CA2300435A1 - System for secure telepathy, incryption, uncryption, or secure personal communications - Google Patents

System for secure telepathy, incryption, uncryption, or secure personal communications Download PDF

Info

Publication number
CA2300435A1
CA2300435A1 CA002300435A CA2300435A CA2300435A1 CA 2300435 A1 CA2300435 A1 CA 2300435A1 CA 002300435 A CA002300435 A CA 002300435A CA 2300435 A CA2300435 A CA 2300435A CA 2300435 A1 CA2300435 A1 CA 2300435A1
Authority
CA
Canada
Prior art keywords
user
computer
secondbrain
thought
encrypted
Prior art date
Legal status (The legal status is an assumption and is not a legal conclusion. Google has not performed a legal analysis and makes no representation as to the accuracy of the status listed.)
Abandoned
Application number
CA002300435A
Other languages
French (fr)
Inventor
Steve Mann
Current Assignee (The listed assignees may be inaccurate. Google has not performed a legal analysis and makes no representation or warranty as to the accuracy of the list.)
Individual
Original Assignee
Individual
Priority date (The priority date is an assumption and is not a legal conclusion. Google has not performed a legal analysis and makes no representation as to the accuracy of the date listed.)
Filing date
Publication date
Priority claimed from CA002264973A external-priority patent/CA2264973A1/en
Priority claimed from PCT/CA1999/000248 external-priority patent/WO1999049655A1/en
Priority claimed from PCT/CA1999/000249 external-priority patent/WO1999049656A1/en
Priority claimed from CA002267877A external-priority patent/CA2267877A1/en
Priority claimed from CA002275784A external-priority patent/CA2275784C/en
Priority claimed from CA002275798A external-priority patent/CA2275798C/en
Priority claimed from CA002280022A external-priority patent/CA2280022A1/en
Priority claimed from CA002280425A external-priority patent/CA2280425C/en
Application filed by Individual filed Critical Individual
Priority to CA002300435A priority Critical patent/CA2300435A1/en
Publication of CA2300435A1 publication Critical patent/CA2300435A1/en
Abandoned legal-status Critical Current

Links

Landscapes

  • Management, Administration, Business Operations System, And Electronic Commerce (AREA)

Abstract

A novel means and apparatus for a new kind of photography and videography is described. In particular, a wearable camera with a viewfinder suitable for long-term use is introduced. The system, in effect, absorbs and quantifies rays of light and processes this quantigraphic information on a small wearable computer system, then the processed information is re-constituted into light rays emerging to reconstruct the virtual image of objects at nearly the same position in space, or at a coordinate transformed position, as viewed by the wearer of the apparatus. The wearer of the apparatus becomes, after adaptation, an entity that seeks, without conscious thought.
or effort, an optimal point of vantage and camera orientation. Because of the wearer's ability to constantly see the world through the apparatus, which may also function as an image enhancement device, the apparatus behaves as a true extension of the wearer's mind and body, giving rise to a new genre of documentary video.

Description

IN t tlt t! ; I t'-t.~ ! ~ ~c "-.

