Abstract:
A method, system and apparatus are described, the method, system, and apparatus, in one embodiment including assigning at a processor an initial driving score S(V) to a vehicle which is being driven, receiving a report at a communication system controlled by the processor, the report including a report of a reckless driving incident in a vicinity of a receiver disposed in the vehicle, incrementing S(V) by the processor upon receipt of the report of the reckless driving incident, decreasing S(V) by the processor for every unit of driving the vehicle is driven, broadcasting the value of S(V) to other vehicles by the communication system controlled by the processor. Related methods, systems and apparatuses are also described.
Abstract:
In one embodiment a method, apparatus and system for is described for receiving a first input including a first decryption key and a second input including an encrypted second decryption key at a cryptographic decryption apparatus, the encrypted second decryption key to be decrypted by the cryptographic apparatus according to the first decryption key, storing a value of a key ladder length in a first register by a cryptographic processor, and using the stored value as a loop index by the cryptographic processor for a number of iterations of the cryptographic decryption apparatus executed as a loop, wherein at one stage in the loop execution of the cryptographic decryption apparatus, the second input includes the key ladder length, wherein the loop operation of the cryptographic decryption apparatus operates for a number of iterations equal to an initial value of the loop index. Related methods, apparatuses and systems are also described.
Abstract:
In one embodiment, a system to provide trust during an audio call between a first and second party includes a communication interface to receive a voice certificate including a voice pattern, a first certificate ID and a first digital signature, an attribute certificate including an attribute, a second certificate ID and a second digital signature, and processing hardware to compare a voice sample of the second party to the voice pattern, verify the voice certificate, verify the attribute certificate, verify at least one attribute signing organization certificate, compare the first certificate ID to the second certificate ID, and provide an indication that the second party in the audio call has the attribute based on a positive result to the above processing.
Abstract:
In one embodiment, a system including a processor is operative to receive a content item including a watermark encoding a series of encrypted bits deriving from encrypting an information element multiple times, extract at least some encrypted bits from at least part of the watermark, decrypt a series of N bits using a first key yielding a first value, the series of N bits including Q bits of the encrypted bits and K, greater than, or equal to zero, guessed bits, re-encrypt the first value using a second key yielding a second value, and compare at least part of the second value to M bits of the encrypted bits to determine if at least part of the second value matches the M bits in order to provide a level of confidence that the first value is the information element which was encrypted and embedded as the watermark.
Abstract:
A secure wireless vehicle control system includes a power source installed in a vehicle and a plurality of electronic control units (ECUs) operative to control the operation of components of the vehicle, where each of the ECUs is connected to the power source via electrical wiring, configured with at least a communications unit for receiving security information via the electrical wiring, and also configured with a wireless transceiver operative to use the security information to secure wireless transmission. An ECU includes a wired connection to a vehicle's power source, a communications unit operative to at least receive security information via the wired connection, and a wireless transceiver operative to communicate with at least one other ECU, where the wireless transceiver is configured to use the security information to secure communications with the at least one other ECU. A method for securing wireless communications for an ECU includes receiving security information on a communications unit via a wired connection to a vehicle's power source, and using the security information to secure the wireless communications.