Patent classifications
H04L9/0668
AUTOMORPHIC TRANSFORMATIONS OF SIGNAL SAMPLES WITHIN A TRANSMITTER OR RECEIVER
A method includes receiving data and a plurality of values at a processor. The data can include real-valued data and/or complex data. The plurality of values includes one of a plurality of random values or a plurality of pseudo-random values. The method also includes generating an automorphism, via the processor, based on the plurality of values, and partitioning the data, via the processor, into a plurality of data blocks. The automorphism includes at least one of a linear transformation or an antilinear transformation. Each data block from the plurality of data blocks can have a predefined size. The method also includes applying the automorphism, via the processor, to each data block from plurality of data blocks, to produce a plurality of transformed data blocks, and causing transmission of a signal representing the plurality of transformed data blocks.
Wireless identification tag with varying identity
Embodiments of the present disclosure generally relate to a wireless identification tag with varying identity, and system and methods for use thereof. In one implementation, the tag may include at least one transmitter configured to transmit a tag ID. The tag may also include at least one circuit. The at least one circuit may be configured to receive a first trigger at a first time and generate in a quasi-random manner a first decipherable ID uniquely identifying the tag, and cause the at least one transmitter to transmit the first decipherable ID. The at least one circuit may also be configured to receive a second trigger at a second time and generate in a quasi-random manner a second decipherable ID different from the first decipherable ID and uniquely identifying the tag, and cause the at least one transmitter to transmit the second decipherable ID.
System and method for operating pseudorandom generators
A method for operating a pseudorandom generator is disclosed. The method may be implemented by a processor of a mobile computing device. The method includes: collecting raw sensor data from at least one sensor associated with the mobile computing device; selecting a subset of the raw sensor data; retrieving first representation representing accumulated entropy associated with one or more previously acquired raw sensor data sets for the at least one sensor; and generating a seed for a pseudorandom generator based on combining the first representation and the selected subset of raw sensor data.
Wireless device for ambient energy harvesting
Embodiments of the present disclosure generally relate to a wireless identification tag configured to harvest ambient energy and transmit an identification signal intermittently, and system and methods for use thereof. In one implementation, the tag may include a transmitter configured to transmit a first signal to a first receiver in a first frequency, and to transmit a second signal to a second receiver in the first frequency. The tag may also include an energy storage component configured for collecting and storing ambient energy and for powering transmission of the transmitter. The tag may also include a circuit configured to monitor energy stored in the energy storage component, and to prevent the transmitter from transmitting the first signal to the first receiver when the energy stored in the energy storage component is insufficient to transmit the second signal to the second receiver.
Tag configured for interaction with security gate
Embodiments of the present disclosure generally relate to a wireless identification tag triggerable by an EAS gate while remaining invisible to the EAS gate, and system and methods for use thereof. In one implementation, the tag may include an antenna tuned to receive energy transmitted in at least one EAS gate frequency range and configured to be non-detectable by the EAS gate. The tag may also include a transmitter configured to send an identification signal and an energy storage component for powering the transmitter. The tag may also include a circuit connected to the antenna. The circuit may be configured to detect energy transmitted from the EAS gate in at least one of the EAS gate frequency ranges, and to cause the transmitter to transmit, to a receiver other than the EAS gate, the identification signal in a frequency outside the EAS gate frequency ranges.
Apparatus and method for unbreakable data encryption
An encryption specification named “MetaEncrypt” implemented as a method and associated apparatus is disclosed for unbreakable encryption of data, code, applications, and other information that uses a symmetric key for encryption/decryption and to configure the underlying encryption algorithms being utilized to increase the difficulty of mathematically modeling the algorithms without possession of the key. Data from the key is utilized to select several encryption algorithms utilized by MetaEncrypt and configure the algorithms during the encryption process in which block sizes are varied and the encryption technique that is applied is varied for each block. Rather than utilizing a fixed key of predetermined length, the key in MetaEncrypt can be any length so both the key length and key content are unknown. MetaEncrypt's utilization of key data makes it impossible to model its encryption methodology to thereby frustrate cryptographic cracking and force would be hackers to utilize brute force methods to try to guess or otherwise determine the key.
SYSTEMS AND METHODS FOR MANAGING DATA BASED ON SECRET SHARING
Systems and methods are provided for obtaining data to be secured based on a secret sharing technique, the data being associated with a file identifier and a split specification that includes at least a number of splits n and a minimum number of splits m required for reconstructing the data, and a Repeatable Random Sequence Generator (RRSG) RRSG scheme. An RRSG state can be initialized based at least in part on a given data transformation key to provide repeatable sequence of random bytes. For every m bytes of data: a polynomial whose coefficients are determined based at least in part on m bytes of the data and a portion of the repeatable sequence of random bytes can be determined; the polynomial can be evaluated at n unique values determined by a portion of repeatable sequence of random bytes to generate n bytes. Each byte can be stored into one of the n split stores.
Identification tag configured for variable intervals between signal transmissions
Embodiments of the present disclosure generally relate to a wireless identification tag with varying ID transmission timing, and system and methods for use thereof. In one implementation, the tag may include at least one transmitter and an energy storage component electrically connected to the at least one transmitter. The energy storage component may be configured to collect and store ambient energy and to power transmission of the at least one transmitter. The tag may also include at least one circuit. The at least one circuit may be configured to cause the at least one transmitter to transmit a sequence of identification signals in non-uniform intervals such that times between identification signal transmissions of three consecutive transmissions vary.
Apparatus and method for unbreakable data encryption
An encryption specification named “MetaEncrypt” implemented as a method and associated apparatus is disclosed for unbreakable encryption of data, code, applications, and other information that uses a symmetric key for encryption/decryption and to configure the underlying encryption algorithms being utilized to increase the difficulty of mathematically modeling the algorithms without possession of the key. Data from the key is utilized to select several encryption algorithms utilized by MetaEncrypt and configure the algorithms during the encryption process in which block sizes are varied and the encryption technique that is applied is varied for each block. Rather than utilizing a fixed key of predetermined length, the key in MetaEncrypt can be any length so both the key length and key content are unknown. MetaEncrypt's utilization of key data makes it impossible to model its encryption methodology to thereby frustrate cryptographic cracking and force would be hackers to utilize brute force methods to try to guess or otherwise determine the key.
Privacy system for electronically tagged goods
Embodiments of the present disclosure generally relate to systems and methods for providing privacy to downstream owners of electronically tagged goods. In one implementation, the system may include at least one processor that may be configured to store IDs for a plurality of tags including at least a first owner ID and a second owner ID for a particular tag; associate first information of the particular tag with the first owner ID at a time when the first owner of the particular tag is recorded as owning the tag; record a transaction transferring ownership of the particular tag from the first owner to a second owner; and after the transfer of ownership, associate second information of the particular tag with the second owner ID, and prevent the second owner from accessing the first information.