H04L9/00

HOMOMORPHIC COMPUTATIONS ON ENCRYPTED DATA WITHIN A DISTRIBUTED COMPUTING ENVIRONMENT

The disclosed exemplary embodiments include computer-implemented systems, apparatuses, and processes that perform homomorphic computations on encrypted third-party data within a distributed computing environment. For example, an apparatus receives a homomorphic public key and encrypted transaction data characterizing an exchange of data from a computing system, and encrypts modelling data associated with a first predictive model using the homomorphic public key. The apparatus may perform homomorphic computations that apply the first predictive model to the encrypted transaction data in accordance with the encrypted first modelling data, and transmit an encrypted first output of the homomorphic computations to the computing system, which may decrypt the encrypted first output using a homomorphic private key and generate decrypted output data indicative of a predicted likelihood that the data exchange represents fraudulent activity.

CRYPTOGRAPHIC FEATURE LICENSING
20230006821 · 2023-01-05 ·

Techniques to facilitate feature licensing of an industrial controller employed in an industrial automation environment are disclosed. In one implementation, a first private key unique to an industrial controller and a security certificate is stored in a hardware root of trust within the controller. The security certificate is signed by a certificate authority for authenticating the controller. After being authenticated, the industrial controller receives a device information package provided by the certificate authority. The device information package is encrypted with a first public key paired with the first private key and signed using a second private key assigned to the certificate authority. The controller validates the device information package using a second public key paired with the second private key and decrypts the package using the first private key. One or more functions of the industrial controller are enabled based on a license included in the device information package.

METHOD AND APPARATUS FOR PUBLISHING SMART CONTRACT,COMPUTER-READABLE MEDIUM,AND ELECTRONIC DEVICE

A method for publishing a smart contract includes: generating a version number index value according to a contract name of the smart contract, and searching for an associated target contract version number from a blockchain network according to the version number index value; generating a contract index value according to a contract version number of the smart contract and the contract name, in response to determining that the contract version number of the smart contract is greater than the target contract version number; associating the contract index value with the smart contract and associating the version number index value with the contract version number of the smart contract, to generate transaction information; and publishing the transaction information to the blockchain network, to publish the smart contract to the blockchain network.

BLOCKCHAIN-BASED DATA PROCESSING METHOD AND APPARATUS, COMPUTER DEVICE, COMPUTER-READABLE STORAGE MEDIUM, AND COMPUTER PROGRAM PRODUCT

A blockchain-based data processing method and apparatus, a computer device, and a computer-readable storage medium. The method includes: obtaining a data authorization request transmitted by an authorization terminal, the data authorization request including a data authorization certificate associated with an authorizer; performing authorization verification on the authorizer according to the data authorization request to obtain a first verification result; signing the data authorization certificate according to a private key of a first blockchain in a case that the first verification result is a valid result to obtain a first certificate signature, determining the first certificate signature as a to-be-uploaded signature, and performing uploading on the data authorization certificate carrying the to-be-uploaded signature; and transmitting the data authorization certificate to a second blockchain, and providing a query permission to a query terminal in a case that signature verification on the to-be-uploaded signature by the second blockchain succeeds.

DATA PROCESSING METHOD AND APPARATUS BASED ON BLOCKCHAIN NETWORK

This disclosure relates to data processing method and apparatus based on a blockchain network. The method may include receiving a data acquisition request transmitted by a target service node. The data acquisition request may carry a data type of data requested by the target service node and a data identifier set. The method may further include determining a target node set from the nodes in the blockchain network according to the data type, the data identifier set, and recorded data storage information of the nodes. The method may further include transmitting feedback information carrying the node information in the target node set to the target service node. The feedback information is for instructing the target service node to acquire the requested data from a node according to the node information in the target node set.

