Patent classifications
H04L29/00
Secure method, system, and computer program product for exchange of data
A method, system and computer program product for lightweight implementation of strong encryption with zero knowledge that operates in web browser without local software installation.
Generating unique cryptographic keys from a pool of random elements
A system and method for encryption key generation by receiving a plaintext message having a fixed character length and receiving, from a source, a plurality of random number. A matrix is created from the plurality random numbers and has at least one of the number of rows or columns equal to or greater than the character length. An array that can be used as an encryption key or a seed for an encryption key is generated by selecting an initial element within the matrix, selecting subsequent elements using a selection technique until a number of elements in the array is equal to the character length and rejecting any previously selected elements from the array.
Voiceprint recognition model construction
Technologies related to voiceprint recognition model construction are disclosed. In an implementation, a first voice input from a user is received. One or more predetermined keywords from the first voice input are detected. One or more voice segments corresponding to the one or more predetermined keywords are recorded. The voiceprint recognition model is trained based on the one or more voice segments. A second voice input is received from a user, and the user's identity is verified based on the second voice input using the voiceprint recognition model.
Digital data locker system providing enhanced security and protection for data storage and retrieval
The subject matter herein is directed to a digital data locker that acts as an intermediary between end users operating end user device and document providers. The data locker provides the end user with a secure and easy way to manage, store, and retrieve data that is stored at the document providers. Specifically, the features provided by the data locker include, but are not limited to, a dual level of encryption for data, content assurance to determine whether the data is corrupted, and dissociation between an identity of an end user and the data of the end user stored at the document providers. More specifically, an end user device operated by the end user, through use of a single application, may access the data locker to securely store and retrieve data on/from the document providers.
Method for anonymously identifying a security module
A method for anonymously identifying a security module by a server. The method includes: receiving, from the module, a request for the address of a server managing subscription data of an operator, the request including a current identification value of the module, which depends on an identifier of the module and a current date; searching for the current identification value in at least one set of identification values, the set being associated with an operator and including, for a given module, a plurality of identification values, which are calculated depending on the identifier of the module and a date, the date varying for the plurality of identification values of the set between a start date and an end date; and sending, to the security module, the address of the server managing subscription data associated with the operator when the current identification value appears in the set of identification values.
Malicious activity detection system capable of efficiently processing data accessed from databases and generating alerts for display in interactive user interfaces
Various systems and methods are provided that retrieve raw data from issuers, reorganize the raw data, analyze the reorganized data to determine whether the risky or malicious activity is occurring, and generate alerts to notify users of possible malicious activity. For example, the raw data is included in a plurality of tables. The system joins one or more tables to reorganize the data using several filtering techniques to reduce the processor load required to perform the join operation. Once the data is reorganized, the system executes one or more rules to analyze the reorganized data. Each rule is associated with a malicious activity. If any of the rules indicate that malicious activity is occurring, the system generates an alert for display to a user in an interactive user interface.
Securing vehicle bus by corrupting suspected messages transmitted thereto
A method of real-time data security of a communications bus, the method comprising the steps of: reading at least an early portion of a message being transmitted over a communications bus, determining whether the message is suspicious, according to at least one rule applied on the read early portion of the message, and upon determining that the message is suspicious, corrupting at least a part of the message.
Update-driven migration of data
A current operating system that is stored in a persistent storage circuit of a secure element is replaced by receiving a set of migration rules that specify changes to a set of data object types. Based upon the set of migration rules, a migration engine identifies data objects stored in a persistent storage circuit and corresponding to the set of data object types. For each of the identified data objects: a subset of the migration rules are selected that correspond to a data object type that corresponds to a particular data object, and based upon the selected subset, the particular data object is transformed. A new operating system can then be enabled.
PPG authentication method and device
A photoplethysmogram (PPG) authentication method and device, where it is detected whether a terminal currently meets a PPG signal pre-collection trigger condition, and collection of a current PPG signal of a user is triggered only when the PPG signal pre-collection trigger condition is met such that the PPG signal of the user is pre-obtained before an application requests PPG authentication. In this way, when it is detected that the application initiates a PPG authentication request, PPG authentication may be directly performed based on a most recently collected PPG signal, thereby ensuring timeliness of PPG authentication, avoiding resource consumption caused by periodic PPG signal collection, and reducing power consumption.
Data collection systems having a self-sufficient data acquisition box
The present disclosure describes systems for data collection in an industrial environment having a self-sufficient data acquisition box for capturing and analyzing data in an industrial process. A system can include a data circuit for analyzing a plurality of sensor inputs, and a network control circuit for sending and receiving information related to the sensor inputs to an external system. The system may provide sensor data to a plurality of other similarly configured systems, and the system dynamically reconfigures where it sends data and what quantity of data it sends based on an availability of the other similarly configured systems.