Patents - stay tuned to the technology

Inventors list

Assignees list

Classification tree browser

Top 100 Inventors

Top 100 Assignees


ELECTRIC SIGNAL MASKING

Subclass of:

380 - Cryptography

Patent class list (only not empty are listed)

Deeper subclasses:

Class / Patent application numberDescriptionNumber of patent applications / Date published
380252000ELECTRIC SIGNAL MASKING39
20080199009Signal Watermarking in the Presence of Encryption - A method is disclosed that enables the transmission of a digital message along with a corresponding information signal, such as audio or video. The supplemental information contained in digital messages can be used for a variety of purposes, such as enabling or enhancing packet authentication. In particular, a telecommunications device that is processing an information signal from its user, such as a speech signal, encrypts the information signal by performing a bitwise exclusive-or of an encryption key stream with the information signal stream. The device, such as a telecommunications endpoint, then intersperses the bits of the digital message throughout the encrypted signal in place of those bits overwritten, in a process referred to as “watermarking.” The endpoint then transmits the interspersed digital message bits as part of a composite signal that also comprises the encrypted information bits. No additional bits are appended to the packet to be transmitted, thereby addressing compatibility issues.08-21-2008
20080212776ENCRYPTION PROCESSING CIRCUIT AND ENCRYPTION PROCESSING METHOD - An encryption processing circuit includes: a decoder configured to convert a binary input data used for predetermined encryption computing into a first plurality of bit data of a constant hamming weight independently of a hamming weight of the input data; a wiring network configured to receive the first plurality of bit data converted by the decoder, the wiring network further configured, for the purpose of the predetermined encryption computing, to change a bit pattern of the received first plurality of bit data by replacing bit positions of the first plurality of bit data, and to generate a second plurality of bit data; and an encoder configured to convert the second plurality of bit data generated in the wiring network into a binary output data.09-04-2008
20090003602Electronic Information Embedding Method and Extracting Method, Electronic Information Burying Apparatus and Extracting Apparatus, and Programs Therefor - On embedding electronic watermark data in point group data obtained from a three-dimensional measurement, an x-y plane region defining the point group data is divided into a plurality of small regions so that a point group is produced with respect to each of small regions. The coordinate values of each point group are offset with making a barycenter of the point group be an origin point. A discrete Fourier transform is carried out in order to produce a Fourier coefficient sequence, which is modified into a watermarked Fourier coefficient sequence. The inverse discrete Fourier transform is carried out on the watermarked coefficient sequence in order to produce a watermarked complex number sequence. An optimum watermark embedding strength is calculated. On the basis of the embedding strength, the Fourier coefficient sequence is modified to produce a watermarked Fourier coefficient sequence which is inversely offset into the watermarked point group data.01-01-2009
20090034724MASKING OF DATA IN A CALCULATION - A method and a circuit for ciphering or deciphering data with a key by using at least one variable stored in a storage element and updated by the successive operations, the variable being masked by at least one first random mask applied before use of the key, then unmasked by at least one second mask applied after use of the key, at least one of the masks being dividable into several portions successively applied to the variable and which, when combined, represent the other mask.02-05-2009
20090041241NEAR FIELD COMMUNICATIONS SYSTEM HAVING ENHANCED SECURITY - A near field communication system can include a near field generator configured to generate a near field detectable information signal. The near field generator and supporting circuitry also produces incidental electromagnetic radiation. A masking signal transmitter is used with the near field generator and radiates a masking electromagnetic signal. The masking electromagnetic signal may substantially mask the incidental electromagnetic radiation.02-12-2009
