G06F21/606

Systems, and methods for transferring data between secure networks through less secure networks
11582204 · 2023-02-14 · ·

The disclosure relates to systems, methods and computer readable for generating double encryption of data through discrete modules that are air gapped at every stage. Furthermore, the transceivers disclosed can operate in “off-line” mode which can be adapted to communicate with any network access terminal regardless of the intermediate connecting network.

Homomorphic encryption offload for lightweight devices

Disclosed are systems, methods, devices, and computer-readable media for offloading lattice-based cryptographic operations to hybrid cloud computing system. In one embodiment, a method is disclosed comprising receiving a first network request from a client device via a secure application programming interface (API), the request including unencrypted data; encrypting the unencrypted data using an algorithm that generates homomorphically encrypted data; issuing a second network request to a second API of a cloud platform, the second network request including the encrypted data; receiving a response from the cloud platform in response to the second network request; and transmitting, in response to the first network request, a result to the client device based on the response, the result obtained by decrypting an encrypted output returned by the cloud platform.

PROTOCOL TO INITIATE COMMUNICATION BETWEEN QUANTUM DEVICES CONFIGURED TO SEND OR RECEIVE QUANTUM OBJECTS
20230039262 · 2023-02-09 ·

Methods for communicating messages encoded in quantum objects comprise exchanging series of values on a classical communication channel between quantum communication devices. Basically, one of the quantum devices discloses a clue on its intention to use a polarization basis for a given quantum object while the other device discloses clue on a basis it will not use in a way similar to the Monty Hall Problem.

PROCESS FOR DETERMINING A DEGREE OF DATA EXPOSURE
20230039039 · 2023-02-09 · ·

A process for determining a degree of data exposure, including the steps of: receiving entries associated with documents, where each of the entries includes an access path and information about the server; generating subsets, wherein for at least one subset: determining at least one score among a first and a second score; determining the first score including: generating a value as a function of the access paths; determining, with a machine-learning algorithm, the first score based on this value; and determining the second score including: receiving content associated with each entry; generating a value as a function of the associated content; determining, with a machine-learning algorithm, the second score based on the value; and determining the degree of exposure of the data present on the associated server.

DEBUGGING MANAGEMENT PLATFORM AND OPERATING METHOD FOR THE SAME
20230041147 · 2023-02-09 ·

A debugging management platform and an operating method for the same are provided. In the operating method, the debugging management platform operates a debugging agent service for establishing a debugging channel between a software development platform and a test platform. When receiving debugging packets are issued by the software development platform or the test platform, the debugging agent service analyzes the debugging packets and checks if the debugging packets meet an information security standard. The debugging packets are forwarded to the test platform or the software development platform if the debugging packets meet the information security standard. If the debugging packets do not meet the information security standard, the debugging packets are not forwarded, so as to ensure information security of the debugging packets that are forwarded between different environments.

IMAGE REDACTION FOR A DISPLAY DEVICE

A system may be used to redact an image to be displayed by a display device. By intercepting a signal before an image of the signal is displayed on a display device, the display of confidential, sensitive and inappropriate information may be suppressed. More specifically, the image of the signal is analyzed using a content recognition algorithm to identify items of content, which may be redacted by modifying the signal. Using this concept, the image may be redacted by the display device, or by a port or adapter between a signal generator and the display device, without relying on redaction software local to the signal generation system.

Secure communications between virtual computing instances
11556662 · 2023-01-17 · ·

Method and apparatus for virtualized environment where virtual computing instances interface a service platform operated on a physical computing apparatus are disclosed. A new virtual computing instance interfacing the service platform can be created, the created new virtual computing instance belonging to a class of virtual computing instances. At least one security credential is obtained from a storage of security credentials associated with the class of the new virtual computing instance. Data communicated with at least one further computing instance is secured based on the obtained at least one security credential.

Method for key sharing between accelerators with switch

A host processing device (“host”) instructs a plurality of data processing (DP) accelerators to configure themselves for secure communications. The host generates an adjacency table of each of the plurality of DP accelerators (“DPAs”). The host is communicatively coupled to the plurality of DPAs via a switch. The host transmits, to the switch, a list of the DPAs and instructs the switch to generate an adjacency table of the DPAs that includes a unique identifier of each DPAs and a communication port of the switch associated with the DPA. The host establishes a session key communication with each DPA and sends the DPA a list of other DPAs that the DPA is to establish a session key with, for secure communications between the DPAs. The DPA establishes a different session key for each pair of the plurality of DPAs. When all DPAs have established a session key for communication with other DPAs, the host can assign work tasks for performance by a plurality of DPAs, each communicating over a separately secured communication channel.

Management of near field communications using low power modes of an electronic device

Systems, methods, and computer-readable media for managing near field communications during a low power management mode of an electronic device are provided that may make credentials of a near field communication (“NFC”) component appropriately secure and appropriately accessible while also limiting the power consumption of the NFC component and of other components of the electronic device.

Techniques For Providing Secure Federated Machine-Learning
20230008976 · 2023-01-12 ·

Embodiments of the invention are directed to systems, methods, and devices for securely performing federated tasks (e.g., the generation and utilizing of machine-learning models). A secure platform computer may operate a secure memory space. Entities participating in a federated project may transmit respective portions of project data defining the federated project. Each entity may provide their respective (encrypted) data sets for the project that in turn can be used to generate a machine-learning model in accordance with the project data. The machine-learning model may be stored in the secure memory space and accessed through an interface provided by the secure platform computer Utilizing the techniques discussed herein, a machine-learning models may be generated and access to these models may be restricted while protect each participant's data set from being exposed to the other project participants.