13 research outputs found

    Verifying authenticity of digital images using digital signatures

    Get PDF
    This disclosure describes techniques to verify the authenticity of digital images using digital signatures. A secure element on a client device generates a public-private key pair and the public key is uploaded to a server. When a new image is captured by the client device, the device hashes the image and signs the hashed result using the private key to form a digital signature. Both the original image and digital signature are uploaded to the server. The server hashes the original image and compares it to the digital signature that has been decrypted using the appropriate stored public key. A match indicates a verified image and the server provides an indication of the verified status of the image to a requesting device along with the image. The described techniques thus enable images to be authenticated as to source and content

    Vehicle To Android Communication Mode

    Get PDF
    System and method for vehicle-to-Android (V2A) communication mode is disclosed. The system includes an Android smartphone with the real time operating system (RTOS) responsible specifically for V2A communication. The RTOS-enabled device is connected to the vehicle’s OBD-II port using a special cable, providing both vehicle data and power. The device reads data from the vehicle’s CAN-bus and from neighboring V2X messages received by the device’s WiFi module. The inference obtained is then securely broadcast to neighboring V2X systems. The information is sent to Android where it may be logged, analyzed, and displayed to the driver with insights about his/her driving patterns, fuel-economy, vehicle diagnostics, etc. The system may also notify other V2X systems in case of brake failure, etc. The system may be a critical component necessary for the widespread adoption of both semi-autonomous and autonomous vehicles and enables “smart” autonomous communication capabilities in traditional vehicles at minimal cost

    IoT Device for Vehicle Analytics and Smart Actions

    Get PDF
    It can be desirable to monitor and/or collect a historical record of vehicle health and/or usage. For instance, the data can be used for fleet management, tax records, improving mapping systems, or other important uses. An IoT-connected device is disclosed herein that can connect to an analytic port in a vehicle, such as an OBD-II port, and provide smart capabilities for the vehicle

    Method for Real-Time Voice Communication

    Get PDF
    Traditionally, voice communication is accomplished using a telephone system. The process of placing a call using a telephone system can be inconvenient for a user. With the advent of the Internet of Things (IoT), it is possible to provide a system utilizing the IoT to provide a better method for voice communication

    Imsi-Catcher Detection For Mobile Operating Systems

    Get PDF
    Systems and methods for detecting and notifying a mobile device user of an IMSI-catcher are disclosed. The system includes a mobile device installed with an application that collects signal data and wirelessly transmits the data to a server. The application may be part of a remote attestation service and communicates directly with radio interface layer (RIL) to collect telephony network and diagnostic information data from the device’s baseband. The collected data is sent to the server for remote attestation. The method includes detecting anomalies in the signal data from crowd-sourced heuristics and notifying the device user discreetly of the presence of an IMSI-catcher. The system and method provide identification of IMSI catchers with high reliability since the detection is done using crowd-sourced data from many devices and on the server-side, it’s more difficult for an attacker to conceal being identified and to counter the detection

    Defending against attacks on biometrics-based authentication

    Get PDF
    Many devices include biometrics-based user authentication in addition to secret-based authentication. While secret-based authentication involves a precise match with the known secret, biometrics-based authentication involves fuzzy matching that verifies that the input is similar to known biometrics within an acceptable threshold level of difference. As a result, biometrics-based authentication techniques are susceptible to attacks in which a malicious actor attempts to authenticate as the user via biometrics data that is crafted carefully to be similar to the stored biometrics within the threshold. The techniques of this disclosure guard against such attacks by use of a generative adversarial network (GAN) where random perturbation is added to the received biometrics input for a dynamically determined number of test iterations. The matching threshold value and the number of test iterations can be dynamically determined. If the authentication test during each of the iterations is passed by the perturbed biometrics input, the user providing the biometrics input is authenticated. Otherwise, the device falls back to secret-based authentication

    Determining Priority Value of Processes Based on Usage History

    Get PDF
    Generally, the present disclosure is directed to determining optimal priority values for one or more processes in a computing system. In particular, in some implementations, the systems and methods of the present disclosure can include or otherwise leverage one or more machine-learned models to predict an optimal priority value for a process based on system data and/or process data

    Reinforcement Learning for Fuzzing Testing Techniques

    Get PDF
    Generally, the present disclosure is directed to using machine learning to manage a trade-off between exploration and exploitation in a fuzzer system. In particular, in some implementations, the systems and methods of the present disclosure can include or otherwise leverage one or more machine-learned models to predict inputs that will cause a system being tested to malfunction or crash based on input data provided to the system and output from the system

    Health Analyzing Smart Mirror

    Get PDF
    It can be desirable to monitor an individual’s health over time. For instance, an individual may wish to keep track of his or her weight, percent body fat, caloric intake, heart rate, water percentage, sleep effectiveness, and many other health metrics. A “smart mirror” is disclosed herein that can assist an individual in monitoring these and other health metrics

    Enhancing Privacy of Smart Speakers Using Image Recognition and Motion Sensors

    Get PDF
    Smart speakers provide a convenient, often hands-free way for a user to interface with smart technology. For instance, if a user receives an email, text message, or other communication, the communication can be played aloud via the smart speaker. However, it may not be desirable for a communication containing personal or otherwise sensitive information to be read aloud. As such, systems and methods are needed that can provide enhanced privacy of smart speakers while maintaining expected functionality of smart speakers. Furthermore, authenticating a user based on audio alone can be challenging and may be less secure than other forms of authentication
    corecore