G06F21/60

Systems, and methods for transferring data between secure networks through less secure networks
11582204 · 2023-02-14 · ·

The disclosure relates to systems, methods and computer readable for generating double encryption of data through discrete modules that are air gapped at every stage. Furthermore, the transceivers disclosed can operate in “off-line” mode which can be adapted to communicate with any network access terminal regardless of the intermediate connecting network.

Homomorphic encryption offload for lightweight devices

Disclosed are systems, methods, devices, and computer-readable media for offloading lattice-based cryptographic operations to hybrid cloud computing system. In one embodiment, a method is disclosed comprising receiving a first network request from a client device via a secure application programming interface (API), the request including unencrypted data; encrypting the unencrypted data using an algorithm that generates homomorphically encrypted data; issuing a second network request to a second API of a cloud platform, the second network request including the encrypted data; receiving a response from the cloud platform in response to the second network request; and transmitting, in response to the first network request, a result to the client device based on the response, the result obtained by decrypting an encrypted output returned by the cloud platform.

Active locking mechanism using machine learning

Methods and systems disclosed herein describe using machine learning to lock and unlock a device. Machine learning may be trained to recognize one or more features. Once the device has been trained to recognize one or more features, a user may define an unlock condition for the device using the one or more trained features. After defining the unlock condition, the device may be locked by verifying the one or more features that the user defined as the unlock condition using machine learning. When verification is successful, the device may be unlocked and the user allowed to access the device.

Secure credentialing systems and methods

A method for preparing a credential package includes providing access to a credential record of a plurality of credential records stored in a database system. The credential record includes information identifying a credential candidate and credential information associated with the credential candidate. The method further comprising receiving a credential document associated with the credential information, receiving credential document information associated with the credential document, and storing the credential document in a distributed ledger system comprising a plurality of nodes.

A NETWORK CONTROLLER FOR GRANTING ACCESS RIGHTS TO A SET OF DEVICES

A network controller (102) for granting a device and/or an application (120) access rights to at least one device of a set of devices (112, 130) is disclosed. The set of devices (112, 130) comprises a controllable device (130) and a control device (110), wherein the control device (110) comprises a user input element (112) configured to receive a user input, and wherein the control device (110) is configured to generate an input signal (114) based on the received user input. The network controller (102) comprises a communication unit (104) configured to receive an access request signal (124) from the device and/or the application (120), and to receive the input signal (114) from the control device (110), and a processor (106) configured to switch, upon receipt of the access request signal (124), the network controller (102) from a control mode to a configuration mode, wherein the processor (106) is configured to control, if the network controller (102) is in the control mode, the controllable device (130) based on the input signal (114), wherein the processor (106) is configured to grant, if the network controller (102) is in the configuration mode, the access rights to the device and/or the application (120) upon receipt of the input signal (114).

METHOD, APPARATUS, ADAPTER AND SYSTEM FOR CROSS-CHAIN DATA ACCESS OF BLOCKCHAIN

Disclosed are a method and a system for cross-chain data access of blockchain. According to the technical solution, an adapter is added between a service blockchain and a witness blockchain, a cross-chain initiation event and a cross-chain response event on a local service blockchain are registered to the witness blockchain by using the adapter, so as to provide query and push services of cross-chain events to other nodes on the local service blockchain, and trigger related operations on the local service blockchain according to the cross-chain events of the witness blockchain.

METHOD, APPARATUS, COMPUTER DEVICE, STORAGE MEDIUM, AND PROGRAM PRODUCT FOR PROCESSING DATA
20230039182 · 2023-02-09 ·

A method, an apparatus, a computer device, a storage medium, and a program product for processing data are provided, which belong to the technical field of artificial intelligence. The method includes: acquiring model training information transmitted by each of at least two edge node devices, the model training information being transmitted in a form of plaintext, and being obtained by the edge node device by training sub-models through differential privacy; acquiring, based on the model training information transmitted by each of the at least two edge node devices, the sub-models trained by each of the at least two edge node devices; and performing, based on a target model ensemble policy, model ensemble on the sub-models trained by the at least two edge node devices, to obtain a global model. This solution expands the manner of model ensemble while ensuring the data security, thereby improving the model ensemble effect.

PROTOCOL TO INITIATE COMMUNICATION BETWEEN QUANTUM DEVICES CONFIGURED TO SEND OR RECEIVE QUANTUM OBJECTS
20230039262 · 2023-02-09 ·

Methods for communicating messages encoded in quantum objects comprise exchanging series of values on a classical communication channel between quantum communication devices. Basically, one of the quantum devices discloses a clue on its intention to use a polarization basis for a given quantum object while the other device discloses clue on a basis it will not use in a way similar to the Monty Hall Problem.

PROCESS FOR DETERMINING A DEGREE OF DATA EXPOSURE
20230039039 · 2023-02-09 · ·

A process for determining a degree of data exposure, including the steps of: receiving entries associated with documents, where each of the entries includes an access path and information about the server; generating subsets, wherein for at least one subset: determining at least one score among a first and a second score; determining the first score including: generating a value as a function of the access paths; determining, with a machine-learning algorithm, the first score based on this value; and determining the second score including: receiving content associated with each entry; generating a value as a function of the associated content; determining, with a machine-learning algorithm, the second score based on the value; and determining the degree of exposure of the data present on the associated server.

STORAGE DEVICE, HOST DEVICE AND DATA TRANSFER METHOD THEREOF

A method of transmitting data in a storage device includes encrypting original data based on a homomorphic encryption algorithm to generate encrypted data, generating a parameter for regeneration of a ciphertext higher than an operation level of the encrypted data by using the encrypted data and a key value, and transmitting the encrypted data and the parameter to an external host device.