20090116644SYSTEM AND METHOD FOR MASKING ARBITRARY BOOLEAN FUNCTIONS - A method and system for protecting an arbitrary Boolean function of arbitrary number of variables, N, including in a computing device, if N=1, protecting one or more definitions of the arbitrary Boolean function by applying a predetermined masking algorithm, if N>1, reiteratively defining the arbitrary Boolean function of number of variables, N, in terms of intermediate functions, G and H, of a fewer number of variables, N−M, where M1, defining the arbitrary Boolean function, F of the number of variables, N, in terms of two or more single variable functions, G and H, applying the predetermined masking algorithm for N=1 to the two or more intermediate functions, G and H, and combining the masked intermediate functions G and H according to a predetermined scheme to generate a masked arbitrary Boolean function for the number of variables, N. Other embodiments are described and claimed05-07-2009
20090141895METHOD AND APPARATUS FOR SECURE DISPLAY OF VISUAL CONTENT - Methods and apparatus for displaying visual content on a display such that the content is comprehensible only to an authorized user for a visual display system such as a computer, a television, a video player, a public display system (including but not limited to a movie theater), a mobile phone, an automated teller machine (ATM), voting booths, kiosks, security screening workstations, tactical displays and other systems where information is displayed for viewing.06-04-2009
20090220079CONCEALING DEVICE AND CONCEALING METHOD - A security processing apparatus performs security processing in a MAC layer in a mobile communication system. The apparatus includes a mask generation unit generating a mask by using a security sequence number and a processing unit computing a logical operation on the mask and security target data to generate encrypted data. The security sequence number comprises a hyper frame number and a system frame number. The apparatus performs the security processing by using a transport block (TB) as one unit. The transport block is used as data transmission unit from a MAC layer to a physical layer per the unit time (TTI). Since HFN and SFN are used as the security sequence number, the security sequence number can be used uniformly over all RLC modes, and the out-of-synchronization of HFN can be avoided.09-03-2009
20090257591METHOD AND SYSTEM FOR FACILITATING SEARCH, SELECTION, PREVIEW, PURCHASE EVALUATION, OFFERING FOR SALE, DISTRIBUTION, AND/OR SALE OF DIGITAL CONTENT AND ENHANCING THE SECURITY THEREOF - A method for controlling the release of an as-rendered configuration of a digital work, comprising the steps of presenting said digital work as a composite of a plurality of layers comprising at least a first layer and a second layer; providing a rendering protocol interface which is adapted for defining said as-rendered configuration of the digital work by specifying a first rendering status of said first layer and a second rendering status of said second layer; providing a rendering protocol facility adapted for storing and controlling the release of said first and second rendering status of said first and second layers respectively in accordance with said as-rendered configuration; restricting unauthorized access to the rendering protocol interface, thereby preventing unauthorized modification of said as-rendered configuration; and releasing said digital work with said as-rendered configuration. The method has application in selling books, movies, software, music and other information products. A method of selling a preview version of an information product along with an option of purchase of the original version is described.10-15-2009
20090304182System and method for providing information using audio watermarking - A system for providing information using a watermarking technique includes a signal generating means for inserting an information data into a sound source to generate an audio signal having the information data; a signal transmitting means for transmitting the audio signal to a user terminal; and an information extracting means for extracting the inserted information data from the audio signal, and the information extracting means is configured separately from the user terminal, and receives the audio signal from the user terminal, extracts the information data from the audio signal, transmits the extracted information data to the user terminal to provide the information data to the user. Therefore, the user can be provided with related information and corresponding contents through the sound source regardless of time, space, and online or offline. Further, the system provides information using audio watermarking with high robustness and reduced detection time.12-10-2009
20100150346DATA ENCRYPTION APPARATUS, DATA CONVERTING METHOD, DATA CONVERTING PROGRAM, RECORDING MEDIUM AND INTEGRATED CIRCUIT - A data encryption apparatus reduces a hardware gate scale over that of conventional technology which uses substitution tables, and realizes high scrambling performance. The data encryption apparatus includes a data converting unit that splits 256-bit input data into 32-bit data blocks A06-17-2010
