Method, system, and computer-accessible medium for authentication of paper using a speckle pattern
    1.
    发明授权
    Method, system, and computer-accessible medium for authentication of paper using a speckle pattern 有权
    方法,系统和计算机可访问介质,用于使用斑点图案进行纸张认证

    公开(公告)号:US08781153B2

    公开(公告)日:2014-07-15

    申请号:US12996610

    申请日:2009-06-05

    IPC分类号: G06K9/00

    摘要: An exemplary methodology, procedure, system, method and computer-accessible medium can be provided for authenticating a portion of a non-digital medium for a document, by receiving at least one image of at least one first marked portion of the non-digital medium for the document, extracting at least one first speckle pattern of the at least one first marked portion, and comparing the first speckle pattern of the at least one first marked portion with at least one second speckle pattern relating to the non-digital medium to determine if a similarity between the first and second speckle patterns equals or exceeds a predetermined amount.

    摘要翻译: 可以提供一种示例性的方法,程序,系统,方法和计算机可访问介质,用于通过接收非数字介质的至少一个第一标记部分的至少一个图像来认证文档的非数字媒体的一部分 提取所述至少一个第一标记部分的至少一个第一散斑图案,以及将所述至少一个第一标记部分的所述第一散斑图案与与所述非数字介质相关的至少一个第二散斑图案进行比较以确定 如果第一和第二斑点图案之间的相似度等于或超过预定量。

    METHOD, SYSTEM, AND COMPUTER-ACCESSIBLE MEDIUM FOR AUTHENTICATION OF PAPER USING A SPECKLE PATTERN
    2.
    发明申请
    METHOD, SYSTEM, AND COMPUTER-ACCESSIBLE MEDIUM FOR AUTHENTICATION OF PAPER USING A SPECKLE PATTERN 有权
    方法,系统和计算机可访问的媒体,用于使用一个特征图形来验证纸张

    公开(公告)号:US20110194737A1

    公开(公告)日:2011-08-11

    申请号:US12996610

    申请日:2009-06-05

    IPC分类号: G06K9/68 G06K9/00

    摘要: An exemplary methodology, procedure, system, method and computer-accessible medium can be provided for authenticating a portion of a non-digital medium for a document, by receiving at least one image of at least one first marked portion of the non-digital medium for the document, extracting at least one first speckle pattern of the at least one first marked portion, and comparing the first speckle pattern of the at least one first marked portion with at least one second speckle pattern relating to the non-digital medium to determine if a similarity between the first and second speckle patterns equals or exceeds a predetermined amount.

    摘要翻译: 可以提供一种示例性的方法,程序,系统,方法和计算机可访问介质,用于通过接收非数字介质的至少一个第一标记部分的至少一个图像来认证文档的非数字媒体的一部分 提取所述至少一个第一标记部分的至少一个第一散斑图案,以及将所述至少一个第一标记部分的所述第一散斑图案与与所述非数字介质相关的至少一个第二散斑图案进行比较以确定 如果第一和第二斑点图案之间的相似度等于或超过预定量。

    SYSTEMS, METHODS AND COMPUTER-ACCESSIBLE MEDIUMS FOR AUTHENTICATION AND VERIFICATION OF PHYSICAL OBJECTS
    4.
    发明申请
    SYSTEMS, METHODS AND COMPUTER-ACCESSIBLE MEDIUMS FOR AUTHENTICATION AND VERIFICATION OF PHYSICAL OBJECTS 审中-公开
    用于认证和验证物理对象的系统,方法和计算机可访问性

    公开(公告)号:US20140205153A1

    公开(公告)日:2014-07-24

    申请号:US14005643

    申请日:2012-03-19

    IPC分类号: G06K9/00

    摘要: Exemplary methodology, procedure, system, method and computer-accessible medium can be provided for authenticating a non-digital medium of a physical object, by receiving at least one image of video of at least one marked or unmarked region, and comparing the first microscopic image or video of at least one marked or unmarked region with at least one second microscopic image or video relating to the non-digital medium to determine if a similarity between the first and second microscopic images or videos matches or exceeds a predetermined amount.

