Abstract:
Methods and apparatus for enhanced CMEA, or ECMEA, processing. A forward ECMEA and a reverse ECMEA process are provided. The forward ECMEA process decrypts text encrypted by the reverse ECMEA process and the reverse ECMEA process decrypts text encrypted by the forward ECMEA process. The forward ECMEA process employs a first transformation, an iteration of the CMEA process, and a second transformation. The reverse ECMEA process employs a first inverse transformation, an iteration of the CMEA process, and a second inverse transformation. The transformations and inverse transformations, and the iterations of the CMEA process, employ secret offsets to improve security. The transformations and the iteration of the CMEA process also employ an enhanced tbox function using an involutary lookup table.
Abstract:
An enhanced CMEA encryption system suitable for use in wireless telephony. A plaintext message is introduced into the system and subjected to a first iteration of a CMEA process, using a first CMEA key to produce an intermediate ciphertext. The intermediate ciphertext is then subjected to a second iteration of the CMEA process using a second CMEA key to produce a final ciphertext. Additional security is achieved by subjecting the plaintext and intermediate ciphertext to input and output transformations before and after each iteration of the CMEA process. The CMEA iterations may be performed using an improved use of a tbox function which adds permutations to a message or intermediate crypto-processed data. Decryption is achieved by subjecting a ciphertext message to the reverse order of the steps used for encryption, replacing the input and output transformations by inverse output and inverse input transformations, respectively, as appropriate.
Abstract:
A self-inverting enhanced CMEA encryption system suitable for use in wireless telephony. An unprocessed text message is introduced into the system and subjected to a first iteration of a CMEA process, using a first CMEA key to produce a first intermediate message, a first intermediate processed text message, a first intermediate ciphertext message or the like. The first intermediate processed text message is subjected to a further iteration of the CMEA process, using a second CMEA key, to produce a second intermediate processed text message. The second intermediate processed text message is subjected to a final iteration of the CMEA process, using the first CMEA key, to produce the final processed text message. Security may be additionally enhanced by subjecting each message to an input/output transformation before and after each iteration of the CMEA process. In a three-iteration process, a total of four input/output transformations are used with the first and fourth input/output transformations being identical, and with the second and third input/output transformations being identical.
Abstract:
Methods and apparatus for enhanced CMEA, or ECMEA, processing. A forward ECMEA and a reverse ECMEA process are provided. The forward ECMEA process decrypts text encrypted by the reverse ECMEA process and the reverse ECMEA process decrypts text encrypted by the forward ECMEA process. The forward ECMEA process employs a transformation, an iteration of the CMEA process, and an inverse transformation. The reverse ECMEA process employs a reverse transformation, an iteration of the CMEA process, and a reverse inverse transformation. The transformations and inverse transformations, and the iteration of the CMEA process, employ secret offsets to improve security. The transformations and the iteration of the CMEA process also employ an enhanced tbox function using an involutary lookup table.
Abstract:
An enhancement to the use of a tbox function for CMEA encryption. Offsets are generated for application of the tbox function to a message, using secret values and previously encrypted message octets. The offsets are used to permute the message for application of the tbox function. For the first message of a call, the previously encrypted message octets are replaced by an initialization value. In a system employing a single iteration of CMEA encryption, first and second offsets are generated. In a system employing two iterations of CMEA encryption, first, second, third and fourth offsets are generated, with the first and second offsets being used in the first iteration of CMEA encryption and the third and fourth offsets being used in the second iteration of CMEA encryption.
Abstract:
The present invention discloses a method to recover and restore dendritic and synaptic neuron connections that have been degraded or destroyed by neurodegenerative diseases. In the present invention tryptamines are used to induce neuro plasticity and restore both dendritic density and synaptic connections of neurons in the brain. In the preferred embodiment LSD given in micro doses can induce dendritic and synaptic genesis in neuronal networks and improve the quality of life of people with neurodegenerative diseases such as Alzheimer's, Huntington's, Multiple Sclerosis, Parkinson's and Frontotemporal dementia.
Abstract:
A media capture device (MCD) that provides a multi-sensor, free flight camera platform with advanced learning technology to replicate the desires and skills of the purchaser/owner is provided. Advanced algorithms may uniquely enable many functions for autonomous and revolutionary photography. The device may learn about the user, the environment, and/or how to optimize a photographic experience so that compelling events may be captured and composed into efficient and emotional sharing. The device may capture better photos and videos as perceived by one's social circle of friends, and/or may greatly simplify the process of using a camera to the ultimate convenience of fill autonomous operation.
Abstract:
An oceangoing vessel exhaust pipe coupling used to temporarily couple to an oceangoing vessel exhaust pipe. Installation and removal of the coupling only requires a simple mechanism with three translational degrees of freedom and one rotational degree of freedom, thereby enabling remote coupling. The coupling adapts to a wide array of exhaust pipe shapes and sizes. This is accomplished by a unique shape that allows stable and balanced resting position on top of an exhaust pipe as well as a two-chamber configuration, wherein the two chambers are separated by a permeable partition. Furthermore, the unique shapes of the chambers deflect the exhaust gas stream towards the outlet of the coupling, regardless of exhaust pipe style, thereby increasing capture efficiency and extending the life of an attached fabric flexible hose.
Abstract:
A miniaturized active dual pixel stereo system and method for close range depth extraction includes a projector adapted to project a locally distinct projected pattern onto an image of a scene and a dual pixel sensor including a dual pixel sensor array that generates respective displaced images of the scene. A three-dimensional image is generated from the displaced images of the scene by projecting the locally distinct projected pattern onto the image of the scene, capturing the respective displaced images of the scene using the dual pixel sensor, generating disparity images from the respective displaced images of the scene, determining depth to each pixel of the disparity images, and generating the three-dimensional image from the determined depth to each pixel. A three-dimensional image of a user's hands generated by the active dual pixel stereo system may be processed by gesture recognition software to provide an input to an electronic eyewear device.
Abstract:
An insertion device for an IUD. The insertion device comprises an introducer having an elongate hollow body and a first end and a second end, the hollow body defining an elongate passageway extending from the first end to the second end and defining openings at the first end and the second end, and a pusher provided or configured to be provided inside the elongate passageway such that the pusher is movable through or along the passageway. The passageway is sized to accommodate an IUD such that the IUD is slidable along the passageway. Further, the second end of the introducer that abuts the fundus of the uterus in use is configured to have an increased surface area relative to prior art devices so as to reduce the risk of injury, including perforation of the uterus.