20100166180CLOAKING OF RADIO SIGNALS - The present invention comprises a device that, based upon signals transmitted by devices within a wireless network, causes masking signals to be selectively transmitted. For example, the device may not cause masking signals to be transmitted if the signal does not include confidential data, for example it is an acknowledgement message. Additionally, the strength, coding rate and modulation format of the masking signals may be varied to provide increased data security.07-01-2010
20100239091METHOD FOR GENERATING MASKS IN A COMMUNICATING OBJECT AND CORRESPONDING COMMUNICATING OBJECT - The invention relates to a method for generating masks in a communicating object, the masks being intended to mask data to be stored in the communicating object. At least one master mask is stored in the communicating object. According to the invention, the method involves applying at least one diversifier to the master mask so as to generate a diversified mask; masking the datum to be stored in the communicating object by a reversible function using the diversified mask, the mask generating a masked datum; and storing the masked datum in the communicating object with the diversifier used to generate the diversified mask for obtaining the masked datum. The invention also relates to a communicating object including components for implementing such a method.09-23-2010
20110026709SYSTEM AND METHODS FOR PERMITTING OPEN ACCESS TO DATA OBJECTS AND FOR SECURING DATA WITHIN THE DATA OBJECTS - A system and methods for permitting open access to data objects and for securing data within the data objects is disclosed. According to one embodiment of the present invention, a method for securing a data object is disclosed. According to one embodiment of the present invention, a method for securing a data object is disclosed. The method includes the steps of (1) providing a data object comprising digital data and file format information; (2) embedding independent data into a data object; and (3) scrambling the data object to degrade the data object to a predetermined signal quality level. The steps of embedding and scrambling may be performed until a predetermined condition is met. The method may also include the steps of descrambling the data object to upgrade the data object to a predetermined signal quality level, and decoding the embedded independent data. The additional steps of descrambling and decoding may be performed until a predetermined condition is met. The predetermined condition may include, for example, reaching a desired signal quality of the data object.02-03-2011
20110064221DIFFERENTIAL PRIVACY PRESERVING RECOMMENDATION - User rating data may be received at a correlation engine through a network. The user rating data may include ratings generated by a plurality of users for a plurality of items. Correlation data may be generated from the received user rating data by the correlation engine. The correlation data may identify correlations between the items based on the user generated ratings. Noise may be generated by the correlation engine, and the generated noise may be added to the generated correlation data by the correlation engine to provide differential privacy protection to the user rating data.03-17-2011
20110085662HIGH UTILIZATION UNIVERSAL LOGIC ARRAY WITH VARIABLE CIRCUIT TOPOLOGY AND LOGISTIC MAP CIRCUIT TO REALIZE A VARIETY OF LOGIC GATES WITH CONSTANT POWER SIGNATURES - Disclosed is a novel circuit able to generate any logic combination possible as a function of the input logic signals. The circuit is described as a 2 input logistic map circuit but may be expanded to 3 or more inputs as required. Further disclosed is a universal logic array with variable circuit topology. A metallization layer and/or a via interconnection between cells in the array elements produce a circuit topology that implements a Boolean function and/or chaotic function and/or a logic function. The novel circuit provides a circuit topology for secure applications with no obvious physical correspondence between control signal values and input to output mapping. Further disclosed is a network which has a power signature independent of input signal state and output transition. This provides a very useful circuit to protect data from decryption from power signature analysis in secure applications.04-14-2011
20110135092METHOD AND DEVICE FOR PROCTECTING A READING DEVICE FOR CARD-SHAPED DATA CARRIERS FROM UNAUTHORIZED EVALUATION OR COPYING OF MAGNETICALLY ENCODED DATA OF AN INSERTED CARD-SHAPED DATA CARRIER - The invention relates to a method and devices for protecting a reading device (06-09-2011
