Patent application number | Description | Published |
20120222102 | AUTHENTICATION USING MOBILE DEVICES - Technologies are generally described for authentication systems. In an example, an authentication system can be built among devices by sharing an image that is virtually torn into pieces. Each participant in the authentication system receives a piece of the image. The participants are authenticated when the pieces are later joined to form the original image. | 08-30-2012 |
20130243340 | MOBILE AUTHENTICATION BY IMAGE INPAINTING - In some examples, a method of authenticating is described. The method may include sending first repair parameters representing one or more first repair operations applied to a first marked image to generate a first repaired image to a first entity. The method may also include receiving, from the first entity, a second repaired image. The method may also include authenticating the first entity when the second repaired image received from the first entity matches the first repaired image. | 09-19-2013 |
20130288796 | RANDOM DATA GENERATION - Technologies are described for generating random data. In some examples, a gaming device may include a game execution module, an extraction module, and a data generator. The game execution module may be configured to provide at least one player with a gaming service by continuously determining a plurality of parameters associated with the at least one player in a game operated by the at least one player. The extraction module may be configured to extract individual parameters from the plurality of determined parameters, the individual parameters having decorrelation with each other from a probability distribution perspective. The data generator may be configured to generate data items based on one or more of the extracted individual parameters, the data items being the extracted individual parameters or results of processing performed on the extracted individual parameters. | 10-31-2013 |
20140236901 | DATA MIGRATION MANAGEMENT - Technologies are generally described for managing data migration between databases. In some examples, a data migration management system may include a data migration management unit,configured to manage a migration of data stored in a first database to a second database, a game management unit configured to design a game for the migration of at least some of the data managed by the data migration management unit and to provide the designed game to a player, and a player management unit configured to manage participation of the player for the game designed by the game management unit. | 08-21-2014 |
20140359743 | AUTHENTICATION USING MOBILE DEVICES - Technologies are generally described for authentication systems. In an example, an authentication system can be built among devices by sharing an image that is virtually torn into pieces. Each participant in the authentication system receives a piece of the image. The participants are authenticated when the pieces are later joined to form the original image. | 12-04-2014 |
20140379797 | SCHEMES FOR PROVIDING WIRELESS NETWORK - Technologies are generally described for providing a wireless local area network. In some examples, a method performed under control of a first device may include connecting to an access point that is configured to provide a wireless local area network, transmitting, to a second device, a request of connecting to the first device, receiving, from the second device, a response of connecting to the first device, configuring an ad-hoc network group including the first device and the second device based, at least in part, on a network load of the first device and a network load of the second device, and providing a wireless local area network to the second device included in the ad-hoc network group. | 12-25-2014 |
20150026788 | AUTHENTICATION BY IMAGE MANIPULATION - In some examples, a method of authenticating is described. The method may include sending first repair parameters representing one or more first repair operations applied to a first marked image to generate a first repaired image to a first entity. The method may also include receiving, from the first entity, a second repaired image. The method may also include authenticating the first entity when the second repaired image received from the first entity matches the first repaired image. | 01-22-2015 |
20150131639 | SCHEMES FOR PROVIDING WIRELESS COMMUNICATION - Technologies are generally described for providing wireless communications. In some examples, a method performed under control of a cloud system may include receiving, from an end device, first information including at least one of a location of the end device, a location of an access point to which the end device accesses, a media access control (MAC) address of the end device and a MAC address of the access point; determining that the end device moves to around the location of the access point and returns to around the location of the end device based at least in part on the first information; and instructing the access point to provide a wireless local area network to the end device with suppressed channel hopping. | 05-14-2015 |