Abstract:
Techniques for decoding a multi-modal barcode are provided. The techniques include scanning a multi-modal barcode into a grayscale image, applying a threshold to quantize the grayscale image into a monochrome image, passing the monochrome image to 1D barcode recovery to reconstruct a primary barcode, applying a horizontally-oriented edge detector to the grayscale image to quantize grayscale into monochrome, passing the monochrome image to a 1D barcode recovery process to reconstruct a secondary barcode to decode the multi-modal barcode.
Abstract:
Techniques for creating an identity document are provided. The techniques include obtaining two or more identity-linked images, deriving one or more at least partially transparent regions from one of the two or more identity-linked images, combining the two or more identity-linked images to create a combined image, and embedding authentication data into the combined image, inside the one or more at least partially transparent regions, to create an identity document.
Abstract:
A method and apparatus is disclosed for preventing the unintended retention of secret data caused by preferred state/burn in secure electronic modules. Sequentially storing the data, and its inverse on alternating clock cycles, and by actively overwriting it to destroy it, prevents SRAM devices from developing a preferred state. By encrypting a relatively large amount of secret data with a master encryption key, and storing said master key in this non-preferred state storage, the electronic module conveniently extends this protection scheme to a large amount of data, without the overhead of investing or actively erasing the larger storage area.
Abstract:
Embodiments of the present invention provide a system, method, and computer program product for updating software on an embedded computer device. According to one aspect of the present invention, a concurrent embedded application update is performed in which selected state information for one or both of an embedded virtual machine and a plurality of applets on an embedded computer device is securely exported to a host computer device. After software updates have been installed, the selected state information can be restored on the embedded computer device from which it was exported and/or it can be migrated to a second embedded computer device.
Abstract:
An apparatus for reading a multi-modal barcode is provided. The apparatus includes a camera, an edge detector, wherein the edge detector comprises a filter to read a secondary image, a quantization component, and a barcode processor. Also provided is a multi-modal barcode including a single-dimensional grayscale structure, wherein the structure is stretched in a perpendicular direction to its single-directional axis.
Abstract:
An apparatus for reading a multi-modal barcode is provided. The apparatus includes a camera, an edge detector, wherein the edge detector comprises a filter to read a secondary image, a quantization component, and a barcode processor. Also provided is a multi-modal barcode including a single-dimensional grayscale structure, wherein the structure is stretched in a perpendicular direction to its single-directional axis.
Abstract:
Techniques for decoding a multi-modal barcode are provided. The techniques include scanning a multi-modal barcode into a grayscale image, applying a threshold to quantize the grayscale image into a monochrome image, passing the monochrome image to 1D barcode recovery to reconstruct a primary barcode, applying a horizontally-oriented edge detector to the grayscale image to quantize grayscale into monochrome, passing the monochrome image to a 1D barcode recovery process to reconstruct a secondary barcode to decode the multi-modal barcode.
Abstract:
Embodiments of the invention provide a method, system, and computer program product for managing a computer memory system including a channel controller and a memory area. In one embodiment, the method comprises the channel controller receiving a request including a header and a payload, and separating said memory area into a working memory area and an auxiliary memory area. A copy of the header is deposited in the working memory area; and a full copy of the request, including a copy of the header and a copy of the payload, is deposited in the auxiliary memory area. The copy of the request in the auxiliary memory area is used to perform hardware operations; and the copy of the header in the working memory area is used to perform software operations.
Abstract:
A method and apparatus is disclosed for preventing the unintended retention of secret data caused by preferred state/burn-in in secure electronic modules. Sequentially storing the data and its inverse on alternating clock cycles, and by actively overwriting it to destroy it, prevents SRAM devices from developing a preferred state. By encrypting a relatively large amount of secret data with a master encryption key, and storing said master key in this non-preferred state storage, the electronic module conveniently extends this protection scheme to a large amount of data, without the overhead of investing or actively erasing the larger storage area.
Abstract:
In a communications channel coupled to multiple duplicated subsystems, a method, interposer and program product are provided for verifying integrity of subsystem responses. Within the communications channel, a first checksum is calculated with receipt of a first response from a first subsystem responsive to a common request, and a second checksum is calculated for a second response of a second subsystem received responsive to the common request. The first checksum and the second checksum are compared, and if matching, only one of the first response and the second response is forwarded from the communications channel as the response to the common request, with the other of the first response and the second response being discarded by the communications channel.