20110261958TABLE SPLITTING FOR CRYPTOGRAPHIC PROCESSES - For a defined cryptographic process including an original substitution table, split masked substitution tables are provided to resist cryptographic attacks. The split masked substitution tables are defined with reference to a set of random value data words and a mask value. An entry in the split masked substitution tables is defined by selecting bits from the corresponding entry in the original masked substitution table, as masked by the corresponding one of the set of random value data words and by selecting bits from the corresponding one of the set of random value data words as masked by the mask value. The split masked substitution tables are usable in a modified cryptographic process based on the defined cryptographic process to permit a masked output to be generated. The split masked substitution tables are refreshed by each entry in the tables being refreshed upon access during execution of the modified cryptographic process.10-27-2011
20110311048CRYPTOGRAPHIC OPERATION APPARATUS, STORAGE APPARATUS, AND CRYPTOGRAPHIC OPERATION METHOD - According to one embodiment, the cryptographic operation apparatus performs a cryptographic operation using first and second key data and includes an initial mask value creating unit that creates the initial mask value using the second key data and data information. In addition, the cryptographic operation apparatus further includes a mask value updating unit that creates the mask value using the initial mask value and a mask value storing unit that stores and outputs the initial mask value and the created mask value. In addition, the encryption is performed using the input data, the first key data, and the output mask value.12-22-2011
20120039469SYSTEM AND METHOD FOR VARIABLE LENGTH ENCRYPTION - Systems and methods for performing a secure transaction provided. In one embodiment, the method includes: reading data on a command token, reading data on a token; encrypting the token data with a key; encrypting an authentication data with a clear text token data; and transmitting the encrypted authentication data with the encrypted token data to a remote device.02-16-2012
20120045053RANDOM SIGNAL GENERATOR USING QUANTUM NOISE - Systems and methods for generating a random signal, based on quantum noise in the phase of two or more input signals. The generated output random signal has random variation in its intensity based on the quantum noise in the phases of the input signals.02-23-2012
20120045054METHOD AND APPARATUS FOR DELIVERING WATERMARKED DIGITAL MEDIA CONTENT TO A USER UPON REQUEST - The present invention provides a means and an apparatus for watermarking a digital signal. A particular content which is to be made available by a content provider to potential content users is prepared by encoding the content into a plurality of encoded streams, each encoded stream being encoded according to a different bit-rate. Each encoded stream comprises a plurality of chunks and each chunk is retrievable by a requestor of content. Upon request of said content by a user, the plurality of chunks making up the content are selected from the plurality of the different encoded streams and a subset from that plurality of chunks is watermarked using a unique identifying parameter associated with the requestor.02-23-2012
20120155640Method and System Using Stealth Noise Modulation - A communications system includes a modulator having a first input to receive a synchronization key and to generate a synchronization signal having encoded therein the synchronization key to enable synchronization of a message signal, a second input to generate Gaussian noise generated by a pseudo-random number generator, and an output port to provide a modulated synchronization signal. The modulated synchronization signal and the message signal appear as random noise. In further embodiment, the communications system includes a demodulator having a first input to receive the synchronization signal, a second input to receive a comparison signal, and an output port to provide a synchronization output signal.06-21-2012
20120163596WATERMARKING SLICES STORED IN A DISPERSED STORAGE NETWORK - A method begins by a processing module receiving data for storage in a dispersed storage network (DSN) memory and obtaining watermarking information regarding a source of the data. The method continues with the processing module dispersed storage error encoding the data to produce a plurality of sets of encoded data slices and processing the plurality of sets of encoded data slices and marker slices to produce a plurality of sets of watermarked encoded data slices to have a pattern of encoded data slices and the marker slices in accordance with the watermarking information. The method continues with the processing module outputting the plurality of sets of watermarked encoded data slices to the DSN memory for storage therein.06-28-2012
