摘要:
The claimed subject matter provides for systems and/or methods for a dynamic range wireless access point to initiate deliberate and/or selective communications with one or more wireless devices over a short range radio path. One embodiment of an access point system comprises a processor that transfers one or more wireless devices to a long range radio path once a transition condition has been met. In another embodiment, an access point system may affect transactions between user/customer's smart devices and a commercial place of business where the access point system and the smart devices initiate communications when the smart devices are deliberately placed within the proximity of the access point antenna and/or the smart devices are brought within the vicinity of the access point antenna such as by passing through the entrance or exit to the place of business.
摘要:
Embodiments are described that leverage variability of a chip. Different areas of a chip vary in terms of reliability under a same operating condition. The variability may be captured by measuring errors over different areas of the chip. A physical factor that affects or controls the likelihood of an error on the chip can be varied. For example, the voltage supplied to a chip may be provided at different levels. At each level of the physical factor, the chip is tested for errors within the regions. Some indication of the error statistics for the regions is stored and then used to adjust power used by the chip, to adjust reliability behavior of the chip, to allow applications to control how the chip is used, to compute a signature uniquely identifying the chip, etc.
摘要:
A system is described for allowing a user, operating a trusted device, to remotely log into a server via a potentially untrustworthy client. A first secure connection is established between the client and the server. A second secure connection is established between the device and the server through the client. The user then remotely logs into the server over the second secure connection using the device. The second secure connection is tunneled within the first secure connection, preventing the untrustworthy client from discovering personal information associated with the user. According to one feature, prior to forming the second secure connection, the user establishes a pairing relationship with the client by reading an address of the client using a reading mechanism. According to another feature, the device can receive marketing information in the course of a transaction.
摘要:
A method and system are provided for counterfeit prevention for optical media. In one example, a system is provided for verifying authenticity information on an optical medium. The system receives the optical medium including a fingerprint having at least one probabilistic feature. A probabilistic feature is a physical feature having both a substantial chance to be read as a first value and a substantial chance to be read as a second value. The system receives an o-DNA signature-at-issuance. The system calculates an o-DNA signature-at-verification by reading each probabilistic feature plural times. The system calculates a vector-of-differences between the o-DNA signature-at-issuance and the o-DNA signature-at-verification. The vector-of-differences includes a maximum distance metric between the o-DNA signature-at-issuance and the o-DNA signature-at-verification. The vector-of-differences indicates the optical medium is authentic if the maximum distance metric is less than a threshold.
摘要:
Human Interaction Proofs (“HIPs”, sometimes referred to as “captchas”), may be generated automatically. An captcha specification language may be defined, which allows a captcha scheme to be defined in terms of how symbols are to be chosen and drawn, and how those symbols are obscured. The language may provide mechanisms to specify the various ways in which to obscure symbols. New captcha schemes may be generated from existing specifications, by using genetic algorithms that combine features from existing captcha schemes that have been successful. Moreover, the likelihood that a captcha scheme has been broken by attackers may be estimated by collecting data on the time that it takes existing captcha schemes to be broken, and using regression to estimate the time to breakage as a function of either the captcha's features or its measured quality.
摘要:
The claimed subject matter provides for systems and/or methods for a dynamic range wireless access point to initiate deliberate and/or selective communications with one or more wireless devices over a short range radio path. One embodiment of an access point system comprises a processor that transfers one or more wireless devices to a long range radio path once a transition condition has been met. In another embodiment, an access point system may affect transactions between user/customer's smart devices and a commercial place of business where the access point system and the smart devices initiate communications when the smart devices are deliberately placed within the proximity of the access point antenna and/or the smart devices are brought within the vicinity of the access point antenna such as by passing through the entrance or exit to the place of business.
摘要:
Human Interaction Proofs (“HIPs”, sometimes referred to as “captchas”), may be generated automatically. An captcha specification language may be defined, which allows a captcha scheme to be defined in terms of how symbols are to be chosen and drawn, and how those symbols are obscured. The language may provide mechanisms to specify the various ways in which to obscure symbols. New captcha schemes may be generated from existing specifications, by using genetic algorithms that combine features from existing captcha schemes that have been successful. Moreover, the likelihood that a captcha scheme has been broken by attackers may be estimated by collecting data on the time that it takes existing captcha schemes to be broken, and using regression to estimate the time to breakage as a function of either the captcha's features or its measured quality.
摘要:
A system in which a discovering wireless device formulates a first discovery zone. In response to discovering a discoverable wireless device within the zone, the discovering wireless device establish a wireless communication channel with the discoverable wireless device using a powered wireless protocol, and communicates security data with the discoverable wireless device using the wireless communication channel. The discovering wireless device also formulates a second discovery zone that is larger than the first discovery zone, and uses the security data to pair with a target device within the second discovery zone. Thus, pairing is significantly simplified from a user perspective.
摘要:
A system in which a discovering wireless device formulates a first discovery zone. In response to discovering a discoverable wireless device within the zone, the discovering wireless device establish a wireless communication channel with the discoverable wireless device using a powered wireless protocol, and communicates security data with the discoverable wireless device using the wireless communication channel. The discovering wireless device also formulates a second discovery zone that is larger than the first discovery zone, and uses the security data to pair with a target device within the second discovery zone. Thus, pairing is significantly simplified from a user perspective.
摘要:
A system is described for allowing a user, operating a trusted device, to remotely log into a server via a potentially untrustworthy client. The system operates by establishing a first secure connection between the client and the server. The system then establishes a second secure connection between the device and the server through the client. The user then remotely logs into the server over the second secure connection using the device. The second secure connection is tunneled within the first secure connection, preventing the untrustworthy client from discovering personal information associated with the user. According to one feature, prior to forming the second secure connection, the user can establish a pairing relationship with the client by reading an address of the client using any kind of reading mechanism. According to another feature, the device can receive marketing information in the course of a transaction.