H04L63/00

AUTHENTICATION BASED ON TRANSACTIONS STORED IN BLOCKCHAIN
20230072866 · 2023-03-09 · ·

A dynamic transaction associated with a user is identified. For example, the user logging into a server is identified as a dynamic transaction. The dynamic transaction associated with the user is stored in a record (e.g., stored as a block in a blockchain). A first hash from a user device associated with the user is received. The second hash is generated based on the dynamic transaction. A second hash is generated based on the record. The first hash is compared to the second hash. In response to the first hash matching the second hash, the user is authenticated by providing access to a computer resource. For example, the user may be granted access to a database.

SECURE IMPORTATION OF CRYPTOGRAPHIC CREDENTIALS TO AN INFORMATION HANDLING SYSTEM

Systems and procedures are provided for importing cryptographic credentials of a customer to an IHS (Information Handling System). During factory provisioning of the IHS, a signed inventory certificate is uploaded to the IHS that includes an encrypted access code for unlocking the IHS and also includes encrypted credentials provided by the customer. Upon delivery and initialization of the IHS, the inventory certificate is retrieved by a pre-boot validation process. A cryptographic challenge is issued that presents the encrypted access code. Further initialization of the IHS is halted until a response to the challenge is received from the customer that provides the decrypted access code. When the decrypted access code is received, further initialization of the IHS is enabled and the encrypted credentials from the inventory certificate are imported to the IHS, thus allowing the customer to establish an independent root of trusted components using the IHS.

Maintenance plant management method, system and data management server
11475448 · 2022-10-18 · ·

The present application discloses a maintenance plant management method, maintenance plant management system and data management server, this method comprises: receiving, via a data management server, a transaction request of using a maintenance plant from a first user and calling a usage smart contract to grant a permission of usage of the maintenance plant to the first user according to the transaction request; calling the usage smart contract to send a transaction payment request to the first user according to transaction information when the first user finishes using the maintenance plant; performing a sharing according to the transaction sharing rule via the data management server when the payment transaction is finished by the first user; and receiving the transaction information submitted by the data management server and registering the transaction information in a block chain via the block chain node device.

SYSTEM FOR IMPLEMENTING LAYERED AUTHORIZATION PLATFORM USING NON-FUNGIBLE TOKENS
20230126386 · 2023-04-27 · ·

Systems, computer program products, and methods are described herein for implementing layered authorization platform using non-fungible tokens. The present invention is configured to electronically receive, via a user input device, a document designated for notarization and an identification credential from a user; crawl through a distributed ledger to determine a non-fungible token (NFT) for the identification credential; retrieve, from the distributed ledger, the NFT for the identification credential; capture, via the user input device, a signature of the user on the document designated for notarization to create a signed document; generate, using an NFT generator, an NFT for the signed document; link the NFT for the signed document with the NFT for the identification credential; and record the NFT for the signed document in the distributed ledger.

Remote line integration

Techniques to facilitate communication between remote industrial assets are disclosed herein. In at least one implementation, a computing system provides a virtual private network (VPN) service for an industrial automation network of an industrial automation enterprise. The computing system communicates with a first gateway system to establish a first connection between a first industrial asset and the VPN service for the industrial automation network. The computing system also communicates with a second gateway system to establish a second connection between a second industrial asset and the VPN service for the industrial automation network, wherein the second industrial asset is located at a disparate location than the first industrial asset. Bi-directional communications are routed between the first industrial asset and the second industrial asset to enable interactions between the first industrial asset and the second industrial asset as if they were directly connected over a same local communication network.

Training user-level differentially private machine-learned models

Systems and methods for learning differentially private machine-learned models are provided. A computing system can include one or more server computing devices comprising one or more processors and one or more non-transitory computer-readable media that collectively store instructions that, when executed by the one or more processors cause the one or more server computing devices to perform operations. The operations can include selecting a subset of client computing devices from a pool of available client computing devices; providing a machine-learned model to the selected client computing devices; receiving, from each selected client computing device, a local update for the machine-learned model; determining a differentially private aggregate of the local updates; and determining an updated machine-learned model based at least in part on the data-weighted average of the local updates.

Systems and methods for task processing in a distributed environment

Methods and apparatus for task processing in a distributed environment are disclosed and described. An example apparatus includes a task manager and a task dispatcher. The example task manager is to receive a task and create an execution context for the task, the execution context to associate the task with a routine for task execution. The example task dispatcher is to receive a report of task execution progress and provide an update regarding task execution progress, the task dispatcher, upon initiation of task execution, to facilitate blocking of interaction with a resource involved in the task execution. The example task dispatcher is to trigger an indication of task execution progress and, upon task finish, facilitate unblocking of the resource involved in the task execution.

Methods and apparatus to determine provenance for data supply chains

Methods, apparatus, systems and articles of manufacture to determine provenance for data supply chains are disclosed. Example instructions cause a machine to at least, in response to data being generated, generate a local data object and object metadata corresponding to the data; hash the local data object; generate a hash of a label of the local data object; generate a hierarchical data structure for the data including the hash of the local data object and the hash of the label of the local data object; generate a data supply chain object including the hierarchical data structure; and transmit the data and the data supply chain object to a device that requested access to the data.

MOVEMENT VERIFICATION SYSTEM AND METHOD

Movement verification methods and systems 1 are disclosed. These methods and systems are configured to determine user movement that is characterised by a sequence of repeated user actions—such as steps or bicycle crank revolutions. A user mobile device 10 is positioned in proximity to a user so as to register the movement of that user. The user mobile device comprising a sensor set 17 and is configured to generate from that sensor set an unverified set of movement data resulting from user movement. A movement verifier 5 is in communication with the mobile user device 10. The movement verifier 5 is configured to receive the unverified set of movement data from the user mobile device 10 and apply a movement verification function that compares the unverified set of movement data against a model so as to verify user movement that is characterised by a sequence of repeated user actions, such as steps.

METHODS AND DEVICES FOR PHYSICAL ACCESS CONTROL SYSTEMS

An access control system includes a plurality of physical access control readers that form a reader network which utilizes a first communication protocol. The system includes a plurality of mobile communication devices each having a first communication interface and a second communication interface. The first communication interface enables the mobile communication devices to access a mobile communication network which utilizes a second communication protocol, and the second communication interlace enables the mobile communication devices to communicate with the access control readers. The plurality of physical access control readers exchange status information for the plurality of physical access control readers and for the plurality of mobile communication devices over the reader network.