FIELD OF THE INVENTION '"'"
' PFiOPRIE i t ny ~ ~mcy i u~~a..~
The present invention pertains generally to a secure c;omnzuni<;ations system that nxay be facilitated loy a computer (possibly installed on or within a user's body), and that a xa.y defend against attackers who ma,y include manufacaxwers of portions of the system. or that may defend against troj;~n lxorses or viruses plaxxted by the:
designers of portions of tlxe system.
BACKGROUND OF THE INVENTION
Panopticon computing A drawback of the nxainframe conxputer era was the lack of individual autonomy a,nd individual privacy afi'orded by large monolithic conuputer systems.
Although individuals having distinct user accounts xxxight be protected from being observed by one-another, there was no simple means whereby an individual could prevent his or her materials or computations from being spied upon by a system administrator or the like. As a result, the mainframe computer era provided an environment much like ~lerexxzy Benthanx's Panopticon (a prison, workplace, school, or the like, in which a, central ~;m~,rcl could watch over everyone but people were prevented from interacting Wlth One axxOthex').
In the nxainframe era, individual users were somewhat isolated from each other, either by deliberate obfuscation of standards, or often simply by way of the need for scrcalled "securit~~'' (e.g. creating a fear a.mc>ng users that other users nxiglxt observE:
their actions).
However. with the proliferation of tlxe Personal Computer (PC), this situat,iom fortunatcely inxproved in two ways:
1. users beca.xne masters of their own computational destixxy, in the sense that they could circumvent a central information technology department or service. and simply obtain their very own conxputer, and in this way. could have files tlua.t were not observable by any central authority;
2. a,t thfe same time, these users could share files among themselves, by way of the Internet.
Indeed, with the advent of the World Wide Web, users could have their cake and share it too. Not only could users hide files from any central authority but they could also share these files. With the widespread use of encryption, users could finally break out of the prison-like world in which their actions were observed by central guards who also discouraged comnnznic:ation among inmates.
This situation is roughly as life should be, in the sense that in real life, anv two people can walk out into the middle of a large corn field; or the like, and leave a, private conversation, without ayy officials eavesclrophing on th a conversation.
Similarly, ,just as people leave sent letters in sealed envelopes, so that Post Office eml~loye,es can't read them, now people can send email by encryption so that Telephone Company employees can't read them.
The telephone network is an example of a system that's always been, and continues to be. centralized and Panoptic:on-like. Telephones are terminals, and the Phone Company provides a,ll the intelligence.
In this regard; however, the situation ha,s a,ctua,lly bc-een getting worse, in the sense that answering machines are being replaced with centralized services like voice mail, where the end-user has no actual archive, that could not, in principle, be altered or falsified by the Phone Compa,yy.
Unfortlmately; some new concepts like Thin Clients, and Software Services are bringing us back to the had old days of mainframe computers when a private message sent from one person to another could easily be intercepted by a.n official.
Such concepts as Back Orifice, and central administration of Personal Computers, are moving us back to these dark ages of computing.
One hopeful development is GNU Linux, a, free operating system that no longer forces a distinction between 'user" and "developer" upon the end user. There's hope, here, with Richard Stallman's contribution of the concept of the GNU General Public License, for widespread computer literacy.
Implantables RFID (Radio Frequency IDentification) tags have been previously proposed for identifying articles. and for the electronic tagging of animals in feedlots.
These tech-nologies have not generally been used on lnnnans, because of the possibility for theft of lnzma,nistic property (e.g. the possibility of an advc,rsary to stall: or tra,cl: the whereabouts of the person with the implant.
Impla,mta,ble technologies are also often used im dogs and other pets for identifi-cation purposes. The principle of humanistic property protection (as described, for example, in Proc IEEE Vol. 86, No. 11, November 1998, "Humanistic Computing'' by Mann, also available online, http://wearcam.org/hi.htnl) does not generally ap-ply to animals such as dogs, cattle, etc., but is something particularly reserved for lmmans.
Identification cards often reduce humans to the level of elecaronic;allv tagged an-imals in feedlots. True privacy tec.hnc>logies allow people to protcca their own intel-lc:caual pro pert,y- (that which we intentionally ''give'' in the sense clcfined by Erving Go$ima,n in '' The Prcaentation of Self in Everyday Life'' ; Douhleday, 1959) and hu-manistic property (that which we unintentionally ''give off"; in the Goffman sense).
'I~ue privacy technologies may also allow individuals to maintain protection of humanistic (and intellectual) property and at the same time provide very high security for organizations.
High sccl city for organizations has traditionally resndted in centralized svstcms with disenfranchised participants, like electronically tagged animals in feedlots (See http://wearcam.org/chaum-interview.html). However, Chaum's ecash, for example, allows users to protect their own interests, and operate like byvers and sellers on a town market sciuare rather than electronically tagged animals in feedlots.
(Chaum's ecash is described in Scientific American, August 1992. ) Performance artist Eduardo Kac was the first human to have a, microchip im-planted .in his body. This has been interpreted as a warning about technologies of w~veilla,nce, control, and theft of humanistic property loy large organizations, c.g.
that a microchip implanted in the lnuna,n body could become a, form of identifi-cation or means for the individual to be stalked or tracked by organizations.
Sec http://wearcomp.org/ka.c.html SUMMARY OF THE INVENTION
An important goal of this invention is to provide a, system where individuals cam privately communicate, through the use of devices that may contain virlmes.
trojan horses. or the like.
Just as software may be "stolen" by so-called software ''pirates" , humanistic prop-erty may also be stolen by pigs. A pig is a person, process, agent, or system that steals lmmanistic: property.
Pigs may arise within a manufacturing organization, within government, or through collaboration between government and organizations. Pig's ma.y also arise in dividu-ally, either in c;on ,juncaion with corporate espionage. or the like, orws a result of a desire to 'bc; helpful'' in selling prodzzc;ts. For example, pigs will often spy on in divid-uals in order to determine behavioural habits, and for intelligence gathering directed at generating a marketing profile or selling and advertising strategy.
There are enough pigs that, given opportunities, they will get into systems.
Their main opportunity is the lack of vigilance; on the part of computer users.
Since users desire simplicty, manufacturers respond by providing systenm that a.re easy to me.
Part of this ease of use includes centralized control.
In the carne way that television is easier to use than books, there has been a disturbing trend toward not learn how computers work (e.g. how to "read"
source code). a.n<1 to instead adopt the mind- nmnmimg notion of sourcelese software all coming from one monopoly organization. Teaching children how to vzsc tools like PowerPoint (T1~T) a,nd FrontPage (T~~T) instead of GNU Linux is kind of like teaching them how to use a television instead of how te> read.
Accordingly. using the invention is not, easy. .just, a,s reaching is not easy form person who has not yet learned to read. However, like reading, which allows a person to obtain material that is free of advertising and much more varied than television, using the invention allows individuals to comnuznicate with other processes and with each other, in a, much richer and none meaningful wa,y than traditional email or telephony.
In order to make the invention more enjoyable for younger users, or users who might otherwise have a, short attention span, some embodiments present a user-interface that is a game, or is game-like.
A goal of the invention is to provide a true synergy between human user and the invention, in which the human and the invention are inextricably intertwined in a process that cannot easily be infiltrated loy pigs. The apparatus of the invention fzmctions much like a second brain, whether it is implanted within the brain (or bodv). or merf>ly worn on the. body, such Gns in a, waist pouch or pocket. The second brain may even he located elsewhere, and used from a remote control point.
The invention may be used to comnnmicate with a process in the compzzter, or with another person. The other person may be someone who is also using the invention.
In this case, a first user with a first second brain communicates to a second user with a second second brain. Because it is confusing to refer to a first second brain and a second second brain, the single word "secondbrain" will be used. Using this new terminology, it will be said that a first J

user wii:h a first sec;on dbrain will c:onlmmicate with a second user ha,villg a second secondbrain.
The secondbrain may be implanted inside the lnunall lolly, and the invention provides leans for the individual who has the implant to retain control of its flulc-tiona,lity, to prevent pigs from using it as a stalking or tracking means.
hl other embodiments of this invention a means of establishing a secure user -c:ontrc>lled network cx>nnection between the in lplantable computer and a larga network such as the Internet is also provided. T111s the invention can be used for secure telepathy.
The invention doesn't necessarily need to be inlplantable. It ca,n be a networked WearComp (see WearConlp definition as per Proc IEEE 86(11). Nov. 198, ~'Hu-manistic Computing" by Mall, also available online http:~/wearcam.org~lli.htln), a shall carryable device, or a combination of all of these.
It can also be a chain of systems including some of the above, ill turn networked to other computers, possibly through a gateway located in a vehicle a,nd, in turn.
to gateways located on the rooftops of various buildings througout the geographical reglOll Of the 11521'.
Some or all of the computers in this long chain of computers play be adversely affected lly pigs, without con lpromise to the user's ability to con111unicate private,ls--.
An important feature of the invention is that one of the computers along the chain can flulction as a, firewall to protect the user from pigs.
It is well-known that excessive trust can give rise to corruption, as, for example, when a government or corporation hakes a promise that it is implementing identifica-tion cards for the benefit of the recipients. but in fact uses these to stalk or track the whereabouts of the recipients. Thus another important feature of the invention is the controllability of the inlplantable computer, so that it is not merelv an identification tag like the numbers branded onto the forearm of Nazi prisoners; but, rather, it is al entity that is controlled by the person who's body it is inside.
This controllability relay be facilitated either by the WearConlp acting as all in-terface to the implantable computer, or by a metaphor generator running in any of the computers along the chain.
The proposed invention facilitates a new form of symbiosis between human and computer, and allows the human; ill some sense, to become a computer.
There is a simple hierarchy of collllection, a5 follows:

