Patent application number | Description | Published |
20120087497 | CONTENT PROTECTION MESSAGE EXTRACTION - A system for extracting a video-watermark embedded in a video sequence, comprising a decryption and decoding engine to receive the video sequence in a video-codec-encoded format and encrypted, then decrypt the video sequence yielding a decrypted video sequence, then decode the decrypted video sequence yielding a decrypted decoded video sequence, and then output the decrypted decoded video sequence to a display device for rendering thereon, a measurement module to measure memory usage utilized by the engine decoding at least part of the video sequence yielding measurements of memory usage, a memory usage analyzer to analyze the measurements to determine an arrangement of video frames of at least one frame type in the video sequence, and an encoding feature analyzer to analyze the arrangement of the video frames to extract the video-watermark from the video sequence. Related apparatus and methods are also described. | 04-12-2012 |
20120128200 | ROBUST WATERMARK - A method and system for embedding a watermark in block encrypted content, including encoding a bit string, the bit string including n bits, denoted b | 05-24-2012 |
20130073855 | Collision Based Multivariate Signature Scheme - A cryptographic method and system is described, the method and system including providing a key pair that includes a private key and a corresponding public key, which defines a multivariate polynomial mapping, computing, using a processor and the private key, a digital signature for a message such that a first application of the mapping to the digital signature gives a first result, and a second application of the mapping to the message gives a second result that is equal to the first result, and conveying the message with the digital signature to a recipient for authentication using the public key. Related hardware, methods, and systems are also described. | 03-21-2013 |
20130129090 | Efficient Multivariate Signature Generation - A cryptographic method and apparatus, including providing a public key that defines a multivariate polynomial mapping Q( ) over a finite field F, extracting a first vector Y of verification values from a message, computing over the first vector, using a processor, a digital signature X including a second vector of signature values such that application of the mapping to the digital signature gives a third vector Q(X) of output values such that each output value is equal to a corresponding element of a vector sum Y+aY | 05-23-2013 |
20130177151 | Attack-Resistant Multivariate Signature Scheme - A cryptographic method, apparatus, and system, including selecting a first multivariate polynomial mapping, which includes first multivariate polynomial equations over first variables in a finite field, defining a second multivariate polynomial mapping, which includes at least some of the first multivariate polynomial equations and further includes second multivariate polynomial equations over the first variables together with second variables in the finite field, generating a public key based on the second multivariate polynomial mapping, and digitally signing a message, using a processor, with a digital signature that is verifiable using the public key and is generated by solving the first multivariate polynomial mapping to find respective first values of the first variables, solving a set of linear equations using the first values to find respective second values of the second variables, and applying a transform to the first and second values so as to generate a vector corresponding to the digital signature, wherein the second values are chosen so that a predefined group of elements of the vector will be zero. Related methods, apparatus, and systems are also described. | 07-11-2013 |
20130272521 | Key Generation Using Multiple Sets of Secret Shares - A cryptographic method, including generating, using a meta-secret, a first plurality of cryptographic keys, each cryptographic key associated with a respective key identifier, creating, using the meta-secret, a second plurality of sets of secret-shares, which are capable, by combining all the secrets-shares in any one of the sets together with the respective key identifier, of generating the associated cryptographic key, and performing cryptographic operations using the cryptographic keys. Related methods and apparatus are also included. | 10-17-2013 |
20130294601 | Efficient Multivariate Signature Generation - A cryptographic method and apparatus, including providing a public key that defines a multivariate polynomial mapping Q( ) over a finite field F, extracting a first vector Y of verification values from a message, computing over the first vector, using a processor, a digital signature X including a second vector of signature values such that application of the mapping to the digital signature gives a third vector Q(X) of output values such that each output value is equal to a corresponding element of a vector sum Y+aY | 11-07-2013 |