BLOCKCHAIN-BASED HOST SECURITY MONITORING METHOD AND APPARATUS, MEDIUM AND ELECTRONIC DEVICE

The present disclosure relates to a blockchain-based host security monitoring method and apparatus, a computer readable medium and an electronic device. The host security monitoring method in the embodiments of the present disclosure comprises: monitoring traffic data of a host in network communication, and determining whether the traffic data is malicious traffic; if the traffic data is malicious traffic, obtaining security state information of the host, and saving the security state information to a security state blockchain; generating an invasion log corresponding to the malicious traffic, and saving the invasion log and the security state information to a log storage blockchain.

INFORMATION MATCHING SYSTEM AND INFORMATION MATCHING METHOD

In order to provide an information matching system achieving an information matching scheme that takes a lower cost and uses secure biometric information, the information matching system includes a concealment apparatus, a decryption apparatus, and a similarity calculating apparatus. The concealment apparatus transmits, to the similarity calculating apparatus, concealed information including information concealing obtained matching information by linear conversion using random numbers. The similarity calculating apparatus calculates, from obtained one or more pieces of registration information and the concealed information received from the concealment apparatus, a concealed similarity which is a value concealing a similarity between the matching information and the registration information, and to transmit the calculated concealed similarity to the decryption apparatus. The decryption apparatus calculates the similarity between the matching information and the registration information from the concealed similarity received from the similarity calculating apparatus, using the random numbers used by the concealment apparatus.

METHOD FOR RECEIVING FIRMWARE AND METHOD FOR TRANSMITTING FIRMWARE

A method for receiving firmware including pieces of firmware data is provided. The method is performed by a first apparatus in a multicast group including at least the first apparatus and a second apparatus. The method includes (a) receiving first meta-information for the firmware data from the second apparatus, (b) generating, based on the first meta-information, second meta-information for at least one piece of firmware data to be used to apply the firmware to the first apparatus, among the firmware data, and (c) receiving, based on the second meta-information, the at least one piece of firmware data from a firmware providing apparatus or the second apparatus. The first meta-information includes at least history information including version and partitioning information for each of the pieces of firmware data, and the second meta-information includes at least the history information for each of the at least one piece of firmware data.

SYSTEM AND METHOD FOR DIGITAL PROOF GENERATION
20230239153 · 2023-07-27 ·

A system and a method for digital proof generation are provided. The system includes a data management module to manage dataset having plurality of data rows and a query execution and verification module including a commitment storage sub-module, a query execution sub-module and a result verification sub-module. The data management module receives query from the query execution sub-module, related to operation on data rows of plurality of data rows, which is processed to generate execution result associated with data rows. The execution result is transferred along with data rows to the query execution sub-module. A set of commitments associated with execution result is transferred to the commitment storage sub-module. The query execution sub-module transfers set of commitments, from the commitment storage sub-module, and data rows to the result verification sub-module for verification, and receives a verification result from the result verification sub-module.

METHODS AND DEVICES FOR SECURE ACCESS CONTROL TO A DATA STORAGE SYSTEM AND FOR DATA ARCHIVING
20230237205 · 2023-07-27 ·

A method for secure access control to a data storage system for a host apparatus by means of an access control device, the method comprising: as part of a first mode of operation of the access control device, receiving user data from the host apparatus and transmitting it in unmodified or modified form to the data storage system for local storage; exchanging a first cryptographic secret with a computer system to enable encryption of data by the access control device in dependence on the first cryptographic secret; receiving a data read request for at least a portion of the user data stored in the data storage system; in response to the data read request, transitioning the access control device to a second mode of operation in which the access control device is configured to perform read access but not write or delete access to the data storage system; and in the second operating mode, retrieving user data requested according to the data read request from the data storage system, encrypting them using the first cryptographic secret (K) or a key derived therefrom according to a key generation rule and transmitting the user data encrypted in this way to a predetermined user data recipient; wherein the user data is processed as part of the method in such a way that the encrypted user data transmitted as part of the second operating mode represents information which can be extracted from it for the user data recipient and which represents an identity of the access control device and/or of the data storage system or allows a clear conclusion to be drawn therefrom.