1. Tlle user of the invention uses his or her firstbrain to connnunicate with a secondbrain.
2. The sec:ondbrain may comprise all in lplantablc computer which establishes a Network connection to the nearby WearComp (thirdbrain). This link requires very little power due to the close proximity. For exa,lnple, in inlpla,ntable com-puter ill the hip or buttocks will be ill almost direct contact with a typical waist worn WearConlp. Alternatively. a chest implant will contaca a,N LTnder-WearComp as described ill IEEE Cohputer 86(11), Nov. 1998. An arm implant will be in close contact to an embodiment of the WearTel (T1~~I) iNVention, a wristwatch videoconferencin g system, as described in Canadian patent 2237939.
3. If the iNlpla,nt is ill the arm, the WearTel wl'istphone (which embodies some computation and connnunicatioNS capability) provides a gateway froh the: im-pla,llt to a waist worn WearCohp, car to an Under WearComp (Wea.rComp such as one built into an athletic; undershirt tank top, worn underneath ordinary clothing).
4. If the user of the invention has a vehicle, the vehicle hay form a, gateway between his/her WearCohp and ancother gateway located on the roof of a nearby building.
5. Gateways on the rooftops of a Nearby buildings typically serve to establish a connection to a large network such a.s the Internet.
In this way, the firstbrain is networked hierarchically, so that aNy level of the hierarchy, except for the last, does not need to have: sufficient power to rea,c;h the Network (c.g Internet) by itself.
The implant able computer ma,y derive its electrical source of lower from tile W'earCon lp, rather than needing to have batteries replaced in the implauta.ble c:om-puter.
Ideally, thoughts can be shared without the need for a previously expressed scheme. An example of a previously agreed upon scheme bight be that ogle per-son say a word that is all integer variable (e.g. starts with ogle of the six integer letters i,j,k,l, m, or n) to denote a one (or a "yes" ), and say a. word that, is a real varlab le 1;O dellOte a Zero Ol' a "Il0". Thus Olle 11Se7' C()171Cj .1.,5~C
''.R~1~~~ mP n~Pr~t tnmnr_ row a,t eight in the horning?" and the other user might reply either "yes"
(meaning ~'no''), or nm'' (meaning 'yes''). Au entire:. sfmtem;e could be used to make it harder to guess the pattern, e.g. "nice weatluer we're having'' world mean ''yes'';
whereas "the weather is nice today'' world mean ''no" . This system could be ~ used over an ordinary voice channel like a telephone.
This concept is a very simplified form of data hiding.
A drawback of a telephone is that others can hear the fact that comnnmica,tion is happening. A two-wyy pager would he better than a, telephone. because the use of tln:
two--way pager is less likely to disturb others. Thus a more discrete (unobtrusive) form of communications channel is preferred. A chording keyboard such as the HandyKey Twiddler (Tl~~I) would be even better, since it can be hidden in a. pocket, and other people can't very easily tell whether or mot a, mser is typing on it.
However the above scheme has drawbacks. For example, if a pig had overheard the conversation in which the two users had defined their security code, the commu-nication would be compromised.
Moreover; a pig working within the c;ornpayy that makes the two-way pagers, either the service providers or the manufacturer, could gain access to the c.omnnmi-cation. Even if the pig takes a, while to figure out the code; the pig will still know when tln° two mers a,re communicating.
r1 better comnnmications system takes the form of a game. For example. two people meeting in a public park. playing a game of chess, can connnunicate through the movement of the chess pieces. Chess is a. very involved game. It both requires and stimulates deep thought. Since it is at least moderately difficult to write a c;h ess program on a computer that can beat a lnunan user, we know that the human mind, when playing chess, is doing digital comimtations that a,re at least a,s c:omplex a.s a, moderately powerful computer. We also know that the computational requirement needed to generate and use secure connnunic:a,tion is far less than that required to break into a sEecure link.
Even games traditionally regarded as games of chance, like gambling casino black-jack, can involve or induce thoughts, like card counting, or other forms of mental state variables responsive to an input from a card dealer. Tln~s there are numerous indi-viduals already skilled in the art of mental arithmetic. Instead of .just counting.
an alternative arithmetic system is made isomorphic to. or made to provide similar functionality to; the nmltiplicatioyexponentia,tion arithmetic used in cryptographic computations.

Accordingly, in some embodiments of the invention, a metaphor generator is used to map an encryption compuation onto the space of a game, so that a. player can do the mental computations in a way that's natural or familiar. Other metaphors, such as those that induce a user to imagine a, large building with various rooms. a.zrd various objects in those rooms, can be used. These can appear as either ganze.s (like dungeo rzs and dragon s), or less ganzfe-.likxe metaphors.
A program s n zachine instructions cam be encrypted, so that they executes on a pig infested computer system, where the pigs can monitor the a xecution without being able to figure out what the program is really doing. Accordingly, in one embodiment of the invention. an encrypted process communicates with a lnzman user loy providing the user with an opportunity to play a game. The process can be set up remotely by another user, or cam simply be a way of attaining a secure Computer Human Interfa,c;[e (CHI).
In the gauze embodiment, a game space is presented, and a, user plays the game, either winning or losing, or quitting before finishing it. The game induces c;a,lculations, in the user's own mind, so that, for example, the user might become aware of the answer to a question, (the exchange of 1 bit of information between the encrypted program and the user). A pig observing the user's every move would; however, not know the answer to this question. The answer does not depend on whether the user wins or loses; or even whether the user even finishes the game.
In this way, a pig observing the user does not even know that the user is ccunnumi-cating with tire encrypted process. With a, networked comp zrter. the process could be responsive to more than one user. so that the users playing the game could actually be c:ommzmicating at a, much deeper level. In this wa,y, the users share a, telepathic thought space facilitated by the game.
While the game is one embodiment. other metaphors that are not games are also possible. Any metaphor, such as a, mental multiplication/exponentia,tion abacus c:onzprising imagined rooms in a large mansion can be generated by the encrypted process running on a possibly pig-infested computer.
BRIEF DESCRIPTION OF THE DRAWINGS
The invention will now be described in more detail, by wa,y of examples which in no way are meant to limit the scope of the invention, but, rather, these examples c~

