DYNAMIC RANGE WIRELESS COMMUNICATIONS ACCESS POINT
    1.
    发明申请
    DYNAMIC RANGE WIRELESS COMMUNICATIONS ACCESS POINT 有权
    动态范围无线通信接入点

    公开(公告)号:US20140247822A1

    公开(公告)日:2014-09-04

    申请号:US14278851

    申请日:2014-05-15

    IPC分类号: H04W88/10 H04W8/00

    摘要: The claimed subject matter provides for systems and/or methods for a dynamic range wireless access point to initiate deliberate and/or selective communications with one or more wireless devices over a short range radio path. One embodiment of an access point system comprises a processor that transfers one or more wireless devices to a long range radio path once a transition condition has been met. In another embodiment, an access point system may affect transactions between user/customer's smart devices and a commercial place of business where the access point system and the smart devices initiate communications when the smart devices are deliberately placed within the proximity of the access point antenna and/or the smart devices are brought within the vicinity of the access point antenna such as by passing through the entrance or exit to the place of business.

    摘要翻译: 所要求保护的主题提供用于动态范围无线接入点的系统和/或方法,以通过短距离无线电路径发起与一个或多个无线设备的故意和/或选择性通信。 接入点系统的一个实施例包括一旦满足转换条件,将一个或多个无线设备传送到远程无线电路径的处理器。 在另一个实施例中,接入点系统可以影响用户/客户的智能设备与商业营业场所之间的交易,其中当智能设备故意放置在接入点天线附近时,接入点系统和智能设备发起通信,以及 /或智能设备被带到接入点天线附近,例如通过入口或出口到达营业地点。

    Leveraging chip variability
    2.
    发明授权
    Leveraging chip variability 有权
    利用芯片变异性

    公开(公告)号:US08977910B2

    公开(公告)日:2015-03-10

    申请号:US13791479

    申请日:2013-03-08

    IPC分类号: G06F11/14 G06F11/10 G11C29/56

    摘要: Embodiments are described that leverage variability of a chip. Different areas of a chip vary in terms of reliability under a same operating condition. The variability may be captured by measuring errors over different areas of the chip. A physical factor that affects or controls the likelihood of an error on the chip can be varied. For example, the voltage supplied to a chip may be provided at different levels. At each level of the physical factor, the chip is tested for errors within the regions. Some indication of the error statistics for the regions is stored and then used to adjust power used by the chip, to adjust reliability behavior of the chip, to allow applications to control how the chip is used, to compute a signature uniquely identifying the chip, etc.

    摘要翻译: 描述利用芯片的可变性的实施例。 芯片的不同区域在相同工作条件下的可靠性方面不同。 可以通过在芯片的不同区域上测量误差来捕获可变性。 可以改变影响或控制芯片上的错误可能性的物理因素。 例如,提供给芯片的电压可以设置在不同的水平。 在物理因素的每个级别,对芯片进行测试,以区域内的错误。 存储区域的误差统计的一些指示,然后用于调整芯片使用的功率,调整芯片的可靠性行为,以允许应用程序控制芯片的使用方式,以计算唯一识别芯片的签名, 等等

    Device-pairing by reading an address provided in device-readable form
    3.
    发明授权
    Device-pairing by reading an address provided in device-readable form 有权
    通过读取以设备可读形式提供的地址进行设备配对

    公开(公告)号:US08966096B2

    公开(公告)日:2015-02-24

    申请号:US13888356

    申请日:2013-05-06

    摘要: A system is described for allowing a user, operating a trusted device, to remotely log into a server via a potentially untrustworthy client. A first secure connection is established between the client and the server. A second secure connection is established between the device and the server through the client. The user then remotely logs into the server over the second secure connection using the device. The second secure connection is tunneled within the first secure connection, preventing the untrustworthy client from discovering personal information associated with the user. According to one feature, prior to forming the second secure connection, the user establishes a pairing relationship with the client by reading an address of the client using a reading mechanism. According to another feature, the device can receive marketing information in the course of a transaction.

