Abstract:
The invention provides a method (100) of multi-user steganography. Firstly, the method involves establishing secure channels between at least three users including the steps of: each of the users randomly selecting a sequence of ordered Greenberger-Horne-Zeilinger (GHZ) states having at least three particles (110); each of the users taking one particle from each of their respective GHZ states to each form at least three subsequences (120); each of the users keeping an initial subsequence in their own site and transmitting a respective one of the remaining subsequences to each of the other users (130); and each of the users checking the security of established channels by measuring the number of particles on either side, as agreed between the users (140). Next, the method involves the users transmitting messages between each other by performing the steps of: each of the users encoding a cover message by applying a unitary transformation on the subsequences sent by the other users (150); each of the users transmitting the subsequences encoded with their cover message to the other users (160); each of the users retrieving their respective subsequence in which the cover messages of the other users are encoded (170); each of the users performing GHZs-based measurements on the subsequence having the cover messages of the other users encoded thereon, and comparing measurement outputs with the initial subsequence to obtain the encoded messages (180); and each of the users checking the security of established channels by measuring the number of particles on either side, as agreed between the users (190). After this process, the users exchange stenographic messages (200).
Abstract:
A system (600) for virtual peer to virtual peer (vp2vp) networking in a virtualized environment comprising: a hardware layer (201); a virtualisation layer (203); a vp2vp layer (204); and an application layer (206), characterised in that said vp2vp layer (204) is provided with a vp2vp protocol comprising: a vp2vp Registrar component (610) provided with means for registering virtual machines (VMs) as part of a peer to peer overlay network based on virtual and physical proximity; a vp2vp Discovery component (620) provided with means that enables a user and/or an application to communicate with said virtual machines in said overlay network and locate the nearest virtual machine that satisfies user and/or application requirements; a vp2vp Scheduler component (630) provided with means to extract runtime information to determine a physical server to assign new virtual machines based on said overlay network; a vp2vp Load Balancer component (630) provided with means to collect information on current load and hardware specifications and thereby reorganise deployed virtual machines from a plurality of physical servers; a vp2vp Data Manager component (650) provided with means for managing distribution of data generated by applications in a peer to peer manner in the virtualized environment; a vp2vp Service Level Agreement component (660) provided with means to define service level agreements in said vp2vp system; and a vp2vp Pricing component (670) provided with means to determine charges to be applied to a user based on quality of service requirements of the user.
Abstract:
The system and method of the present invention manages storage encryption over network-based or cloud based Elastic Block Store (EBS) Volume so as to provide flexibility and transparency on the encryption algorithm that can be universally acceptable to any provider and user. The system (100) of the present invention manages storage encryption over network based Elastic-Block Store (EBS) Volume (118) with a user mode (102) and a kernel mode (104); said user mode (102) comprising of an application (106) and a block device (108); said kernel mode (104) comprising of at an I/O Manager (110) for receiving mounting instruction and presenting decrypted data to requester; a crypto kernel module (112) for retrieving encryption key from key file; a file system (116) an EBS Volume (118). The methodology of the present invention is being initiated by initializing and configuring EBS Volume (202). Thereafter, encrypted EBS Volume (204) is mounted on the system and data is written on EBS Volume and said data is further encrypted (206). The encrypted data is read from EBS Volume and said encrypted data will be decrypted to obtain decrypted data (208). The encrypted EBS Volume (210) can be unmounted from the system when the volumes are not required. The present invention is transparent to user in which the data that is written to the EBS disk are encrypted transparently with the random generation of encryption key and stored in the disk. Confidentiality is allowed and reinforced in the EBS Volume by encryption of the data being stored in the data storage and decryption of the encrypted data using correct symmetric key provided by the authorized user during retrieval process.
Abstract:
The system and method of the present invention provides for automatic mass upgrade of firmware on mesh access point in a mesh network with at least one management system (102) and mesh AP (104). The said management system (102) comprising at least one GUI (102a); at least one FCAPS (102e); at least one SW Upgrade Function (102b); at least one topology (102c); at least one adjacent AP logic (102d) and at least one Upgrade Manager (102f). Selection of best path link is achieved by the at least one adjacent AP logic (102d) by calculating the best path link from the first AP to all other APs in the topology and generating an ordered table in which the sequence of APs for the firmware to be upgraded will be identified from the best path link. Accordingly, the mesh AP (104) comprising at least one SNMP Agent (104a); at least one Upgrade Module (104f); at least one Upgrade Manager (104b); at least one adjacent AP (104e); at least one TFTP Client (104c); and at least one TFTP Server (104d). The at least one Upgrade Manager (104b) will automatically initiates firmware upgrade operation upon receipt of acknowledgement that said upgrade request were sent to all APs in the ordered list. Alternatively, firmware upgrade operation is automatically performed when there is no AP to be upgraded according to the ordered table.