will serve to illustrate the invention with reference to the acc:ompa,nying drawings, in which:
FIG. 1 is a diagram of the system for facilitation of incryption in a firstbrain.
FIG. 2 is a diagram of the hierarchy of the incrypter.
FIG. 3 illustrates how a wearcomp, for example; can clothe the wearer in a pro-tective shell that pigs cannot easily penetrate.
FIG. 4 illustrates the use of an encrypted shell that a wearcomp user can interact with by way of the wearcomp.
FIG. 5 shows a metaphor generator that facilitates incryption instead of encryp-tion, so that the interaction can move up the chain into the user's firstbrain, where it can protect against pigs that might have infiltrated the user's secondbra,in.
DETAILED DESCRIPTION OF THE PREFERRED EMBODIMENTS
While the invention shall now be described with reference to the preferred em-bodiments shown in the drawings, it should be understood that the intention is not to limit the invention only to the particular embodiments shown but rather to cover all alterations, modifications and equivalent arrangements possible within the scope of appended claims.
In all aspects of the present invention, references to "camera'' mean aim device or collection of devices capable of simultaneously determining a quantity of light arriving from a. plurality of directions and or at a plurality of locations, or determining some other attribute of light arriving from a plurality of directions and or at a plurality of locations.
Similarly references to "display" , "television" ; or the like, shall not be limited to just television monitors or traditional televisions used for the display of video from a, camera near or distant, but shall also include computer data display means, computer data xnonit,ors. other video display devices. still picture display devices;
ASCII text display devices, terminals, systems that <lirec tlv scan light onto tlic:
retina. of the eve to form the perception of am image, direca elecarical stimulation through a device implanted into the back of the brain (as might create the sensation of vision in a blind person), and the like.
References to ''processor" . or "computer" shall include sequential instruction, par-allel instrucaion, and special purpose architectures such as digital signal processing hardware. Field Programmable Gate Arrays (FPGAs), programmable logic devices, as well ,>zs analog signal processing devices.
References to ''pig'' shall inchide not just people who steal lnnnanist,ic or intel-lectual property, or intercept private c:omnnmications or private thou~;tlns.
but shall also include non-human processes such as tro,jan horses, viruses, or other agents that may originate from mac;hinc-ea, humans; c>r other imfiltraitors.
References to "tramc;eiver" shall include various combinations of radio transmit-ters amt receivers. connected to a computer by why of a Terminal ~ ode Controller (TNC), comprising, for example, a, modem and a High Level Datalinlc Controller (HDLCs), to establish a connection to the Internet, but shall not be limited to this form of communication. Accordingly, ''transceiver" may also include analog trans-mission and reception of video signals on different frequencies, or hvhrid systems that are partly analog and partly digital. The term "transceiver'' shall not be limited to electromagnetic radiation in the frequency bands normally associated with radio. and may therefore include infrared or other optical frequencies. Moreover. the signal neeel no be electromagnetic, and ''transceiver" ma,y include other forms of energy such as gravity waves, or other means of establishing a communication s channel.
When it is said that object ''A" is vl~orne" loy ohjeca "B", this shall include the possibilir,ies that A is attached to B, that A is part of B; that A is built into B. or that A is B.
FIG. 1 shows an embodiment of the invention for stimulation of the. brain to generate incryptional activity between a, lust, user 1 and a second user 2.
Incryptional acaivity is encryption that happens within the firstbrain of the user (e.g.
mental arithmetic. or the like).
The two users are communicating privately using the invention. The first user 1 thinks of a signal pair comprising a first private signal lla and a c;orresponsing first public signal llb. These thoughts all take' place within the first user's firstbrain, which is a first firstbrain 11. The first user 1 also has a first secondbra.in 12.
A second user 2 thinks of a second private signal 21a and a. corresponding second pi-iblic signal 21b, within his or her firstbrain, which is a, second firstbi~ain 21. The second user 2 also has a secondbrain, which is a second secondbrain 22 of the overall system.
The first secondbrain 12 and second sec:ondbra,in 22 are licked through a first conunonications system 120 and a, second communications system 22c.
l1 The first sec:ondbrain 12 has a controller llc for sending informa,tic signals to the first firstbrain 11, and an observer llo for accepting input from the first firstbrain 11.
Similiarly, the sec:on d secondbrain 22 has a controller 21c for sendixxg informatic signals to the second firstbrain 21, and a,n observer 21o for accepting input from the second firstbrain 21.
In operation of the invention, let us suppose, without loss of generality, that the first user wants to send a, private thought to the second user. The second public signal 21b is known to the first user l, as well as to ayy pigs intercepting the channels 12c and 22c, or infesting the secondbrain s 1'? or 22. The first user 1 obtains this public signal 27.b by wyv of observer 210, secomlbrain 22, channel 22c, controller llc, and secondl>rain 12.
The first user thinks of a, xnessazge and receives a thought nxeta,phor from second-brain 12. The thou ght metaphor is responsive t~> tlxe, public signal 21b. The thought metaphor may be a ga,xne with various pieces in a virtual reality world, in which case, the initial conditions of the game (for example; the starting point of the various pieces) is responsive to the public signal 21b. The game is played by firstbrain 11 receiving stimulus from controller llc and providing response to observer llo. This stimulates incryptional calculations (mental encryption calculations within the firstbrain 11 of the first user 1).
Response from firstbrain 11 conveyed by observer llo, secondbrain 12, c:omnm-nications channel 12c, secondbrain 22, an d finally controller 21c, reach firstbrain 21 as incrypted information that cannot be understood by pigs intercepting or infesting various paths along the way.
FIG. 2 shows a hierarchical strucaure of the invention, when two embodiments of the invention are used, one for each of two people 240 and 241. The brain is the machine upon which the process, known as the mind, runs. Brain 230 thus snhporta one or more procc sses rennin g in n rind 220. This distincaion is analogous to the distinction between a conxputer (like a brain) and a computer program (like the mind) .
It is possible for a program to be encx,ypted, so that the machine instructions may be observed by pigs infesting th a computer, and still be able to keep secrets.
Accordingly, since there have been designed various devices for remotely monitoring brain az,caivity, possibly without the knowledge of the person being monitored (see for example; U.S. Pat,. No. 3951134, APPARATUS AND METHOD FOR. R.El~TOTELY

MONITORING AND ALTERING BRAIN WAVES). it is possible that pigs c:oul<1 monitor the brain activity of any person without that person's knowledge.
However;
.just a,s lvhere can be an encrypted program running on a computer. there could be.
in<:rypted thoughts running in the brain. In other words, the mind is capable of sufficiently complex activity that a pig monitoring brainwaves would be unable to read a person's mind.
A message 200 may therefore be incrypted within a mental incryption process, denoted as incrypter 210. Incryption is encryption done in mental aritlunetic or the like; or similar secret codes generated through mental effort in the mind 220.
Incryption in mind 220 is supported by the machine that has the form of brain 230.
To establish a telepathic, link, there must be output from the brain, which is denoted as brain output 240. An observer 250 is responsive to brain acaivitv. The observer is preferably part. of a computer that is inextricably intertwined with the user.
Sm:h a, computer will be referred to as a secondl>raiu 260.
The observer 250 is the input to the secondbra,in 260. Preferably the observer is a zero surveillance input device, such as a brainwave monitor that is s~ifficientlv well shielded as to protect the wearer from outside brain monitoring loy radar or thee likE~. A secondbrain 260 implanted in the brain of the user 270 v~ill go along way toward making the observer 250 be a zero surveillance input.
Alternatively. the secondbrain may be a small portable computer, or a wearable computer, with a covert input device such as a Twiddles (TM) manufactured by HandyKey corporation. By hiding the Twiddles in a pocket, a user 270 can type without disclosing the text to others. The secondbrain 260 communicates with a second secondbra,in 261 by way of a communications channel. In the preferred em-bodiment, the communications channel is an infrared optical conmnmicator or a, radio connuunic;ator, although it may also interact over other energy forms.
In the situation in which there is a brainwave monitor, the computer need not be implanted. For example, the observer 250, in some embodiments, comprises a brain-wave monitor such as that sold by the trade name ProCornp (TM), manufactured b~,~
Thought Technologies Limited. a compayv located in Canada. For the measurement of brainwaves, electrodes may be placed our the surface of the scalp if an implant is not desired. These electrodes, connected to the ProComp (TM) are then processed on v waistworu c;ouputer (e.g. a, WearComp in a waist bag); and sent over a radio channel or tl-ie like to a second similar WearComp of a second user.