20120170742METHOD TO DE-CORRELATE ELECTRIC SIGNALS EMITTED BY AN IC CARD - A method is to de-correlate electric signals emitted by an IC Card during computations as well as sensitive data involved in such computations. The method includes executing functions introducing respective electric signals which do not involve the sensitive data. Each of the functions is triggered by a timer having a value which is different at each step of executing the functions.07-05-2012
20120300928SYSTEM AND METHODS FOR PERMITTING OPEN ACCESS TO DATA OBJECTS AND FOR SECURING DATA WITHIN THE DATA OBJECTS - A system and methods for permitting open access to data objects and for securing data within the data objects is disclosed. According to one embodiment of the present invention, a method for securing a data object is disclosed. According to one embodiment of the present invention, a method for securing a data object is disclosed. The method includes the steps of (11-29-2012
20120314861SYSTEM AND METHOD OF DECOUPLING AND EXPOSING COMPUTING DEVICE ORIGINATED LOCATION INFORMATION - A system and method is provided to determine location information of a portable computing device and, in particular, to a secure and scalable system and method of decoupling and exposing handset originated location information to third parties. The system includes a location platform to determine location information of a remote user, and an encryption service configured to secure the location information of the remote user and send the secure location information to a content provider.12-13-2012
20130195270SYSTEM AND METHODS FOR PERMITTING OPEN ACCESS TO DATA OBJECTS AND FOR SECURING DATA WITHIN THE DATA OBJECTS - A system and methods for permitting open access to data objects and for securing data within the data objects is disclosed. According to one embodiment of the present invention, a method for securing a data object is disclosed. According to one embodiment of the present invention, a method for securing a data object is disclosed. The method includes the steps of (1) providing a data object comprising digital data and file format information; (2) embedding independent data into a data object; and (3) scrambling the data object to degrade the data object to a predetermined signal quality level. The steps of embedding and scrambling may be performed until a predetermined condition is met. The method may also include the steps of descrambling the data object to upgrade the data object to a predetermined signal quality level, and decoding the embedded independent data.08-01-2013
20130230169CIRCUMVENTION OF DYNAMIC, ROBUST, EMBEDDED-SIGNAL DETECTION - Described herein is a technology facilitating circumvention of dynamic and robust detection of one or more embedded-signals (e.g., watermark, copyright notice, encoded data, etc.) in one or more input carrier signals (e.g., multimedia stream, video stream, audio stream, data, radio, etc.).09-05-2013
20130230170PROTECTION AGAINST PASSIVE SNIFFING - The invention relates in particular to a method for securing the execution of a cryptographic algorithm (ALG) against passive sniffing, the method implementing masking (MSK) of data processed by the cryptographic algorithm. The masking (MSK) of said data includes a linear encoding step such as x′=x.L+c, in which x is the data to be masked, x′ is the corresponding masked data, c is a code word included in a linear code C, and L is a matrix made up of linearly independent vectors not included in the linear code C. The invention also relates to a device (SC) implementing such a method.09-05-2013
20140169559ELECTRONIC DEVICE AND AUDIO PROCESSING METHOD - An audio processing method for an electronic device includes a first audio file, a second audio file, and a first digital watermark to perform an audio processing method. The first digital watermark has ownership information regarding the first audio file. A first discrete audio array of the first audio file and a second discrete audio array of the second audio file are generated. A cipher code is generated using the first discrete audio array and the first digital watermark, and a second digital watermark is generated using the cipher code and the second discrete audio array. The first and second digital watermarks are compared, to confirm common ownership or otherwise of the second and first audio files.06-19-2014
20140270169Randomizing Current Injection Circuit to Obscure Gate Noise for Added Security - A circuit for obscuring gate switching noise includes a synchronous clock source; an asynchronous clock source; at least one current source; and a random number generating circuit for receiving clock inputs from the synchronous clock source and the asynchronous clock source, the random number generating circuit generating randomly changing asynchronous digital control signals for controlling the current source.09-18-2014
