摘要:
The present invention is directed to a method for establishing a symmetric encryption key between a first device and a second device. The symmetric encryption key is a function of a phase difference of the signals emitted between the first device and the second device and distance between the first device and the second device.
摘要:
What is disclosed is a system and method for recovering a patient's cardiac pulse rate from a sequence of video images recording of that patient. In one embodiment, a reference signal of a particular frequency is generated at predetermined frequency intervals and a constrained source separation is performed on the source data to obtain an estimation of the source signal intended to be recovered. The reference signal is updated and constrained source separation is again performed. These operations are repeated for all frequencies of the reference signal. The frequency at which a minimum error is achieved is determined to be the subject's recovered cardiac pulse frequency. In such a manner, the source signal is extracted and recovered reliably from captured multi-channel RGB signals or multispectral signals. The teachings hereof find their uses in a variety of medical solutions including various military, security and telemedicine applications. Various embodiments are disclosed.
摘要:
A method, computer readable medium, and an apparatus for establishing a symmetric encryption key includes determining at one of a plurality of communication devices a first phase difference based on a first transmission from another one of the plurality of communication devices. A first new encryption key is generated based on the determined first phase difference at the one of the plurality of communication devices. At another one of the plurality of communication devices a second phase difference is generated based on a second transmission from the one of the plurality of communication devices. A second new encryption key is generated based on the determined second phase difference at the another one of the plurality of communication devices. Authenticity of the generated first new encryption key and the generated second new encryption key is determined. Communication between the one of the plurality of communication devices and the another one of the plurality of communication devices is established when the generated first new encryption key and the generated second new encryption key are determined to be authenticated.