20130329886 | Public Key Cryptography with Reduced Computational Load - A cryptographic method, comprising receiving a public key belonging to a message recipient having a private key corresponding to the public key, selecting a numerical seed, having a first entropy, using the numerical seed and the public key, generating key recovery information having a second entropy, which is less than the first entropy, and generating a message key having a third entropy, which is less than the first entropy, encrypting a message using the message key, and transmitting the encrypted message and the key recovery information to the message recipient, whereby the recipient reconstructs the message key using the key recovery information and the private key and decrypts the encrypted message using the reconstructed message key. Related systems and methods are also included. | 12-12-2013 |
20140150046 | Distributing Audio Video Content - A method of distributing audio video content is described. The method includes: receiving configuration data for a plurality of devices; for each device in the plurality of devices, computing a set of bit rates based, at least in part, on the configuration data; encoding audio video content at each bit rate in each set of bit rates to produce a plurality of encoded audio video content streams; splitting each encoded audio video content stream in the plurality of encoded audio video content streams into chunks to produce a plurality of chunked encoded audio video content streams; for each device in the plurality of devices, creating a separate index file, each separate index file including references to at least one of the plurality of chunked encoded audio video content streams; publishing a locator for each separate index file in a catalogue; and transmitting the plurality of chunked encoded audio video content streams and each separate index file to a network. Related systems, apparatus, and methods are also described. | 05-29-2014 |
20150113125 | System and Method for Providing the Status of Safety Critical Systems to Untrusted Devices - A system and method is described for providing the status of safety critical systems to untrusted devices. | 04-23-2015 |
20150215123 | METHOD AND SYSTEM FOR HOMOMORPHICLY RANDOMIZING AN INPUT - A fully homomorphic method and system for randomizing an input, wherein all computations are over a commutative ring is described. Equivalent methods for performing the randomization using matrices and polynomials are detailed, as well as ways to mix the matrix and polynomial functions. Addition, multiplication, and division of the matrix and polynomial functions is further described. By performing computations of the functions modulo N over a ring Z | 07-30-2015 |
20150358160 | SECRETS RENEWABILITY - A method, system and apparatus for deriving a secondary secret from a root secret are described, the method, system and apparatus including reserving a memory buffer included in an integrated circuit, the memory buffer being large enough to contain all of the bits which will include the secondary secret, receiving a plurality of bits from a root secret, the root secret being stored in a secure memory of the integrated circuit, inputting the plurality of bits from the root secret and at least one control bit into a permutation network, and thereby producing a multiplicity of output bits, the at least one control bit including one of one bit of a value g, and one bit an output of a function which receives g as an input, receiving the multiplicity of output bits from the permutation network, inputting the multiplicity of output bits from the permutation network into a plurality of logic gates, thereby combining the multiplicity of output bits, wherein a fixed number of bits is output from the logic gates, inputting the fixed number of bits output by the logic gates into an error correcting code module, the fixed number of bits output by the logic gates including a first group of intermediate output bits and a second group of intermediate output bits and receiving output bits from the error correcting code module, the output bits of the error correcting code module including the first group of intermediate output bits as changed by the error correcting code module, where the change depends on the second group of intermediate output bits, filling non-filled registers in the reserved memory buffer with the first group of intermediate output bits as changed by the error correcting code module, and repeating the steps of “receiving a plurality of bits from a root secret” through “filling non-filled registers in the reserved memory buffer” until the entire secondary secret is derived, wherein the steps of “receiving a plurality of bits from a root secret” through “filling non-filled registers in the reserved memory buffer” are performed in a single clock cycle of the integrated circuit. Related apparatus, methods and systems are also described. | 12-10-2015 |