20150139420Serial transmission having a low level EMI - A method for transmitting data in series includes producing a scrambled signal by applying a scrambling using a pseudo-random sequence to an incoming serial signal conveying the data and producing an outgoing serial signal from the scrambled signal. After each sequence of N consecutive bits at the same state in the scrambled signal, a dummy bit of reverse state is inserted in the outgoing signal.05-21-2015
20160098245SYSTEMS AND METHODS FOR ENHANCING TELECOMMUNICATIONS SECURITY - The present invention provides a method and system for securing audio data. The method includes receiving audio input signals from an input port, receiving at least one noise signal from a noise source, generating encoded audio by a signal encoder encoding the audio input signals with the at least one noise signal, decoding the encoded audio by a signal decoder playing the encoded audio with an out-of-phase version of the at least one noise signal, and playing by an audio output component the decoded audio.04-07-2016
20160118036SYSTEMS AND METHODS FOR POSITIONING A USER OF A HANDS-FREE INTERCOMMUNICATION SYSTEM - A hands-free intercom may include a user-tracking sensor, a directional microphone, a directional sound emitter, a display device, and/or a communication interface. The user-tracking sensor may determine a location of a user so the directional microphone can measure vocal emissions by the user and the directional sound emitter can deliver audio to the user. The hands-free intercom may provide privacy to the user. The hands-free intercom may prevent an eavesdropper from hearing the user's vocal emissions, for example, by canceling the vocal emissions at the eavesdropper's ear. The directional sound emitter may deliver out-of-phase sound to cancel the vocal emissions. The hands-free intercom may also, or instead, cancel ambient noise at the user's ear. The hands-free intercom may measure or predict a filtration of the sound to be canceled and compensate for the filtration when canceling the sound.04-28-2016
20160142207Utilizing data reduction in steganographic and cryptographic systems - The present invention relates to methods for protecting a data signal using the following techniques: applying a data reduction technique to reduce the data signal into a reduced data signal; subtracting the reduced data signal from the data signal to produce a remainder signal; embedding a first watermark into the reduced data signal to produce a watermarked, reduced data signal; and adding the watermarked, reduced data signal to the remainder signal to produce an output signal. A second watermark may be embedded into the remainder signal before the final addition step. Further, cryptographic techniques may be used to encrypt the reduced data signals and to encrypt the remainder signals before the final addition step.05-19-2016
20160196439AUDIO ENCRYPTION SYSTEMS AND METHODS07-07-2016
380253000 By signal having discrete frequency component 2
20110019819SYSTEM AND METHOD OF MASKING ELECTROMAGNETIC INTERFERENCE (EMI) EMISSIONS OF A CIRCUIT - A system is provided for securing information residing on a circuit (e.g., processor). In particular, a system and method is provided for masking electromagnetic interference (EMI) emissions emitting from a circuit using a random noise generator in combination with a low noise amplifier and antenna. The random number generator matches a frequency of a circuit to be protected, and generates a random signal to be superimposed on data. The low noise amplifier receives the random signal from the random number generator, and an antenna receives the random signal from the low noise amplifier and transmits the random signal to mask the data of the circuit to be protected.01-27-2011
20110243327SYSTEM AND METHOD TO PREVENT AUDIO WATERMARK DETECTION - A system to prevent audio watermark detection includes content having a video portion and an audio portion, the audio portion having a watermark, an audio/video separator configured to separate the video portion and the audio portion, and a random number generator configured to generate a random number corresponding to a shifted frequency. The system also includes a frequency shift element configured to apply the shifted frequency to the audio portion to alter a spectrum of the watermark so as to prevent detection of the watermark by a device seeking to recover the watermark. The system also includes an audio resampler configured to resample the audio portion to restore the audio portion to an original length, and an audio/video combiner configured to combine the video portion and the audio portion.10-06-2011

Patent applications in class ELECTRIC SIGNAL MASKING

Patent applications in all subclasses ELECTRIC SIGNAL MASKING

Website © 2025 Advameg, Inc.