摘要:
Functionality is described for reducing the unauthorized reproduction of optical media, such as optical discs of various types. The functionality operates by adding a physical descriptor to an optical medium, forming reference descriptor information based on the descriptor, signing the reference descriptor information to produce authenticity information, and adding the authenticity information to the optical medium. At a point of consumption, the functionality operates by reading the authenticity information and reading the descriptor. Based on the information that is read, the functionality performs cryptographic analysis and descriptor-based analysis to validate the optical medium. The functionality includes various provisions to reduce the impact of wear and tear on the above-summarized analysis. The functionality can be applied to stamped or recordable optical media.
摘要:
Functionality is described for reducing the unauthorized reproduction of optical media, such as optical discs of various types. The functionality operates by adding a physical descriptor to an optical medium, forming reference descriptor information based on the descriptor, signing the reference descriptor information to produce authenticity information, and adding the authenticity information to the optical medium. At a point of consumption, the functionality operates by reading the authenticity information and reading the descriptor. Based on the information that is read, the functionality performs cryptographic analysis and descriptor-based analysis to validate the optical medium. The functionality includes various provisions to reduce the impact of wear and tear on the above-summarized analysis. The functionality can be applied to stamped or recordable optical media.
摘要:
Human body motion is represented by a skeletal model derived from image data of a user. The model represents joints and bones and has a rigid body portion. The sets of body data are scaled to a predetermined number of sets for a number of periodic units. A body-based coordinate 3-D reference system having a frame of reference defined with respect to a position within the rigid body portion of the skeletal model is generated. The body-based coordinate 3-D reference system is independent of the camera's field of view. The scaled data and representation of relative motion within an orthogonal body-based 3-D reference system decreases the data and simplifies the calculations for determining motion thus enhancing real-time performance for multimedia applications controlled by a user's natural movements.
摘要:
The claimed subject matter provides for systems and/or methods for a dynamic range wireless access point to initiate deliberate and/or selective communications with one or more wireless devices over a short range radio path. One embodiment of an access point system comprises a processor that transfers one or more wireless devices to a long range radio path once a transition condition has been met. In another embodiment, an access point system may affect transactions between user/customer's smart devices and a commercial place of business where the access point system and the smart devices initiate communications when the smart devices are deliberately placed within the proximity of the access point antenna and/or the smart devices are brought within the vicinity of the access point antenna such as by passing through the entrance or exit to the place of business.
摘要:
Radio frequency certificates of authenticity (RFCOAs) and associated scanners and methods are presented. In one implementation, an array of miniaturized antenna elements in an RFCOA scanner occupies an area smaller than a credit card yet obtains a unique electromagnetic fingerprint from an RFCOA associated with an item, such as the credit card. The antenna elements are miniaturized by a combination of both folding and meandering the antenna patch components. The electromagnetic fingerprint of an exemplary RFCOA embeddable in a credit card or other item is computationally infeasible to fake, and the RFCOA cannot be physically copied or counterfeited based only on possession of the electromagnetic fingerprint.
摘要:
A system is described for allowing a user, operating a trusted device, to remotely log into a server via a potentially untrustworthy client. The system operates by establishing a first secure connection between the client and the server. The system then establishes a second secure connection between the device and the server through the client. The user then remotely logs into the server over the second secure connection using the device. The second secure connection is tunneled within the first secure connection, preventing the untrustworthy client from discovering personal information associated with the user. According to one feature, prior to forming the second secure connection, the user can establish a pairing relationship with the client by reading an address of the client using any kind of reading mechanism. According to another feature, the device can receive marketing information in the course of a transaction.
摘要:
Seller's reputation quantification technique embodiments are presented that quantify in monetary terms a risk of dissatisfaction to a potential buyer of a product or service from a seller in an on-line consumer market. Generally, this involves computing the monetary sales limit for the seller. This monetary sales limit represents an amount, which if a sum of the current prices of all the products and services currently offered by the seller is equal to or less than the amount, there would not be a significant risk to the buyer of being dissatisfied with the product or service. Given this, a risk of a potential buyer's dissatisfaction with a product or service purchased from the seller in view of a price the buyer wants to pay is assessed. The assessed risk is then provided to the potential buyer in the form of one or more risk indicators.
摘要:
Embodiments are described that leverage variability of a chip. Different areas of a chip vary in terms of reliability under a same operating condition. The variability may be captured by measuring errors over different areas of the chip. A physical factor that affects or controls the likelihood of an error on the chip can be varied. For example, the voltage supplied to a chip may be provided at different levels. At each level of the physical factor, the chip is tested for errors within the regions. Some indication of the error statistics for the regions is stored and then used to adjust power used by the chip, to adjust reliability behavior of the chip, to allow applications to control how the chip is used, to compute a signature uniquely identifying the chip, etc.
摘要:
Embodiments are disclosed that relate to hindering unauthorized use or distribution of a middleware program contained within an application. One example embodiment provides a method for hindering unauthorized use or distribution of a middleware program contained within an application. The method comprises acquiring factored middleware code, the factored middleware code having a missing function residing on a remote computing device, and building an application around the factored middleware code such that the application is configured to call to the remote computing device for execution of the missing function during use. The application may be configured to send a call to the remote computing device for execution of the missing function during use.
摘要:
Systems and methods are provided for securing a multicore computer chip with a watchdog processor. In a system with a watchdog process and any number of other processors and components, the watchdog processor monitors bus communications between the second processor and at least one third component. The watchdog processor may be further independently coupled to at least one of the other components so that it can monitor internal operations of such component, thereby acquiring detailed information about the specific operations of at least one component in the system. The watchdog processor can enforce an interaction policy on bus communications between components, as well as enforce an independent security policy on the monitored components.