    摘要翻译: 描述了允许用户操作可信设备的系统通过潜在不可信任的客户端远程登录到服务器中的系统。 在客户端和服务器之间建立第一个安全连接。 通过客户端在设备和服务器之间建立第二个安全连接。 然后用户使用设备通过第二个安全连接远程登录到服务器。 第二安全连接在第一安全连接中被隧道化,从而防止不可信任的客户端发现与用户相关联的个人信息。 根据一个特征,在形成第二安全连接之前,用户通过使用读取机制读取客户端的地址来与客户端建立配对关系。 根据另一个特征,该设备可以在交易过程中接收营销信息。

    Counterfeit prevention for optical media
    4.
    发明授权
    Counterfeit prevention for optical media 有权
    光学介质防伪

    公开(公告)号:US08893308B2

    公开(公告)日:2014-11-18

    申请号:US13715086

    申请日:2012-12-14

    IPC分类号: H04N7/16 G11B20/00

    摘要: A method and system are provided for counterfeit prevention for optical media. In one example, a system is provided for verifying authenticity information on an optical medium. The system receives the optical medium including a fingerprint having at least one probabilistic feature. A probabilistic feature is a physical feature having both a substantial chance to be read as a first value and a substantial chance to be read as a second value. The system receives an o-DNA signature-at-issuance. The system calculates an o-DNA signature-at-verification by reading each probabilistic feature plural times. The system calculates a vector-of-differences between the o-DNA signature-at-issuance and the o-DNA signature-at-verification. The vector-of-differences includes a maximum distance metric between the o-DNA signature-at-issuance and the o-DNA signature-at-verification. The vector-of-differences indicates the optical medium is authentic if the maximum distance metric is less than a threshold.

    摘要翻译: 提供了用于光学介质防伪的方法和系统。 在一个示例中,提供了一种用于验证光学介质上的真实性信息的系统。 该系统接收包括具有至少一个概率特征的指纹的光学介质。 概率特征是具有作为第一值读取的实质机会和作为第二值被读取的实质机会的物理特征。 系统接收到o-DNA签名。 该系统通过多次阅读每个概率特征来计算验证中的o-DNA签名。 该系统计算o-DNA签名签名与o-DNA签名验证之间的差异向量。 差异向量包括o-DNA签名签名与验证之间的o-DNA签名之间的最大距离度量。 如果最大距离度量小于阈值,则差分矢量表示光学介质是真实的。

    Automatic construction of human interaction proof engines
    5.
    发明授权
    Automatic construction of human interaction proof engines 有权
    人工互动发动机自动构建

    公开(公告)号:US08978144B2

    公开(公告)日:2015-03-10

    申请号:US14281316

    申请日:2014-05-19

    摘要: Human Interaction Proofs (“HIPs”, sometimes referred to as “captchas”), may be generated automatically. An captcha specification language may be defined, which allows a captcha scheme to be defined in terms of how symbols are to be chosen and drawn, and how those symbols are obscured. The language may provide mechanisms to specify the various ways in which to obscure symbols. New captcha schemes may be generated from existing specifications, by using genetic algorithms that combine features from existing captcha schemes that have been successful. Moreover, the likelihood that a captcha scheme has been broken by attackers may be estimated by collecting data on the time that it takes existing captcha schemes to be broken, and using regression to estimate the time to breakage as a function of either the captcha's features or its measured quality.