With brain electrodes, a shield 280 is preferable. The shield 280, in the preferred embodiment, comprises a hat made of conductive cloth, that forms a Faraday cage around the brain to reduce noise picked up by the electrodes and to also male it harder to remotely monitor brainwaves.
In the preferred embodiment an antenna, 290 is mounted on the outside of the ha,t.
The c ooductive fabric of the ha,t therefore also acts as a ground place for the antenna.
and also keeps radiation from the a,nteuua out of the brain where it miglxt interfere, with the brainwave monitor. or at the very least result in wasted energy heating up brain tissue.
The signal from antenna 290 is picked up by a similar antenna 291 of a second user 271. A similar shield 281 provides a ground plane for antenn a 291. This signal is presented to a, second secondbrain 261 which produces an output by way of controller 251. Controller 251 may be a lmainwave stinnxlator, that produces brain input 241, for brain 23:1. Min d 221 thus becomes aware of this brain input 241, so that an uncrypter 211 running in mind 221 provides a thought, namely message 201. An unc:rypter is a, decryption process running in the mind, e.g. a mental arithmetic process, or thought process that performs decryptional calculations.
Secondbrain '261 may also be implanted, or it may simply be a portable computer.
such as might be worn on the body of user 271. In this case, a satisfactory zero w~veillwu<ve ontlmt device coxxxprising an eyeglass based display n xay 1>e l sed for controller 251.
FIG. 3 shows a wearcomp used to clothe a user in a shield to keep conxnnmications from eavesdropping Loy pigs. A zero surveillance input device of WearComp 360 accepts input from user 370 and conveys this input to a. WearConxp Access SHell (WASH) 395 in base station 398. WASH 395 is an encrypted shell. By encrypted shell, what is meant is that wherever tlxe shell would normally prompt the mer for input, ly channel 302c, the prompting is sent encrypted and the respoxxse_ on channel 301c, is expected to be encrypted as well. Thus channels 301c and 302c may be intercepted by pigs, or there may be pins 399 investing base station 398.
without conxpromise to the channel.
FIG. 4 shows how the WearComp Access Shell (WASH) ca,n be used to facilitate secure access by a user accessing a computer over an unsecure or untrusted input, such as a terminal of a mainfr ame computer where pigs can easily intercept the channel. Let us suppose a user 370 wishes to remotely login to his home computer base station 398, and interact with a trusted WASH 395 running thereupon. If there were an ethernet drop (e.g. a live R.J45 ethernet cable) handy, he could easily plmg the ethernet drop into his WearComp 360 and use a secure shell (SSH) to login to his home computer (assuming he had SSHD the secure shell daemon, running on his home c:omputer).
However, one seldom finds live ethernet drops out in the real world, except in re-search labs and universities. What one would more likely find is a computer terminal 498, such as might be found in an Internet Cafe or public library. or a, computer ter-minal 498 connected to a remote mainframe computer, or a so-called t7tin client,, that has an ethernet connection that is itself inaccessible to the user 370. By inaccessible, what is meant is that channels 401c and 402c to and from the outside world are not directly made available to user 370. Instead, only channels 301c and 302c are made available to the user. These channels typically comprise a keyboard for channel 301c:
and a cathode ray screen for channel 302c.
In this case; the user can login usin;; whatever login procedure is set forth for computer terminal 498. It is assumed, at this point, that pigs 499 can monitor every keystroke coming in over channel 301c and every character going to the cathode ray screen over channel 302c.
This puts user 370 in an awkward predicament. for if he now wishes to remotely log into leis home computer base station 398, even if' using a secure shell (SSH). all of his keystrokes are monitored loy pigs 499. This mean that pigs 499 will now obtain his password to his home computer, and a,ll the data passing thereto and therefrom.
If he logs in as root, to, for example, access an unmounted hard drive on his home computer. the pigs will now have his root password. If computer 498 has secure shell (SSH) installed, it will allow user 3 7 0 to have a secure connection to computer base station 398. but only insofar as this will make channels 401c and. 402c secure.
Therefore. despite the fact that SSH myy l~c. installed on both computer 498 and bo,se station 3'.38, hilts infesting computer 498. c>r inte.rc<:pting channels 3()lc au<1 30'?r will still have complete access to user 370's plainte.Yt conununications.
Accordingly; with the present invention, user 370 does not login to station using SSH, but. instead. uses WearComp Access Shell 395. Whatever e:omes back from this shell displays as encrypted data on the cathode ray screen of computer 498.
Normally this would be unintelligible to user 370, but for the fact that he is wearing special eyeglasses that contain a camera function and display function. These glasses allow hire to alter his visual perception of reality. Therefore, what happens is the eyeglasses pick up the encrypted text on the screen of computer 498 and apply Optical Character Recognition (OCR) to these c;ha,racaers; and decrypt them on WearC'ou rp 360, the plaintext being viewed loy user 370 on the special eyeglasses drat are part of WearComp 360. In the preferred embodiment of the invention, the WASH 395 produces enlarged and highly distinct recognizal>le patterns using a,scii ant selit to the screen of comp oter 498.
Thus channel 302c, which is the output cha,nne,l of the computer 498 is secnu~e.
This means that others, including pigs, walking into the Internet cafe or public library would see only garbled and meaningless text on the computer screen. Pigs infiltrating computer 498 also have no hick understanding the output of the WASH 395.
