Patent classifications
H04L9/00
Privacy-preserving machine learning
New and efficient protocols are provided for privacy-preserving machine learning training (e.g., for linear regression, logistic regression and neural network using the stochastic gradient descent method). A protocols can use the two-server model, where data owners distribute their private data among two non-colluding servers, which train various models on the joint data using secure two-party computation (2PC). New techniques support secure arithmetic operations on shared decimal numbers, and propose MPC-friendly alternatives to non-linear functions, such as sigmoid and softmax.
ARTIFICIAL INTELLIGENCE PIPELINE NON-FUNGIBLE TOKEN AND EXECUTION METHOD THEREOF
The present disclosure relates to a non-transitory storage medium for storing program code and a method of executing an artificial intelligence (AI) pipeline non-fungible token (NFT). The program code is executed by a hardware processor to mint a blockchain-based NFT including ownership information of the AI pipeline, request an execution of the program code performing a predetermined function in an event node executing the AI pipeline according to a request of execution of an NFT owner, connect to at least one worker node to execute a target AI pipeline of the NFT, receive an execution result value of the worker node to record a proof-of-work for the execution result value in the event node, and collect the execution result value of the worker node on which the proof-of-work is performed is performed to change a blockchain state.
System, method and program product for generating and utilizing stable value digital assets
The present invention generally relates to a method, system and program product for generating a stable value digital asset tied to a blockchain.
METHOD FOR PERFORMING POWER DISTURBING OPERATION TO REDUCE SUCCESS RATE OF CRYPTOSYSTEM POWER ANALYSIS ATTACK, CRYPTOSYSTEM PROCESSING CIRCUIT, AND ELECTRONIC DEVICE
A method for performing a power disturbing operation to reduce a success rate of cryptosystem power analysis attack, an associated cryptosystem processing circuit and an associated electronic device are provided. The method includes: generate at least one random number; generating a plurality of power disturbing parameters respectively corresponding to a plurality of bit calculation phases according to the at least one random number, where the plurality of bit calculation phases represent a plurality of cryptosystem processing phases related to a predetermined cryptosystem, and correspond to a plurality of private key bits of a private key, respectively; and according to the plurality of power disturbing parameters, enabling at least one predetermined circuit of a plurality of predetermined circuits in the plurality of bit calculation phases, respectively, to use power corresponding to the plurality of power disturbing parameters to perform the power disturbing operation in the plurality of bit calculation phases, respectively.
Methods, systems, and computer readable media for detecting and mitigating effects of timing attacks in time sensitive networks
A method for providing timing security in a time sensitive network (TSN), includes monitoring TSN times in timing synchronization packets exchanged between TSN network nodes. The method further includes monitoring TSN timing values calculated by TSN network nodes. The method further includes determining, using TSN times and TSN timing values, whether a timing attack is indicated. The method further includes, in response to determining that a timing attack is indicated, performing a timing attack effects mitigation action.
Systems and methods for linkage data elements
An improved data structure approach, and corresponding computational systems and methods are described to provide a technical approach that can be used for improving computational performance where a blockchain data structure is being accessed continuously or periodically for validation of recordals of one or more events that have taken place. A hybrid off-chain (or off-contract)/on-chain solution is utilized to provide a mechanism for establishing data linkages between the off-chain (or off-contract) records and on-chain data payloads.
Systems and methods for automatic device detection, device management, and remote assistance
In some embodiments, a network regulator device protects a local network of client systems (e.g. Internet-of-things devices such as smartphones, home appliances, wearables, etc.) against computer security threats. When introduced to the local network, some embodiments of network regulator take over some network services from a router, and automatically install the network regulator as gateway to the local network. The network regulator then carries out an automatic device discovery procedure and distribute device-specific utility agents to the protected client systems. An exemplary utility agent detects when its host device has left the local network, and in response, sets up a virtual private network (VPN) tunnel with a security server to maintain protection of the respective device.
Systems and methods for attack simulation on a production network
The disclosure is directed towards systems and methods for improving security in a computer network. The system can include a planner and a plurality of controllers. The controllers can be deployed within each zone of the production network. Each controller can be configured to assume the role of an attacker or a target for malicious network traffic. Simulations of malicious behavior can be performed by the controllers within the production network, and can therefore account for the complexities of the production network, such as stateful connections through switches, routers, and other intermediary devices. In some implementations, the planner can analyze data received from the controllers to provide a holistic analysis of the overall security posture of the production network.
Crypto multiple security asset creation and redemption platform
An asset trading system utilizing a distributed ledger and configured to: when a creation request to create a digital fund token representing at least one share of a fund having a plurality of different assets (i) is received, (ii) is electronically signed with a private key associated with a first addressed account, and (iii) indicates a composition of the at least one share of the fund: place the plurality of different assets represented by the at least one share of the fund into an escrow account; create the digital fund token, wherein the digital fund token indicates the composition of the share of the fund; and record the creation of the digital fund token on a distributed ledger.
DNS proxy that automatically clears IP addresses in firewall according to DNS queries of cleared domain names
A walled garden system includes a firewall controlling access between a first network and a second network at least by allowing connection requests originating from a user device on the first network to a destination IP address on the second network in response to determining that the destination IP address matches a cleared IP address on a cleared IP addresses list. A controller receives a domain name service (DNS) reply from a DNS server on the second network, and determines whether a domain name specified within the DNS reply matches a cleared domain name on a cleared domain names list. In response to determining that the domain name specified within the DNS reply matches the cleared domain name on the cleared domain names list, the controller adds a resolved IP address specified in the DNS reply to the cleared IP addresses list as a new cleared IP address.