Method and apparatus for secure information distribution

    公开(公告)号:US12001526B2

    公开(公告)日:2024-06-04

    申请号:US17112719

    申请日:2020-12-04

    摘要: A system and method for secure generation and distribution of digital encryption keys is disclosed. The system may also be used to protect and distribute other types of secure information, including digital, audio, video, or analog data, or physical objects. The system may include a tamper-respondent secure token device, which may be configured to destroy or disable access to the secure information contained therein in response to attempts to physically or electronically breach the device. Outputs may be provided in a secure manner through various interfaces without using electricity (wires) or electromagnetic radiation. Inputs may be provided in a secure manner, including through the use of a gesture-based input interface. Destruction or disablement of the device and/or its secure contents may be provided upon detection of tamper attempts or upon input of a self-destruct command. Proof of the destruction or disablement of the device or its contents may be provided.

    Media management system
    2.
    发明授权

    公开(公告)号:US11676223B2

    公开(公告)日:2023-06-13

    申请号:US16850881

    申请日:2020-04-16

    IPC分类号: G06F7/00 G06Q50/08 G06Q10/10

    CPC分类号: G06Q50/08 G06Q10/10

    摘要: Described herein are various techniques for managing media related to a construction project, which may relate to one or more buildings to be built and/or renovated as part of the construction project. In accordance with techniques described herein, the media may be managed according to information regarding the construction project that is stored by one or more other systems separate from a media management system. The other systems may be construction information management systems that each store information regarding a construction project, including information relating to planning and/or execution of the construction project. For example, the media management system may generate tags based on the information regarding the construction project, may be trained to recognize features in the media that relate to the tags, and add the appropriate tags to the media based on the recognized features.

    Filesystem replication using a minimal filesystem metadata changelog

    公开(公告)号:US10936547B2

    公开(公告)日:2021-03-02

    申请号:US15166379

    申请日:2016-05-27

    发明人: Manoj Paul Joseph

    摘要: In general, the invention relates to replicating a source file system stored on a first memory by obtaining a first unread entry from a changelog associated with the source file system, querying the source file system using the first unread entry to obtain a current first object file status, a current first object file path, a current first parent directory status, and a current first parent directory path, determining, based on the querying, whether a first object file on the source file system has changed at some time after the execution of the first unread entry, if the first object file has not changed, performing a first action on a target file system, and if the first object file has changed, performing a second action on the target file system.

    Method and apparatus for secure information distribution

    公开(公告)号:US10860696B2

    公开(公告)日:2020-12-08

    申请号:US14684013

    申请日:2015-04-10

    摘要: A system and method for secure generation and distribution of digital encryption keys is disclosed. The system may also be used to protect and distribute other types of secure information, including digital, audio, video, or analog data, or physical objects. The system may include a tamper-respondent secure token device, which may be configured to destroy or disable access to the secure information contained therein in response to attempts to physically or electronically breach the device. Outputs may be provided in a secure manner through various interfaces without using electricity (wires) or electromagnetic radiation. Inputs may be provided in a secure manner, including through the use of a gesture-based input interface. Destruction or disablement of the device and/or its secure contents may be provided upon detection of tamper attempts or upon input of a self-destruct command. Proof of the destruction or disablement of the device or its contents may be provided.