To type comnra.nds into the keyboard of computer 498, the user 370 may think of a response, and use his zero surveillance input device to make this response appear on his wearcomp screen in encrypted form. He then reads this encrypted text and types it into the keyboard. Since it is encrypted, pigs watching hirer type, or monitorin g his keystrokes, will not be able to determine. what his text means.
Alternatively, user 370 may unplug the keyboard from computer 498 and plug in a special cable from his computer that emulates keyboard commands, such as a PS~2 keyboard emulation signal generator for chancel 302c. Then he maw uses his zero surveillance input device (brainwave reac:ler or HandyKey Twiddles roncea,led in pocket. or the like) to type directly into f-lre V~ASH 395 with zero clranc:e of any pigs being able to understand anything being typed.
In another embodiment of the invention, WearCornp 360 is not used. Instead.
user 370 practices the art of incryption. In this embodiment, the inventive concept is a metaphor generator running on base station 398. In the preferred embodiment.
a metaphor generator runs in an apache www server on base station 398. WASH 395 is an Internet based game running on the user 370's borne computer base station 398.
To communicate with his home computer he goes into any public library that has Web browsers, and visits his own borne www site, selecting' the WASH 395 which in this case is a game. To communicate, he plays the game, which contains a metahpor generator for incryption. Pigs looking over his shoulder, or infiltrating compu ter 498 think he's just playing a networked video game. Even if they know he's interacting with his home base station 398 in a, more meaningful wyy, they cannnot lmderstan<l a,yy of the messages because of the incryption and uncryption running in the brain of user 370.
FIG. 5 shows the metaphor generator 596 in actual use to protect against a pos-sibly pig-infested computer system. A user 570 interacts with the computer sys-tem through input output devices, such as am input bus, I-BUS, and an output laser EyeTap (TM) device, LASER. EYETAP. Thence devices are not directly ~cc°es-sible by mer programs running in user space, USER.SPACE. Instead, these, devices a,re rea.c:hed through kernel space, KERNELSPACE, for example, a s teletype device drivers, TTYs, a,s character devices. CHARACTER. DEVICES.
A secure userspace program 595 runs as an encrypted program so that pigs 599.
whether they be, in user space. USERSPACE, or kernel space, KER\'ELSPACE.
cannot understand the meaning of what the program 595 is doing. Program 595 contains a secret key 511x, and a public key 511b. The public. key 511b may also, in some enzl>odiments, be sign ed by a trusted third party 5701, possibly over a radio link, AX25.
The central processing unit 598 may also be infested by one or more pigs, either manufacturers, or others who have contributed to the design, preparation, or systems integration of central processing rout 598.
Despite the possibility of pigs existing throughout the system, user 570 can conz-nnmicate privately with program 595, which provides a metaphor generator 596.
The apparatus of this invention allows the wearer to experience the camera, over a long period of time. For example, after wearing the apparatus sixteen hours per day for several weeks, it begins to function as a true extension of the mind aznd body. In this way; photographic composition is much more optimal, because the act, of taking pictures or shooting video no longer requires conscious thought or effort.
Mloreover, the intentionality of the picture-taking p iocess is mot evident to others. be-cao.we picture- trzl:ing is not hreceedcxl b,y o. gestzwe such as holding a viewfinder object mp to the cye. The wearable viewfinder is an important element of the wearable cam-era invention allowing the wearer to experience everyday life through a screen, and therefore be always ready to capture anything that might happen, or even ayything that, might have happened previously by virtue of the retroactive record capa,hility of the invention. Moreover, additional information beyond just exposure a.nd shutter speed ma,y be displayed in the camera viewfinder. For example; the camera allows the wearer to augment, diminish, or otherwise alter his or her perception of visual reality. This mediated-reality experience may be shared. The wearer may allow oth-ers to alter his or her perception of rca,lity. In this way the invention is useful as a new communications medium, in the context of collaborative photography, collab-orative videography, and telei.~resence. '_Vloreover, the invention nzay perform other useful tasks such as ftmctioning as a personal safety device and crime deterrent bV
virtue of its ability to maintain a, video diary transmitted and recorded a,t nntltiple remote locations. As a, tool for photojournalists and reporters, th<;
invention has c:lcar advantages over other competing tec:hnolo gies.
From the foregoing description, it will thus be evident that the present invention provides a design for a wearable camera with a viewfinder. As various changes can be made in the above embodiments and operating methods without departing from the spirit or scope of the invention, it is intended that all matter contained in the above description or shown in the accompanying drawings should he interpreted as illustrative and not in a limiting sense.
Variations or modifications to the desigw a,nd construction of this invention;
within the scope of the invention, rnay occur to those skilled in the art upon review ing the disclosure herein. Such variations or modifications, if within the spirit of this invention, are intended to be encon zpassod within the scope of ayy c:lainzs to patent protection issuing upon this invention.

