Patent classifications
H04L9/38
COMPOSITE CODE PATTERN, GENERATING DEVICE, READING DEVICE, METHOD, AND PROGRAM
For one-dimensional or two-dimensional images in which cells identified as bright-colored cells and cells identified as dark-colored cells are arranged in a matrix, the amount of information is further increased while the difficulty in reading information expressions are reduced.
For this purpose, invented is a composite code comprising a first code, in which a plurality of cells each having a predetermined area are orderly arranged, and in which data is defined by each of the predetermined areas having one of two or more colors that can be distinguished from each other, and a second code in which special cells having an area other than the predetermined area form at least a part of the plurality of cells, and in which data is defined by distinguishable marks arranged at predetermined positions in the area other than the predetermined area.
FLUID METER COMMUNICATING WITH AN ELECTROMECHANICAL VALVE
A fluid meter includes communication means arranged to receive an external opening or closing command to open or close an electromechanical valve suitable for being included in a cut-off unit mounted in the proximity of the fluid meter, authentication means arranged to authenticate a control frame including the opening or closing command, and a first communication interface arranged to transmit both the control frame and electrical energy to a second communication interface of the cut-off unit via a wireless link. The electrical energy is suitable for electrically powering the second communication interface of the cut-off unit.
FLUID METER COMMUNICATING WITH AN ELECTROMECHANICAL VALVE
A fluid meter includes communication means arranged to receive an external opening or closing command to open or close an electromechanical valve suitable for being included in a cut-off unit mounted in the proximity of the fluid meter, authentication means arranged to authenticate a control frame including the opening or closing command, and a first communication interface arranged to transmit both the control frame and electrical energy to a second communication interface of the cut-off unit via a wireless link. The electrical energy is suitable for electrically powering the second communication interface of the cut-off unit.
HUMAN- AND MACHINE-READABLE CRYPTOGRAPHIC KEYS FROM DICE
The systems and methods herein provide for human- and machine-readable cryptographic keys from dice. In one embodiment, the system places a number of dice into an arrangement to fill a dice grid. The number of dice each contains a number of faces, and each of the faces of the dice includes an image. The system then captures, via a client device, an image of the arrangement. The system generates a cryptographic key from the captured image. This cryptographic key is a human-readable and machine-readable representation of the arrangement in a canonical sequence.
HUMAN- AND MACHINE-READABLE CRYPTOGRAPHIC KEYS FROM DICE
The systems and methods herein provide for human- and machine-readable cryptographic keys from dice. In one embodiment, the system places a number of dice into an arrangement to fill a dice grid. The number of dice each contains a number of faces, and each of the faces of the dice includes an image. The system then captures, via a client device, an image of the arrangement. The system generates a cryptographic key from the captured image. This cryptographic key is a human-readable and machine-readable representation of the arrangement in a canonical sequence.
Method and process for securing an executable image
Control systems and methods for securely loading software in a power control system. In some examples, the control system includes a computing device and a plurality of security modules. The computing device may obtain and divide an executable image into a plurality of images. The computing device may generate a control hash as a function of the plurality of images, and record the control hash. The computing device may store each of the plurality of images in a plurality of security modules. At boot up, the computing device may load, from each security module, the stored image, and store each image to a memory device. The computing device may generate a hash based on the stored images, and compare the generated hash to the recorded control hash. Based on the comparison, the computing device may allow execution of the executable image.
Non-networked device performing certificate authority functions in support of remote AAA
In an approach, a certificate authority management device comprises a computing device with an operating system that supports certificate authority software, a power port with shutter door, a first key slot for an administrative user to enable use of the certificate authority management device in response to an insertion of a first key, a second key slot for management of a plurality of hybrid security keys in response to an insertion of a second key, and a touchscreen with graphical user interface.
MATCHING OFFERS TRANSACTIONS ACROSS HETEROGENEOUS, MULTI-ENTITY DISTRIBUTED COMPUTING PLATFORMS AND SETTLEMENT
A system and method for matching transactions across heterogenous, multi-entity distributed computing platforms are disclosed. In more detail, a system and method for matching and settling offers in a computerized system involves receiving a plurality of created offers, receiving logic for honoring one or more of the plurality of created offers, creating a plurality of tokens and associating each of the plurality of offers with one or more of the created tokens, distributing one or more of the created offers through electronic messages to a plurality of potential customers, receiving an indication that a consumer has selected at least one of the plurality of offers, linking the consumer with a token associated with the selected at least one offer, upon a consumer transaction, deploying the logic for honoring offers to determine whether the selected offer will be honored; and receiving messages related to the propagation or efficacy of the offer.
BLOCKCHAIN BASED VEHICLE CONTROL
A vehicle control method of starting and shutting down an engine, in which a processor receives a blockchain update comprising a first transaction with instructions to perform an engine startup or shutdown; the blockchain update is validated; an engine startup or shutdown is performed based on the validated blockchain update; where the engine startup or shutdown is delayed based on validating a predetermined number of subsequent blockchain updates, including a second transaction with instructions to perform the engine startup or shutdown.
METHOD AND PROCESS FOR SECURING AN EXECUTABLE IMAGE
Control systems and methods for securely loading software in a power control system. In some examples, the control system includes a computing device and a plurality of security modules. The computing device may obtain and divide an executable image into a plurality of images. The computing device may generate a control hash as a function of the plurality of images, and record the control hash. The computing device may store each of the plurality of images in a plurality of security modules. At boot up, the computing device may load, from each security module, the stored image, and store each image to a memory device. The computing device may generate a hash based on the stored images, and compare the generated hash to the recorded control hash. Based on the comparison, the computing device may allow execution of the executable image.