Patent application number | Description | Published |
20100067687 | METHOD AND APPARATUS FOR MAINTAINING DATA INTEGRITY FOR BLOCK-ENCRYPTION ALGORITHMS - A method is disclosed for modifying an iterated block cipher by controlling the operations and transformations that cause diffusion. In one embodiment which is applicable to any iterated block cipher ( | 03-18-2010 |
20100135226 | METHOD AND APPARATUS FOR DYNAMIC SPECTRUM ACCESS - Methods and apparatus are provided for the efficient use of cognitive radios in the performance of dynamic spectrum access. This includes spectrum sensing algorithms, adaptive optimized sensing of parameters based on changing radio environments, and identifying vacant channels. Protocols for switching communication links to different channels, and synchronizing communicating nodes in order to maintain reliable connectively while maximizing spectrum usage are also provided. | 06-03-2010 |
20100325413 | DATA HIDING BASED MESSAGES AND ADVERTISEMENTS - A steganographic message/advertisement embedding method is presented that can be used for contextual and targeted advertising supporting unobtrusive and on-demand message/advertisement delivery. The present invention presents over two client devices, the method includes receiving, on a first client device, a primary multimedia presentation with a plurality of steganographic codes embedded therein; whereby the steganographic code is not perceivable during a rendering of the multimedia presentation and the steganographic code is associated with at least one secondary multimedia presentation. Next; the primary multimedia presentation is rendered on the first client device. The first client device receives a user selection to select at least one of the steganographic codes. In response to the user selection, a secondary multimedia presentation is presented to the user in response to receiving the user selection, wherein the second multimedia presentation is presented over a second client device which is distinct from the first client device. | 12-23-2010 |
20120254333 | AUTOMATED DETECTION OF DECEPTION IN SHORT AND MULTILINGUAL ELECTRONIC MESSAGES - A method and apparatus for automatically identifying harmful electronic messages, such as those presented in emails, on Craigslist or on Twitter, Facebook and other social media websites, features methodology for discriminating unwanted garbage communications (spam) and unwanted deceptive messages (scam) from wanted, truthful communications based upon patterns discernable from samples of each type of electronic communication. Methods are proposed that enable discrimination of wanted from unwanted communications in short electronic messages, such as on Twitter and for multilingual application. | 10-04-2012 |
20130046531 | PSYCHO-LINGUISTIC STATISTICAL DECEPTION DETECTION FROM TEXT CONTENT - An apparatus and method for determining whether a text is deceptive may comprise analyzing a body of textual content known to be one of text containing true content and text containing deceptive content; identifying psycho-linguistic cues that are indicative of a text being deceptive; statistically analyzing, via a computing device, a given text based upon the psycho-linguistic cues to determine if the text is deceptive. The apparatus and method may further comprise weighting the psycho-linguistic cues and statistically analyzing based on the weighted psycho-linguistic cues. The statistically analyzing step may be performed using one of a cue matching analysis, a weighted cue matching analysis, a Markov chain analysis, and a sequential probability ratio testing binary hypothesis analysis. The psycho-linguistic cues may be separated into categories, including increasing trend cues and decreasing trend cues and analyzed according to presence in a category from within the categories. | 02-21-2013 |
20130138428 | SYSTEMS AND METHODS FOR AUTOMATICALLY DETECTING DECEPTION IN HUMAN COMMUNICATIONS EXPRESSED IN DIGITAL FORM - An apparatus and method for determining whether text is deceptive has a computer programmed with software that automatically analyzes text in digital form by at least one of statistical analysis of psycho-linguistic cues, IP geo-location, gender analysis, authorship analysis, and analysis to detect coded/camouflaged messages. The computer has truth data against which the text message can be compared and a graphical user interface. The computer may be connectable to the Internet and may obtain the text automatically. Speech-to-text software may be used to convert verbal messages to text for analysis. The system may be made available on a webpage, web service, on a computer or by a wireless device. The text may be emails, website content, tweets. In one embodiment, the system detects coded messages (FIG. | 05-30-2013 |
20140192656 | Method And Apparatus For Dynamic Spectrum Access - Methods and apparatus are provided for the efficient use of cognitive radios in the performance of dynamic spectrum access. This includes spectrum sensing algorithms, adaptive optimized sensing of parameters based on changing radio environments, and identifying vacant channels. Protocols for switching communication links to different channels, and synchronizing communicating nodes in order to maintain reliable connectively while maximizing spectrum usage are also provided. | 07-10-2014 |
20150254566 | AUTOMATED DETECTION OF DECEPTION IN SHORT AND MULTILINGUAL ELECTRONIC MESSAGES - A method and apparatus for automatically identifying harmful electronic messages, such as those presented in emails, on Craigslist or on Twitter, Facebook and other social media websites, features methodology for discriminating unwanted garbage communications (spam) and unwanted deceptive messages (scam) from wanted, truthful communications based upon patterns discernable from samples of each type of electronic communication. Methods are proposed that enable discrimination of wanted from unwanted communications in short electronic messages, such as on Twitter and for multilingual application. | 09-10-2015 |