Claims (42)

1. A secure thought telepathy system comprising:
~ a first secondbrain for use by a first firstbrain;
~ a second secondbrain for use by a second firstbrain;
~ a communications link between said first secondbrain and said second secondbrain;
~ means for said second secondbrain to obtain a key from said second firstbrain;
~ means for said first secondbrain to give a key to said first firstbrain;
~ means for said first secondbrain to accept first thoughts from said first firstbrain;
~ means for said second secondbrain to convey second thoughts to said second firstbrain;
a key being transferred from said second secondbrain to said first secondbrain by way of said communications link, and said second thoughts being responsive to said first thoughts, also by way of said communications link.
2. A secure communicator comprising:
~ a first computer for use by a first user;
~ a second computer for use by a second user;
~ a communications link between said first computer and said second computer;
~ means for said second computer to obtain a key from said second user;
~ means for said first computer to give a key to said first user;
~ means for said first computer to accept input from said first user;
~ means for said second computer to convey output to said second user, a key being transferred from said second computer to said first computer by way of said communications link, said output being responsive to said input also by way of said communications link, and at least one of said first computer and said second computer being a portable computer having a convert observer for covert data entry and a covert controller for covert data consumption.
3. A secure thought sharing system comprising:
~ a secondbrain for use by a first user;
~ a secondbrain for use by a second user;
~ a key communications link for use between at least two secondbrains;
~ a thought communications link for use between at least two secondbrains;
~ means for said secondbrain for use by a first user to obtain a key from said secondbrain for use by a second user;
~ means for said secondbrain for use by a second user to give said key to said secondbrain for use by a first user;
~ means for said secondbrain for use by a first user to accept first thoughts from said first user;
~ means for said secondbrain for use by a second user to convey second thoughts to said second user;
said key for being transferred from said secondbrain for use by a second user to said secondbrain for use by a first user by way of said key communications link, said second thoughts responsive to said first thoughts by way of said thoughts communications link.
4. The secure thought telepathy system of Claim 1, where said first secondbrain is for implanting in a first body containing said first firstbrain.
5. The secure thought telepathy system of Claim 1, where at least one of said:
~ first secondbrain is for implanting in a body containing said first firstbrain;
~ second secondbrain is for implanting in a body containing said second firstbrain.
6. The secure thought telepathy system of Claim 1, where said thoughts are public thoughts, said public thoughts being private thoughts that have been encrypted by said key, said private thoughts being known only to said first firstbrain.
7. The secure thought telepathy system of Claim 6, where said private thought is a single binary bit of private information.
8. The secure thought telepathy system of Claim 6, where said private thought is an answer comprising one of the two possible answers "yes" and "no" to a question that can be answered in this fashion.
9. The secure thought telepathy system of Claim 6, where noise is added to said private thought prior to generation of said public thought.
10. A method of secure thought telepathy, for a person to privately convey a binary one bit thought to another person, said method including the steps of:
~ accepting a question from said another person, said question being answerable by a binary one bit answer;
~ thinking of a, binary one bit answer to said question;
~ applying a mental thought process to combine said answer with a public key conveyed from said another person;
~ conveying a result of said mental thought process to said another person.
A method of shared private thinking, said method comprising the steps of:
~ obtaining a key from a second individual;
~ applying some mental thought processes, within a first firstbrain, to obtain a new thought, from an old thought, said old thought being a private thought only known to said first firstbrain;
~ conveying said new thought to a first secondbrain, said first secondbrain passing said new thought to a second secondbrain, by way of a communications channel between said first secondbrain and said second secondbrain, said second secondbrain passing said new thought to a second firstbrain, said second firstbrain being the firstbrain of said second individual.
11. A game for at least two players, based on the method of shared private thinking of Claim 1, a player playing said game by following the steps of:
~ said first secondbrain presenting said first firstbrain with possible moves to be made with a depiction of a virtual world containing various pieces;
~ said first firstbrain being given an opportunity to select one of said pieces for a move;
~ said first secondbrain updating a state of said virtual world in reponse to a selection made by said first firstbrain.
12. The game of Claim 11, where an initial condition of said moves is responsive to said key from said second firstbrain.
13. The game of Claim 11, where said steps are executed repeatedly to produce cryptographic computations in response thereto.
14. A portable zero surveillance communicator for assisting a user in privately communicating with at least one other person or process, said zero surveillance communicator comprising:
~ at least one zero surveillance input device, ~ a processor responsive to said zero surveillance input device, ~ a communications channel for communicating with another zero surveillance communicator.
A method of zero surveillance communication comprising the steps of ~ attaching a zero surveillance communicator to a first user, ~ attaching a zero surveillance communicator to a second user, ~ providing an. essentially constant communications channel between said first user and said second user, ~ providing a training procedure for said first user and said second user, said training procedure including the communication of known test sequences.
15. The method of zero surveillance communication of Claim 14, said training procedure including the playing of a game, said game providing a metaphor for cryptographic computations.
16. A method of teaching the art of zero surveillance communication, said method including the method of zero surveillance communication of Claim 14, where said first user is an experienced user skilled in the art of zero surveillance communication, and said second user is a novice user, desiring to learn the art of zero surveillance communication.
17. An encrypted shell, for private communication between a user and a process or another person, said encrypted shell providing a prompt for authentication, and having means for accepting encrypted authentication, said encrypted shell further having means for accepting encrypted commands, and providing encrypted responses to said encrypted commands.
18. A secure thought computer-human interactor comprising a portable computer for use by a user to communicate, using the encrypted shell of Claim 17, with said process or said another person, said secure thought computer-human interactor including an encryptor for responding to said prompt for authentication, an encryptor for providing said encrypted commands, and a decryptor for decryption of said encrypted responses to said encrypted commands.
19. A method of private communication between a user and a process or another person, through an entrusted computer login, said method comprising the steps of:
~ logging into said entrusted computer login, input to said login not necessarily being encrypted or secure;
~ once logged into said login, then issuing a command to remotely log into a base station computer upon which there is running an instance of the encrypted shell of Claim 17;
~ at a login prompt of said remote base station, transferrring said input to said login from a possibly unencrypted input to an encrypted input, said encrypted input for said encrypted shell.
20. A private communicator for communication with a trusted base station, through an entrusted computer login, said private communicator having:
~ an input device;

~ a portable trusted personal computer system responsive to said input device, said portable trusted personal computer system for producing a login stream;
~ an interface for directing said login stream to logging into said untrusted computer login;
~ a switcher for switching said login stream between one of two states, said two states comprising:
- a possibly unencrypted mode of operation for being responsive to, and in response to, said untrusted computer login;
- an encrypted mode of operation for being responsive to, and in response to the encrypted shell of Claim 17.
21. A private communicator for communication with a trusted base station, through an untrusted computer login, said private communicator having:
~ a input device for a secondbrain;
~ a secondbrain responsive to said input device, said secondbrain for producing a login stream;
~ an interface for directing said login stream to logging into said untrusted computer login;
~ a switcher for switching said login stream between one of two states, said two states comprising:
- a possibly unencrypted mode of operation for being responsive to, and in response to, said untrusted computer login;
- an encrypted mode of operation for being responsive to, and in response to the encrypted shell of Claim 17.
22. The private communicator of Claim 21, further including a metaphor generator for stimulating incryptional activity in a firstbrain of a user of said secondbrain.
23. A base station for private communication with a trusted communicator, said base station including the encrypted shell of Claim 17.
24. The base station of Claim 23, further including a metaphor generator for stimulating incryptional activity in a firstbrain of a user logging into said base station.
25. An encrypted shell, for private communication between a user and a process or another person, said encrypted shell providing a prompt for authentication, and having means for accepting incrypted authentication, said encrypted shell further having means for accepting incrypted commands, and providing encrypted responses to said encrypted commands, with a metaphor generator of uncryption of said encrypted responses.
26. A WearComp for use in connecting to a remote WearComp Access Shell, said WearComp having at least one of the following features:
~ camera bearing headwear, and processor, said processor responsive to an output of said camera, said processor for providing a decrypted output responsive to encrypted data visually presented to said camera;
~ an encryptor and keyboard emulator, for passing encrypted text into a keyboard port.
27. A secure thought computer-human interactor comprising:
~ a computer, said computer possibly infected by one or more pigs;
~ an encrypted executable process for running on said computer;
~ a metaphor generator for running on said computer, said metaphor generator responsive to a public key for use in said computer, said metaphor generator providing an output for said user, and accepting an input from said user.
28. The secure thought computer-human interactor of Claim 27, where said metaphor generator runs in said encrypted executable process.
29. The secure thought computer-human interactor of Claim 27, where said public key is signed by a trusted third party.
30. The secure thought computer-human interactor of Claim 27, where said computer includes an interface for being worn or carried by said user.
31. The secure thought computer-human interactor of Claim 27, where said computer is for implanting in the body of said user.
32. A game based on the secure thought computer-human interactor of Claim 34, said user playing said game including the steps of:
~ said user being presented with possible moves to be made with a depiction of a virtual world containing various pieces;
~ said user being given an opportunity to select one of said pieces for a move;
~ updating a state of said virtual world in reponse to a selection made by said user.
33. The game of Claim 32, where said steps are executed repeatedly to produce cryptographic computations in response thereto.
34. A secure thought computer-human interactor comprising:
~ a computer, said computer possibly infected by one or more pigs;
~ an encrypted executable process for running on said computer;
~ a stimulus metaphor generator for running on said computer, said stimulus metaphor generator responsive to a stimulus signal for use in said computer, said stimulus metaphor generator for providing an output for said user;
~ a response metaphor acceptor, said response metaphor acceptor for accepting an input metaphor from said user, said encrypted executable process responsive to an output of said response metaphor generator.
35. The secure thought computer-human interactor of Claim 34, where said public stimulus signal is a public key.
36. A game based on the secure thought computer-human interactor of Claim 34, where said user playing said game includes the steps of:
~ said user being presented with possible moves to be made with a depiction of a virtual world containing various pieces;
~ said user being given an opportunity to select one of said pieces for a move;