    摘要翻译: 人工交互证明(“HIP”,有时也称为“验证码”)可能会自动生成。 可以定义验证码规范语言,这允许根据如何选择和绘制符号以及这些符号如何被遮蔽来定义验证码方案。 该语言可以提供机制来指定模糊符号的各种方式。 可以通过使用遗传算法从现有规范中生成新的验证码方案,该遗传算法将已经获得成功的现有验证码方案的功能相结合。 此外,验证码计划已被攻击者破坏的可能性可以通过在现有验证码计划被破坏的时间收集数据来估计,并且使用回归来估计作为验证码的特征或函数的破坏时间 其测量质量。

    Dynamic range wireless communications access point
    6.
    发明授权
    Dynamic range wireless communications access point 有权
    动态范围无线通信接入点

    公开(公告)号:US08971810B2

    公开(公告)日:2015-03-03

    申请号:US14278851

    申请日:2014-05-15

    摘要: The claimed subject matter provides for systems and/or methods for a dynamic range wireless access point to initiate deliberate and/or selective communications with one or more wireless devices over a short range radio path. One embodiment of an access point system comprises a processor that transfers one or more wireless devices to a long range radio path once a transition condition has been met. In another embodiment, an access point system may affect transactions between user/customer's smart devices and a commercial place of business where the access point system and the smart devices initiate communications when the smart devices are deliberately placed within the proximity of the access point antenna and/or the smart devices are brought within the vicinity of the access point antenna such as by passing through the entrance or exit to the place of business.

    摘要翻译: 所要求保护的主题提供用于动态范围无线接入点的系统和/或方法,以通过短距离无线电路径发起与一个或多个无线设备的故意和/或选择性通信。 接入点系统的一个实施例包括一旦满足转换条件,将一个或多个无线设备传送到远程无线电路径的处理器。 在另一个实施例中,接入点系统可以影响用户/客户的智能设备与商业营业场所之间的交易,其中当智能设备故意放置在接入点天线附近时,接入点系统和智能设备发起通信,以及 /或智能设备被带到接入点天线附近,例如通过入口或出口到达营业地点。

    AUTOMATIC CONSTRUCTION OF HUMAN INTERACTION PROOF ENGINES
    7.
    发明申请
    AUTOMATIC CONSTRUCTION OF HUMAN INTERACTION PROOF ENGINES 有权
    人类交互防护机器人的自动化建设

    公开(公告)号:US20140259104A1

    公开(公告)日:2014-09-11

    申请号:US14281316

    申请日:2014-05-19

    IPC分类号: G06F21/30

    摘要: Human Interaction Proofs (“HIPs”, sometimes referred to as “captchas”), may be generated automatically. An captcha specification language may be defined, which allows a captcha scheme to be defined in terms of how symbols are to be chosen and drawn, and how those symbols are obscured. The language may provide mechanisms to specify the various ways in which to obscure symbols. New captcha schemes may be generated from existing specifications, by using genetic algorithms that combine features from existing captcha schemes that have been successful. Moreover, the likelihood that a captcha scheme has been broken by attackers may be estimated by collecting data on the time that it takes existing captcha schemes to be broken, and using regression to estimate the time to breakage as a function of either the captcha's features or its measured quality.

    摘要翻译: 人工交互证明(“HIP”,有时也称为“验证码”)可能会自动生成。 可以定义验证码规范语言,这允许根据如何选择和绘制符号以及这些符号如何被遮蔽来定义验证码方案。 该语言可以提供机制来指定模糊符号的各种方式。 可以通过使用遗传算法从现有规范中生成新的验证码方案,该遗传算法将已经获得成功的现有验证码方案的功能相结合。 此外,验证码计划已被攻击者破坏的可能性可以通过在现有验证码计划被破坏的时间收集数据来估计,并且使用回归来估计作为验证码的特征或函数的破坏时间 其测量质量。

    Coupling devices using multiple discovery zones
    8.
    发明授权
    Coupling devices using multiple discovery zones 有权
    使用多个发现区域的耦合设备

    公开(公告)号:US09107028B2

    公开(公告)日:2015-08-11

    申请号:US13715777

    申请日:2012-12-14

    摘要: A system in which a discovering wireless device formulates a first discovery zone. In response to discovering a discoverable wireless device within the zone, the discovering wireless device establish a wireless communication channel with the discoverable wireless device using a powered wireless protocol, and communicates security data with the discoverable wireless device using the wireless communication channel. The discovering wireless device also formulates a second discovery zone that is larger than the first discovery zone, and uses the security data to pair with a target device within the second discovery zone. Thus, pairing is significantly simplified from a user perspective.

