Patent classifications
G06K19/06037
GRAPHICAL WATERMARK, METHOD AND APPARATUS FOR GENERATING SAME, AND METHOD AND APPARATUS FOR AUTHENTICATING SAME
The present disclosure provides a graphical watermark, a method and an apparatus for generating a graphical watermark, and a method and an apparatus for authenticating a graphical watermark. The graphical watermark includes: a plurality of graphical markers carrying position and pose information, and identity information of the graphical watermark; and a watermark pattern provided between a pair of graphical markers.
Wireless security protocol
This disclosure relates to a data storage device. A data port transmits data between a host computer system and the data storage device over a data channel. The device repeatedly broadcasts advertising packets over a wireless communication channel different from the data channel. Each advertising packet comprises a random value and a message authentication code calculated based on the random value and an identity key. The identity key is readable by a device to be connected and in proximity of the data storage device out of band of the data channel and the communication channel. The identity key enables the device to be connected to verify the message authentication code based on the random value and the identity key to thereby authenticate the data storage device.
Precision localization of mobile 5G/6G terminals by coordinated GNSS reception
Mobile wireless terminals, such as vehicles in traffic, can determine the relative positions of other vehicles with improved precision by arranging to acquire GNSS (global navigational satellite system) signals simultaneously, and then analyzing the various data sets differentially. Simultaneous acquisition can cancel many important errors such as motional errors of the vehicles, atmospheric distortions, and satellite timebase errors. Differential analysis to determine the relative positions of vehicles (as opposed to their overall geographical coordinates) can reduce errors related to satellite ephemeris and velocity, as well as roundoff errors. Localization with a precision of less than 1 meter can greatly improve collision avoidance while discriminating near-miss scenarios from imminent collisions, according to some embodiments. Messaging examples, in 5G and 6G, to manage the simultaneous acquisition and differential analysis, are provided in examples. Many other aspects are disclosed.
Methods and apparatus for encoding data in notched shapes
A notched 2D shape may encode information. For instance, a physical tag may display, form or include a polygon that is modified by notches and by one or more holes. This notched 2D shape may encode data that identifies, or provides information regarding, a physical product to which the tag is physically attached. Alternatively, this notched 2D shape may encode any other type of information, such as information about what we sometimes call a product shape or shape matrix. The notched shape may be an octagon that is modified by notches and by one or more holes.
Transient infrastructure for ubiquitous network communications applications
The disclosure generally relates to networking infrastructure and, more particularly, to installing transient infrastructure for ubiquitous networking applications. A wireless gateway device is sent to physical premises with a parcel. After the wireless gateway device is delivered to the physical premises, a processor of the wireless gateway device draws power from the energy source to perform operations comprising executing program code stored in non-transitory processor-readable medium to establish a wireless communications connection with a network service through a first type of wireless communications interface. The wireless gateway device performs operations comprising establishing wireless communications with one or more wireless peripheral devices in the physical premises through the second type of wireless communications interface.
Methods for facilitating funds disbursements and devices thereof
Systems and methods for facilitating a disbursement of funds to a payee are provided. The methods include receiving a payment request from a payor; generating a code, such as barcode, a Quick Response (QR) code, a Near Field Communication (NFC) code, or a textual string, that corresponds to the received payment request; transmitting the generated code to the payee; validating the code when the code is entered into a payment disbursement machine, such as an automated teller machine; and disbursing at least one of the funds and a payment voucher via the payment disbursement machine.
CERAMIC CIRCUIT BOARD, HEAT-DISSIPATING MEMBER, AND ALUMINUM-DIAMOND COMPOSITE
A ceramic circuit board includes a ceramic base material, a metal layer (first metal layer), and a marker portion. The marker portion is formed on the surface of the first metal layer. The surface of the metal layer (first metal layer) may be plated. When the surface of the metal layer (first metal layer) is plated, the marker portion may be formed on the plating.
Validation of Security Device Authentication in a Decentralized Network
Systems and methods to perform validation of authentication of a security device in a decentralized network are disclosed. In one aspect, embodiments of the present disclosure include a method which can be implemented on a system to, identify telemetry associated with the successful authentication. The telemetry is further in a distributed ledger in the decentralized network and can be used to determine validity of an authentication attempt of the security device by a second user device.
INFORMATION DISPERSAL FOR SECURE DATA STORAGE
A method of securely dispersing private user data may include operating a software application configured to utilize user data, receiving the user data, generating a sequence of random bits, and generating a plurality of secret shares from the user data. Generating the plurality of secret shares may include selecting a subset of the user data for each secret share and combining the subset of the user data with the sequence of random bits. The subset of the user data may be a first half of the user data for a first secret share, a second half of the user data for a second secret share, and the whole user data for a third secret share. The method may also include dispersing each of the secret shares.
Method for provisioning a container with food
Method for providing a container with food, the method comprising: providing a container for infant formula food, adding the food, sealing the container with a gas-tight membrane seal, adding an inner scannable code on the gas-tight membrane seal, closing the container with a tamper-proof closure means, so that the inner scannable code is not scannable without breaking a part of the tamper-proof closure means, and storing the inner scannable code in a database.