~ updating a state of said virtual world in reponse to a selection made by said user.
37. The game of Claim 36, where said steps are executed repeatedly to produce cryptographic computations in response thereto.
38. A method of private communication between at least two persons, comprising the steps of:
~ a first player receiving a set of initial conditions for beginning said game;
~ said first player executing a first move, said first move responsive to a message said first player wishes to pass to a second player;
~ said second player executing a second move, said second move responsive to an encryption key in mind of said second player.
39. The game of Claim 38, where said first player receives said initial conditions from said second player.
40. The game of Claim 38, where said first player receives said initial conditions from a trusted third party, said trusted third party being known by said first player to be providing said initial conditions on behalf of said second player.
41. The game of Claim 38, where said initial conditions are initial placement of pieces for said game.
42. The game of Claim 38, where said initial conditions comprise a definition of rules of said game, said rules being set forth by said second player.
CA002300435A 1999-03-15 2000-02-28 System for secure telepathy, incryption, uncryption, or secure personal communications Abandoned CA2300435A1 (en)

Priority Applications (1)

Application Number Priority Date Filing Date Title
CA002300435A CA2300435A1 (en) 1999-03-15 2000-02-28 System for secure telepathy, incryption, uncryption, or secure personal communications

Applications Claiming Priority (17)

Application Number Priority Date Filing Date Title
CA002264973A CA2264973A1 (en) 1998-03-15 1999-03-15 Eye-tap for electronic newsgathering, documentary video, photojournalism, and personal safety
CA2,264,973 1999-03-15
PCT/CA1999/000248 WO1999049655A1 (en) 1998-03-25 1999-03-25 Eye-tap for electronic newsgathering, documentary video, photojournalism, and personal safety
PCT/CA1999/000249 WO1999049656A1 (en) 1998-03-25 1999-03-25 Wearable camera system with viewfinder means
WOCA99/00248 1999-03-25
WOCA99/00249 1999-03-25
CA002267877A CA2267877A1 (en) 1998-04-14 1999-04-01 Means and apparatus for collegial identification of persons such as officials asking for identification
CA2,267,877 1999-04-01
CA2,275,798 1999-06-29
CA002275784A CA2275784C (en) 1998-06-29 1999-06-29 Wristwatch-based videoconferencing system
CA002275798A CA2275798C (en) 1998-06-29 1999-06-29 Wristworn or handheld video production facility or videoconferencing system
CA2,275,784 1999-06-29
CA002280022A CA2280022A1 (en) 1999-07-28 1999-07-28 Contact lens for the display of information such as text, graphics, or pictures
CA2,280,022 1999-07-28
CA002280425A CA2280425C (en) 1998-10-13 1999-08-16 Aremac incorporating a focus liberator so that displayed information is in focus regardless of where the lens of an eye of a user is focused
CA2,280,425 1999-08-16
CA002300435A CA2300435A1 (en) 1999-03-15 2000-02-28 System for secure telepathy, incryption, uncryption, or secure personal communications

Publications (1)

Publication Number Publication Date
CA2300435A1 true CA2300435A1 (en) 2000-05-28

Family

ID=27575746

Family Applications (1)

Application Number Title Priority Date Filing Date
CA002300435A Abandoned CA2300435A1 (en) 1999-03-15 2000-02-28 System for secure telepathy, incryption, uncryption, or secure personal communications

Country Status (1)

Country Link
CA (1) CA2300435A1 (en)

Similar Documents

Publication Publication Date Title
US11757979B2 (en) Mobile interactive kiosk method
AU2015255652B2 (en) Systems and methods for using eye signals with secure mobile communications
Young et al. Malicious cryptography: Exposing cryptovirology
Mann Wearable computing as means for personal empowerment
CN117171788A (en) System and method for preventing monitoring and protecting privacy in virtual reality
US6677858B1 (en) Internet-based method of and system for monitoring space-time coordinate information and biophysiological state information collected from an animate object along a course through the space-time continuum
CN106817480A (en) The system for carrying out management and control to mobile device access right based on the time and using white list mode
Hartzog et al. The internet of heirlooms and disposable things
CA2414397A1 (en) Means and apparatus for collective stream-of-deconsciousness capture for producing attribution-free informatic content
Koelle et al. Are you hiding it? usage habits of lifelogging camera wearers
CN107873125A (en) Active/standby devices scramble is shown
Shukur et al. Privacy and Security Awareness for Sensitive/Non-sensitive Data based Wearable Devices
Allsopp Advanced Penetration Testing: Hacking the World's Most Secure Networks
Nair et al. Truth in motion: The unprecedented risks and opportunities of extended reality motion data
CN113713380A (en) Interface display method and device, electronic equipment and storage medium
CA2300435A1 (en) System for secure telepathy, incryption, uncryption, or secure personal communications
Westling Future of the Internet of things in mission critical applications
Price Postdigital Nature 2.0
CN205160576U (en) Big data remote monitering system towards children network behavior
Pearson Chaotic and unexplored: The complex relationship between security professionals, data breaches, and malicious actors
TW497040B (en) Globally time-synchronized systems, devices and methods
Gilliland Examining the generational impact on risk: Internet of things (IoT)
Blundell Surveillance: Technologies, techniques and ramifications
CN212260711U (en) Electronic bracelet and synchronization system thereof
Srinivasan et al. Factual Data Protection Procedure on IoT-Based Customized Medicament Innovations

Legal Events

Date Code Title Description
FZDE Discontinued