    摘要翻译: 可以提供示例性方法,程序,系统,方法和计算机可访问介质,用于通过接收至少一个标记或未标记区域的视频的至少一个图像来认证物理对象的非数字介质,并且比较第一微观 至少一个标记或未标记区域的图像或视频,其具有与非数字介质有关的至少一个第二显微图像或视频,以确定第一和第二显微图像或视频之间的相似度是否匹配或超过预定量。

    SYSTEM AND METHOD FOR DETERMINING THE GEOGRAPHIC LOCATION OF INTERNET HOSTS
    5.
    发明申请
    SYSTEM AND METHOD FOR DETERMINING THE GEOGRAPHIC LOCATION OF INTERNET HOSTS 有权
    用于确定互联网主机地理位置的系统和方法

    公开(公告)号:US20080037536A1

    公开(公告)日:2008-02-14

    申请号:US11778490

    申请日:2007-07-16

    IPC分类号: H04L12/28

    摘要: A system and methodologies are disclosed for determining the geographic location of an Internet host. A first method infers host location based on the DNS names of the host of interest or other nearby network nodes. A second method employs network delay measurements from geographically distributed locations to triangulate the coordinates of the host. A third method couples partial host-to-location mapping information obtained from one or more sources with BGP or other routing information in order to infer location of the host of interest.

    摘要翻译: 公开了用于确定因特网主机的地理位置的系统和方法。 第一种方法根据感兴趣的主机的DNS名称或其他附近的网络节点来推断主机位置。 第二种方法采用来自地理分布位置的网络延迟测量来对主机的坐标进行三角测量。 第三种方法将从一个或多个源获得的部分主机到位置映射信息与BGP或其他路由信息相耦合,以便推断感兴趣的主机的位置。

    System and method for determining the geographic location of internet hosts
    6.
    发明授权
    System and method for determining the geographic location of internet hosts 有权
    确定互联网主机地理位置的系统和方法

    公开(公告)号:US07711846B2

    公开(公告)日:2010-05-04

    申请号:US11778490

    申请日:2007-07-16

    IPC分类号: G06F15/173 G06F15/16

    摘要: A system and methodologies are disclosed for determining the geographic location of an Internet host. A first method infers host location based on the DNS names of the host of interest or other nearby network nodes. A second method employs network delay measurements from geographically distributed locations to triangulate the coordinates of the host. A third method couples partial host-to-location mapping information obtained from one or more sources with BGP or other routing information in order to infer location of the host of interest.

    摘要翻译: 公开了用于确定因特网主机的地理位置的系统和方法。 第一种方法根据感兴趣的主机的DNS名称或其他附近的网络节点来推断主机位置。 第二种方法采用来自地理分布位置的网络延迟测量来对主机的坐标进行三角测量。 第三种方法将从一个或多个源获得的部分主机到位置映射信息与BGP或其他路由信息相耦合,以便推断感兴趣的主机的位置。

    Automatic generation of embedded signatures for duplicate detection on a public network
    7.
    发明申请
    Automatic generation of embedded signatures for duplicate detection on a public network 有权
    自动生成嵌入式签名,用于公共网络上的重复检测

    公开(公告)号:US20090299994A1

    公开(公告)日:2009-12-03

    申请号:US12156370

    申请日:2008-05-30

    IPC分类号: G06F17/30

    CPC分类号: G06F17/30663 G06F21/552

    摘要: In accordance with an aspect of the invention, a method and system are disclosed for constructing an embedded signature in order to facilitate post-facto detection of leakage of sensitive data. The leakage detection mechanism involves: 1) identifying at least one set of words in an electronic document containing sensitive data, the set of words having a low frequency of occurrence in a first collection of electronic documents; and, 2) transmitting a query to search a second collection of electronic documents for any electronic document that contains the set of words having a low frequency of occurrence. This leakage detection mechanism has at least the following advantages: a) it is tamper-resistant; b) it avoids the need to add a watermark to the sensitive data, c) it can be used to locate the sensitive data even if the leakage occurred before the embedded signature was ever identified; and, d) it can be used to detect an embedded signature regardless of whether the data is being presented statically or dynamically.

    摘要翻译: 根据本发明的一个方面,公开了一种用于构建嵌入式签名的方法和系统,以便于事后检测敏感数据的泄漏。 所述泄漏检测机构包括:1)识别包含敏感数据的电子文档中的至少一组单词,所述一组单词在电子文档的第一集合中具有低频率出现; 以及2)发送查询以搜索包含具有低发生频率的单词集合的任何电子文档的第二电子文档集合。 该泄漏检测机构至少具有以下优点:a)它是防篡改的; b)它避免了需要向敏感数据添加水印,c)即使在嵌入式签名被识别之前发生泄漏,它也可以用于定位敏感数据; 和d)它可以用于检测嵌入式签名,而不管数据是静态还是动态呈现。

    Automatic generation of embedded signatures for duplicate detection on a public network
    8.
    发明授权
    Automatic generation of embedded signatures for duplicate detection on a public network 有权
    自动生成嵌入式签名,用于公共网络上的重复检测