Patent application number | Description | Published |
20120019660 | VIDEO MOTION COMPENSATION AND STABILIZATION GIMBALED IMAGING SYSTEM - A system and method for compensating for image distortions formed by the motion of a computerized camera system mounted on a moving platform. The camera system includes a camera, wherein the camera acquires a plurality of image frames including images of the environment viewed from within the field of view of the camera. The distortion is formed in the acquired image frame, during and in between image acquisitions. During the image acquisition the camera may be maneuvered in space, typically, in the pan and tilt axis. The method includes the steps of providing camera maneuvering signals, providing sensors for detecting other motions of the camera, computing the pre acquisition aggregated motion vector of the camera, thereby determining the pre acquisition image distortion, and compensating for the determined pre acquisition image distortion by an equivalent vector, in a direction opposite to the direction of the pre acquisition aggregated motion vector. | 01-26-2012 |
20120026366 | CONTINUOUS ELECTRONIC ZOOM FOR AN IMAGING SYSTEM WITH MULTIPLE IMAGING DEVICES HAVING DIFFERENT FIXED FOV - A method for continuous electronic zoom in a computerized image acquisition system, the system having a wide image acquisition device and a tele image acquisition device having a tele image sensor array coupled with a tele lens having a narrow FOV, and a tele electronic zoom. The method includes providing a user of the image acquisition device with a zoom selecting control, thereby obtaining a requested zoom, selecting one of the image acquisition devices based on the requested zoom and acquiring an image frame, thereby obtaining an acquired image frame, and performing digitally zoom on the acquired image frame, thereby obtaining an acquired image frame with the requested zoom. The alignment between the wide image sensor array and the tele image sensor array is computed, to facilitate continuous electronic zoom with uninterrupted imaging, when switching back and forth between the wide image sensor array and the tele image sensor array. | 02-02-2012 |
20120113266 | METHODS OF MANUFACTURING A CAMERA SYSTEM HAVING MULTIPLE IMAGE SENSORS - A method of manufacturing an image sensor from two defective image sensor arrays having identical structural design, each having substantially the same field of view and aligned to view substantially the same scene. The method includes providing a first defective image sensor array, having known defective pixels, providing a second defective image sensor array, having known defective pixels, and fusing the first image sensor array and the second image sensor array into a single output image array. | 05-10-2012 |
Patent application number | Description | Published |
20080315993 | DUAL MODE RF POWER AMPLIFIER - Briefly, in accordance with one or more embodiments, a dual mode power amplifier is capable of operating in either linear mode such as class A operation, or a non-linear mode such as class F operation. The power amplifier may be utilized in an RFID interrogator. The power amplifier may be biased to operate in a linear mode if the power amplifier is operating in a higher linearity mode, or may be biased to operate in a non-linear mode if the power amplifier is operating in a higher efficiency, lower power mode. The power amplifier may comprise two or more amplifiers coupled in parallel. A current mirror circuit may turn on more amplifiers if the power amplifier is operating in a higher power mode, and may turn on fewer amplifiers if the power amplifier is operating a lower power mode. | 12-25-2008 |
20090002131 | CANCELING SELF-JAMMER SIGNALS IN AN RFID SYSTEM - A device and method for canceling one or more self-jammer signals in a radio-frequency identification system. | 01-01-2009 |
20120249301 | VOLTAGE TUNED VARIABLE JAMMER TOLERANCE - Briefly, in accordance with one or more embodiments, a mixer circuit at a receiver of an RFID interrogator may operate at a power supply voltage selected based at least in part on a power level of the self-jammer signal. The mixer circuit may operate at a higher power supply voltage if the expected power level of the self-jammer signal is higher, and may operate at a lower power supply voltage if the expected power level of the self-jammer signal is lower. | 10-04-2012 |
