Abstract:
An apparatus stores a one-time pad key. Responsive to receiving local input from a user requesting a cryptographic key, via input hardware of the apparatus, the apparatus generates the requested cryptographic key from an unused portion of the one-time pad key. The apparatus provides the generated cryptographic key to a mobile device of the user, via output hardware of the apparatus.
Abstract:
A security-enhanced document includes: a substrate; at least one lower portion imaging with vector graphics imaged display indicia being directly or indirectly digitally imaged on the substrate; at least one area of vector graphics secure variable indicia, the secure variable indicia being directly or indirectly digitally imaged on the substrate; at least one release coat applied over at least the secure variable indicia; at least one scratch-off coating applied over the release coat to maintain the secure variable indicia unreadable until removal of the scratch-off coating; and at least one overprint upper portion imaged over at least the scratch-off coating.
Abstract:
Methods for a server include defining a starting element and an element step size. A pad mapping is applied to a data Random Cipher Pad (RCP) to obtain a Key RCP using each element of the Data RCP once in a predetermined non-sequential order. The starting element and the element step size are combined with the Data RCP. The Data RCP is encrypted using the Key RCP to produce a subsequent Data RCP. The subsequent Data RCP is transmitted to another computer. Methods for clients include applying a pad mapping to a Data RCP to obtain a Key RCP using each element of the Data RCP once in a predetermined non-sequential order to develop the Key RCP. The Key RCP is encrypted using the Data RCP to produce a subsequent Key RCP. A data structure is encrypted using the Data RCP to produce an encrypted data structure.
Abstract:
For securing content accessed from storage device, the storage device is associated with a licensee identifier. The licensee identifier is provided as input to an algorithm that generates, based on the identifier, a determinate set of instructions for a computer, for example, source code in a coding language, compiled binary code, or pseudo code that is capable of being translated into source code. The code, once compiled to machine-usable form, can be executed by a processor to perform a permutation operation that is unique to the licensee identifier. The output of the permutation operation can be used for protecting data provided by the storage device.
Abstract:
In some aspects, the instant disclosure relates to the multiplexed encryption of information on nucleic acid molecules. In some aspects, the instant disclosure relates to a method of secure communication of information disseminated across at least one nucleic acid molecule, the method comprising (a) obtaining a modified keyboard comprising a personalized platform for translating text into a nucleic acid sequence; (b) translating a quantum of information into a nucleic acid message sequence using the modified keyboard of (a); and, (c) obtaining an at least one nucleic acid molecule, each molecule comprising: (i) the complete or a portion of the nucleic acid message sequence, and (ii) at least one contiguous stretch of randomized variable nucleic acid sequence flanking and/or inserted into the message sequence, thereby producing a nucleic acid molecule or a set of nucleic acid molecules containing the entire quantum of information.
Abstract:
Methods and apparatus for the scrambling of control symbols. In one embodiment, the control symbols are associated with an HDMI interface, and the methods and apparatus are configured to scramble the symbols to as to mitigate the effects of electromagnetic interference (EMI) created by the transmission of otherwise unscrambled sequences of symbols which may contain significant "clock pattern" or other undesirable artifact.
Abstract:
Mit der vorliegenden Erfindung wird eine Originalkennung (OK) bereitgestellt, die Produktfälschungen weitgehend verhindert, wobei die Originalkennung (OK) in ihrer Herstellung sehr kostengünstig ist. Die Originalkennung (OK) eignet sich nicht nur zur Verwendung als Produktkennzeichnung, sondern auch zum Autorisierungsnachweis, beispielsweise bei der Sicherung von räumlichen oder elektronischen Zugängen, wie Türen (1), Computerprogrammen und dgl.