Abstract:
A method of fabricating a gas sensor with a conductive sensing element on a microhotplate (102) is provided, the method includes the steps of fabricating a microhotplate (102) on silicon, fabricating a nanostructured sensor on the microhotplate (102) by growing of conductive nanotubes (110) or nanowires with metal catalyst and functionalising the conductive nanotubes or nanowires, wherein step the nanotubes (110) or nanowires are functionalised with metal oxides selected from a group consisting and not limited to tin oxide (SnO2), tungsten oxide (WOx), tantalum pent-oxide (Ta2O5), aluminium oxide (Al2O3) copper oxide (CuO), iron oxide (Fe2O3), titanium oxide (TiO), Neodymium Oxide (Nd2O3) and zinc oxide (ZnO).
Abstract translation:提供了一种在微电子板(102)上制造具有导电感测元件的气体传感器的方法,该方法包括以下步骤:在硅上制造微电子板(102),通过生长导电的方式在微电子板(102)上制造纳米结构传感器 具有金属催化剂的纳米管(110)或纳米线,并且对导电纳米管或纳米线进行功能化,其中使用选自氧化锡(SnO 2),氧化钨(WO x) ),五氧化二钽(Ta 2 O 5),氧化铝(Al 2 O 3)氧化铜(CuO),氧化铁(Fe 2 O 3),氧化钛(TiO),氧化钕(Nd 2 O 3)和氧化锌(ZnO)等。
Abstract:
The invention relates to a method to enable the wireless nodes in a wireless mesh network communicate with each other and the gateways without the need of multi hopping and routing which requires master gateways in the network with high transmission power in order to transmit the master carrier signal for covering the network. The wireless nodes will use the location information of the desired destination to calculate the correct time and phase. When the nodes send their signal at the right time and phase, it will be combined with the master carrier signal and the combined signal will have the correct angle towards the desired destination.
Abstract:
A method of fabrication of an oxide layer at the bottom of a trench in a Metal Oxide Semiconductor Field Effect Transistor (MOSFET) is provided. The method includes deposition of a pad oxide layer on a semiconductor substrate of the MOSFET; etching the pad oxide layer and the semiconductor substrate to form a trench in the semiconductor substrate, depositing a silicone oxide layer to fill the trench in the semiconductor substrate; etching the silicone oxide layer to remove the silicone oxide layer from a plurality of sidewalls of the trench; coating the silicone substrate and silicone oxide layer with a photoresist to protect them of etching; etching the photoresist and the silicone oxide layer until surface of the silicone substrate is reached; and removing the photoresist from inside the trench to obtain a thick bottom oxide (TBO) layer in the trench.
Abstract:
The present invention relates to a system for use in generating a 3D model of a terrain comprising an elevation data generation apparatus (100) for derivation of elevation data based on a series of circles of varying radius generated on the terrain by the apparatus (100) and a reference concentric circles data. Said elevation data generation apparatus (100) comprises an image-capturing device (202) coupled with a wide-angle lens (214), a rotary light-reflecting device (206) having a plurality of reflective surfaces (208) disposed thereon with different reflective angles relative to a fixed position of laser beam irradiating from a laser beam source, and a dual rotation mechanism configured to facilitate laser beams to be reflected on the terrain with different reflective angles and thereby producing the series of circles of varying radius based on the actual topographical characteristic of the terrain.
Abstract:
An authentication system for a computer system wherein if an external device is found during the POST (200), said external device is checked for validity (224), and if valid the root of trust can be extended thereto.
Abstract:
The present invention relates to a system (100) for allocating bandwidth in a wireless multi-hop network. The system (100) provides fair bandwidth sharing among all nodes in the wireless multi-hop network. Generally, the system (100) comprises of a gateway (110) and a plurality of nodes (120). In each node (120) and gateway (110), there is provided a resource agent (130). The resource agent (130) is used for aggregating bandwidth demand from its child nodes and allocating bandwidth to its child nodes. The resource agent (130) includes a bandwidth request module (131), a bandwidth allocation module (132), a bandwidth table (133), a bandwidth controller module (134), and a communication interface module (135).