a second subset of characters.

Steganographic encoding detection and remediation

A steganographic coding detector (and method) analyzes one or more pages of a file. For each page containing text strings, the detector counts a number of A0h and 20h characters for the text string. For each text string for which the number of A0h characters is greater than a first threshold, the detector sets a flag to a first state, The first threshold is computed based on the number of 20h characters in that text string. For each text string for which the number of 20h characters is less than the first threshold, the detector sets the flag to a second state. Responsive to the number of text strings that have a flag at the first state being greater than a second threshold, the detector marks the file as being steganographically encoded.

Steganographic encoding detection and remediation

A steganographic coding detector (and method) analyzes one or more pages of a file. For each page containing text strings, the detector counts a number of A0h and 20h characters for the text string. For each text string for which the number of A0h characters is greater than a first threshold, the detector sets a flag to a first state, The first threshold is computed based on the number of 20h characters in that text string. For each text string for which the number of 20h characters is less than the first threshold, the detector sets the flag to a second state. Responsive to the number of text strings that have a flag at the first state being greater than a second threshold, the detector marks the file as being steganographically encoded.