    公开(公告)号:US07979413B2

    公开(公告)日:2011-07-12

    申请号:US12156370

    申请日:2008-05-30

    IPC分类号: G06F7/00 G06F17/30

    CPC分类号: G06F17/30663 G06F21/552

    摘要: In accordance with an aspect of the invention, a method and system are disclosed for constructing an embedded signature in order to facilitate post-facto detection of leakage of sensitive data. The leakage detection mechanism involves: 1) identifying at least one set of words in an electronic document containing sensitive data, the set of words having a low frequency of occurrence in a first collection of electronic documents; and, 2) transmitting a query to search a second collection of electronic documents for any electronic document that contains the set of words having a low frequency of occurrence. This leakage detection mechanism has at least the following advantages: a) it is tamper-resistant; b) it avoids the need to add a watermark to the sensitive data, c) it can be used to locate the sensitive data even if the leakage occurred before the embedded signature was ever identified; and, d) it can be used to detect an embedded signature regardless of whether the data is being presented statically or dynamically.

    摘要翻译: 根据本发明的一个方面,公开了一种用于构建嵌入式签名的方法和系统,以便于事后检测敏感数据的泄漏。 所述泄漏检测机构包括:1)识别包含敏感数据的电子文档中的至少一组单词,所述一组单词在电子文档的第一集合中具有低频率出现; 以及2)发送查询以搜索包含具有低发生频率的单词集合的任何电子文档的第二电子文档集合。 该泄漏检测机构至少具有以下优点:a)它是防篡改的; b)它避免了需要向敏感数据添加水印,c)即使在嵌入式签名被识别之前发生泄漏,它也可以用于定位敏感数据; 以及d)它可以用于检测嵌入的签名,而不管数据是静态还是动态呈现。

    Unique packet identifiers for preventing leakage of sensitive information
    9.
    发明申请
    Unique packet identifiers for preventing leakage of sensitive information 审中-公开
    用于防止敏感信息泄露的独特数据包标识符

    公开(公告)号:US20090300751A1

    公开(公告)日:2009-12-03

    申请号:US12156371

    申请日:2008-05-30

    IPC分类号: H04L9/00 G06F21/00

    CPC分类号: H04L63/0227

    摘要: In accordance with an aspect of the invention, leakage prevention is implemented by: a) associating—within a network—a unique identifier with a packet transmitted by a process which has previously accessed data containing sensitive information, and b) searching a packet before it exits a network for the unique identifier. This mechanism provides a strong guarantee against leakage of sensitive data out of a network by facilitating the monitoring of packets which potentially contain the sensitive information. The unique identifier may be located in the header of the packet, which is detectable without requiring a heavy investment of network resources. Additionally, a packet's movement within a network may be tracked by analyzing trapped system calls. Furthermore, an exiting packet may be analyzed by a network firewall, the firewall utilizing various policies to determine how to proceed when a packet containing a unique identifier is located.

    摘要翻译: 根据本发明的一个方面,通过以下方式实现泄漏防止:a)将唯一标识符与由先前已经访问过的包含敏感信息的数据的处理发送的分组相关联,以及b)在其之前搜索分组 退出唯一标识符的网络。 该机制通过促进对可能包含敏感信息的数据包的监视,提供了强大的保证,可以将敏感数据从网络泄漏出来。 唯一标识符可以位于分组的报头中,其可以被检测,而不需要大量的网络资源投资。 另外,可以通过分析被捕获的系统呼叫来跟踪分组在网络内的移动。 此外,可以由网络防火墙分析出现的分组,防火墙利用各种策略来确定当包含唯一标识符的分组位于何时进行。

    System and method for determining the geographic location of internet hosts
    10.
    发明授权
    System and method for determining the geographic location of internet hosts 失效
    确定互联网主机地理位置的系统和方法

    公开(公告)号:US07296088B1

    公开(公告)日:2007-11-13

    申请号:US09849662

    申请日:2001-05-04

    IPC分类号: G06F15/173 G06F15/16

    摘要: A system and methodologies are disclosed for determining the geographic location of an Internet host. A first method infers host location based on the DNS names of the host of interest or other nearby network nodes. A second method employs network delay measurements from geographically distributed locations to triangulate the coordinates of the host. A third method couples partial host-to-location mapping information obtained from one or more sources with BGP or other routing information in order to infer location of the host of interest.

    摘要翻译: 公开了用于确定因特网主机的地理位置的系统和方法。 第一种方法根据感兴趣的主机的DNS名称或其他附近的网络节点来推断主机位置。 第二种方法采用来自地理分布位置的网络延迟测量来对主机的坐标进行三角测量。 第三种方法将从一个或多个源获得的部分主机到位置映射信息与BGP或其他路由信息相耦合,以便推断感兴趣的主机的位置。