G06F21/606

MULTI-PARTY AND MULTI-USE QUANTUM RESISTANT SIGNATURES AND KEY ESTABLISHMENT

A system for making digital signatures includes plural signers determining cleartext bits to sign in response to a hash of a pre-image known to the respective signer and message. Another system uses one-way functions and a plurality of authentication paths per signature. A key information distribution system uses physical media, physical media revealing means, and changing the configuration of the physical media revealing means to reveal secret indicia to observers.

DATA TRANSMISSION METHOD, APPARATUS, AND SYSTEM, COMPUTER DEVICE, AND STORAGE MEDIUM

A data transmission method, apparatus, and system, a computer device, and a storage medium. The method includes: performing two-way authentication with a first interaction device; receiving encrypted interaction data obtained by encrypting interaction data based on a working key and transmitted by the first interaction device, after the two-way authentication is completed, the working key being obtained by the first interaction device by mapping an authentication key used in the two-way authentication; decrypting the encrypted interaction data according to the working key obtained by mapping the authentication key on the communication adapter; transmitting interaction data obtained through the decryption to a second interaction device through a simulated device node identifiable by the second interaction device and based on a communication protocol of the second interaction device that is natively adapted to the device node.

Storage device authentication

Systems and methods authenticate storage devices. In one implementation, a computer-implemented method is provided for authenticating a storage device. According to the method, a manifest that identifies a destination is receive. A transfer station reads a digital signature from the storage device. The digital signature is validated and, based on the validation of the digital signature, a transfer of one or more files from the storage device via the transfer station is authorized to the destination identified in the manifest.

In-vehicle network system, fraud-detection electronic control unit, and fraud-detection method

In a fraud-detection method for use in an in-vehicle network system including a plurality of electronic control units (ECUs) that exchange messages on a plurality of networks, a plurality of fraud-detection ECUs each connected to a different one of the networks, and a gateway device, a fraud-detection ECU determines whether a message transmitted on a network connected to the fraud-detection ECU is malicious by using rule information stored in a memory. The gateway device receives updated rule information transmitted to a first network among the networks, selects a second network different from the first network, and transfers the updated rule information only to the second network. A fraud-detection ECU connected to the second network acquires the updated rule information and updates the rule information stored therein by using the updated rule information.

Using deep learning models to obfuscate and optimize communications

Concepts and technologies are disclosed herein for using deep learning models to obfuscate and optimize communications. A request can be received in a first language, from a user device, and at a first computing device storing a first neural network. The request can be translated using the first neural network into a modified request in a custom language. The modified request can be sent to a second computing device hosting an application. The first computing device can receive a modified response that is in the custom language, where the modified response can be created at the second computing device using the second neural network and based on a response from the application. The modified response can be translated into a response in the first language and sent to the user device.

Mobile device security, device management, and policy enforcement in a cloud-based system
11716359 · 2023-08-01 · ·

Mobile device security, device management, and policy enforcement are described in a cloud-based system where the “cloud” is used to pervasively enforce security and policy and perform device management regardless of device type, platform, location, etc. A method includes receiving one or more mobile profiles for one or more mobile devices each associated with a user from an enterprise; responsive to enrollment of a mobile device of the one or more mobile devices, communicating to the mobile device; determining an associated mobile profile of the one or more mobile profiles for the mobile device; and configuring the mobile device based on the associated mobile profile.

Data security protection system

According to embodiments of the present disclosure, there is provided a system, method, electronic device, storage medium and program product of security protection. The system comprises: a security computing sub-system, configured to manage security of developed code to compile the developed code into an installation file corresponding to a target application and a service program for supporting the target application; a data exchange sub-system, configured to manage data communication of the target application or service program with RoW (rest of World); and a security sandbox sub-system, configured to manage traffic data associated with the target application. In this way, the embodiments of the present disclosure can guarantee the security and compliance of data related to the target application.

AUTHORIZING APPLICATION ACCESS VIA CUSTOM UWP SID
20230026040 · 2023-01-26 · ·

An information handling system may include at least one processor and a non-transitory, computer-reading medium having instructions thereon that are executable by the at least one processor for: providing access to one or more objects via a plurality of application programming interface (API) endpoints; receiving a call to a particular API endpoint from an app; and determining, based on a security identifier (SID) of the app, whether the call should be allowed; wherein the SID of the app is based on one or more custom capabilities defined in a manifest of the app.

SYSTEM AND METHOD FOR AUTHORIZING DATA TRANSFERS
20230021985 · 2023-01-26 ·

Systems and methods for authorizing data transfers are disclosed. Exemplary implementations may: receive a data transfer authorization request based on a data transfer initiated by a customer computing device; when the customer computing device is associated with a system of trust: send a third-party second-factor authentication message to trustee computing device(s) without sending any message to the customer computing device, and authorize the data transfer system to complete the data transfer request in response to receipt of a third-party authentication confirmation from the trustee computing device(s) and in the absence of any authentication confirmation from the customer computing device.

STORAGE DEVICE AUTHENTICATION

Systems and methods authenticate storage devices. In one implementation, a computer-implemented method is provided for authenticating a storage device. According to the method, a manifest that identifies a destination is receive. A transfer station reads a digital signature from the storage device. The digital signature is validated and, based on the validation of the digital signature, a transfer of one or more files from the storage device via the transfer station is authorized to the destination identified in the manifest.