    摘要翻译: 发现无线设备制定第一发现区域的系统。 响应于发现区域内的可发现的无线设备,发现的无线设备使用有源无线协议与可发现的无线设备建立无线通信信道,并且使用无线通信信道与可发现的无线设备通信安全数据。 发现的无线设备还制定比第一发现区域大的第二发现区域,并且使用安全数据与第二发现区域内的目标设备进行配对。 因此,从用户的角度来看,配对是显着简化的。

    COUPLING DEVICES USING MULTIPLE DISCOVERY ZONES
    9.
    发明申请
    COUPLING DEVICES USING MULTIPLE DISCOVERY ZONES 有权
    使用多个发现区域的耦合设备

    公开(公告)号:US20140170968A1

    公开(公告)日:2014-06-19

    申请号:US13715777

    申请日:2012-12-14

    IPC分类号: H04W4/00

    摘要: A system in which a discovering wireless device formulates a first discovery zone. In response to discovering a discoverable wireless device within the zone, the discovering wireless device establish a wireless communication channel with the discoverable wireless device using a powered wireless protocol, and communicates security data with the discoverable wireless device using the wireless communication channel. The discovering wireless device also formulates a second discovery zone that is larger than the first discovery zone, and uses the security data to pair with a target device within the second discovery zone. Thus, pairing is significantly simplified from a user perspective.

    摘要翻译: 发现无线设备制定第一发现区域的系统。 响应于发现区域内的可发现的无线设备,发现的无线设备使用有源无线协议与可发现的无线设备建立无线通信信道,并且使用无线通信信道与可发现的无线设备通信安全数据。 发现的无线设备还制定比第一发现区域大的第二发现区域,并且使用安全数据与第二发现区域内的目标设备进行配对。 因此,从用户的角度来看,配对是显着简化的。

    Device-Pairing by Reading an Address Provided in Device-Readable Form
    10.
    发明申请
    Device-Pairing by Reading an Address Provided in Device-Readable Form 有权
    通过读取以设备可读格式提供的地址进行设备配对

    公开(公告)号:US20130246637A1

    公开(公告)日:2013-09-19

    申请号:US13888356

    申请日:2013-05-06

    IPC分类号: H04L29/06

    摘要: A system is described for allowing a user, operating a trusted device, to remotely log into a server via a potentially untrustworthy client. The system operates by establishing a first secure connection between the client and the server. The system then establishes a second secure connection between the device and the server through the client. The user then remotely logs into the server over the second secure connection using the device. The second secure connection is tunneled within the first secure connection, preventing the untrustworthy client from discovering personal information associated with the user. According to one feature, prior to forming the second secure connection, the user can establish a pairing relationship with the client by reading an address of the client using any kind of reading mechanism. According to another feature, the device can receive marketing information in the course of a transaction.

    摘要翻译: 描述了允许用户操作可信设备的系统通过潜在不可信任的客户端远程登录到服务器中的系统。 该系统通过在客户端和服务器之间建立第一个安全连接来运行。 然后,系统通过客户端在设备和服务器之间建立第二个安全连接。 然后用户使用设备通过第二个安全连接远程登录到服务器。 第二安全连接在第一安全连接中被隧道化,从而防止不可信任的客户端发现与用户相关联的个人信息。 根据一个特征,在形成第二安全连接之前,用户可以通过使用任何种类的读取机制读取客户端的地址来与客户端建立配对关系。 根据另一个特征,该设备可以在交易过程中接收营销信息。