20140103734 | DYNAMIC WIRELESS POWER CONTROL - In accordance with various aspects of the disclosure, devices and methods are disclosed that include measuring, at a transmitter, a reflected power level corresponding to a specific transmit power level, and setting the transmit power to an operational level. At the transmitter, a new operational level of the transmit power may be determined, for example, by selecting at least one trial transmit power level, and based on reflected power levels measured corresponding to the operational level and the at least one trial level of the transmit power, either maintaining the operational level as the new operational level, or determining the at least one trial level as the new operational level. The operational transmit power level may correspond to a lowest reflected power level, or a highest rate of change of the reflected power level with respect to the transmit power level. | 04-17-2014 |
20140252866 | PRESENCE AND RANGE DETECTION OF WIRELESS POWER RECEIVING DEVICES AND METHOD THEREOF - In accordance with various aspects of the disclosure, a wireless power transmitting apparatus, system, and method are presented that include features of detecting a forward power level and a reflected power level of an electromagnetic field in which a wireless transmit device is capable of determining the presence of a wireless receive device based on the detected reflected power levels. | 09-11-2014 |
Patent application number | Description | Published |
20090191173 | Induction Of Neurogenesis And Stem Cell Therapy In Combination With Copolymer 1 - A method for inducing and enhancing neurogenesis and/or oligodendrogenesis from endogenous as well as from exogenously administered stem cells comprises administering to an individual in need thereof an agent selected from the group consisting of Copolymer 1, a Copolymer 1-related polypeptide, a Copolymer 1-related peptide, and activated T cells which have been activated by Copolymer 1, a Copolymer 1-related polypeptide, or a Copolymer 1-related peptide. The method is particularly useful for stem cell therapy in combination with the agent. | 07-30-2009 |
20100168085 | Dopamine and agonists and antagonists thereof for modulation of suppressive activity of CD4+CD25+ regulatory T cells - Compositions and methods for modulation of the suppressive activity of CD4+CD25+regulatory T cells (Treg) on CD4+CD25− effector T cells (Teff) are provided. An agent selected from: (i) dopamine; (ii) a dopamine precursor; (iii) a D1-R agonist; (iv) a D2-R antagonist; (v) a combination of (i) and (ii); or (vi) a combination of (i), (ii) or (iii) with (iv), down-regulates the suppressive activity of Treg and is useful for treatment of cancer. An agent selected from (i) a dopamine D2-R agonist, (ii) a dopamine D1-R antagonist, and (iii) a combination of (i) and (ii), up-regulates the suppressive activity of Treg and is useful for treatment of an autoimmune disease or for controlling graft rejection in tissue/organ transplantation. | 07-01-2010 |
20110117115 | Method and vaccine comprising copolymer 1 for treatment of psychiatric disorders - Copolymer 1, a Copolymer 1-related peptide, a Copolymer 1-related polypeptide, and T cells activated therewith are useful in methods and compositions for treatment of psychiatric disorders, diseases and conditions. | 05-19-2011 |
20110206706 | VACCINE AND METHOD FOR TREATMENT OF NEURODEGENERATIVE DISEASES - Methods and compositions are provided for treatment of neurodegenerative diseases in which there is accumulation of misfolded and/or aggregated proteins, excluding prion diseases. In particular, the invention relates to treatment of the neurodegenerative diseases Huntington's disease (HD), Alzheimer's disease (AD) or Parkinson's disease (PD), by administration of an agent selected from the group consisting of (i) Copolymer 1, (ii) a Copolymer 1-related peptide, (iii) a Copolymer 1-related polypeptide, and (iv) T cells activated with (i), (ii) or (iii). | 08-25-2011 |
20120135016 | INDUCTION OF NEUROGENESIS AND STEM CELL THERAPY IN COMBINATION WITH COPOLYMER 1 - A method for inducing and enhancing neurogenesis and/or oligodendrogenesis from endogenous as well as from exogenously administered stem cells comprises administering to an individual in need thereof an agent selected from the group consisting of Copolymer 1, a Copolymer 1-related polypeptide, a Copolymer 1-related peptide, and activated T cells which have been activated by Copolymer 1, a Copolymer 1-related polypeptide, or a Copolymer 1-related peptide. The method is particularly useful for stem cell therapy in combination with the agent. | 05-31-2012 |
20140134196 | VACCINE AND METHOD FOR TREATMENT OF NEURODEGENERATIVE DISEASES - Methods and compositions are provided for treatment of neurodegenerative diseases in which there is accumulation of misfolded and/or aggregated proteins, excluding prion diseases. In particular, the invention relates to treatment of the neurodegenerative diseases Huntington's disease (HD), Alzheimer's disease (AD) or Parkinson's disease (PD), by administration of an agent selected from the group consisting of (i) Copolymer 1, (ii) a Copolymer 1-related peptide, (iii) a Copolymer 1-related polypeptide, and (iv) T cells activated with (i), (ii) or (iii). | 05-15-2014 |