Patent classifications
G06F21/64
Electronic element, system comprising such an electronic element and method for monitoring and cutting off a processor on occurrence of a failure event
An electronic element includes: a module for storing reference data; a module for receiving data from a processor; a module for verifying the received data by comparison by way of reference data; and a module for transmitting an instruction to cut off supply of the processor, the supply cutoff instruction being transmitted after occurrence of a failure event, the failure event being an absence of reception of data or a failure in verifying the data. A system including such an electronic element and a method for monitoring a processor by the electronic element are also described.
Sales system, server, and processing method for sales system
According to the present invention, there is provided a sales system (10) that includes a plurality of information acquisition units (11-1 to 11-N (N is an integer equal to or greater than 2)) installed for a plurality of respective products, a registration unit (12) that registers a product corresponding to a first information acquisition unit (11-A (A is an integer equal to or greater 1 and equal to or smaller than N)) in association with customer identification information when the customer identification information is input through the first information acquisition unit (11-A), a reception unit (13) that receives a request for a product list associated with the customer identification information from a customer terminal, and a transmission unit (14) that transmits the product list to the customer terminal in response to the request.
Sales system, server, and processing method for sales system
According to the present invention, there is provided a sales system (10) that includes a plurality of information acquisition units (11-1 to 11-N (N is an integer equal to or greater than 2)) installed for a plurality of respective products, a registration unit (12) that registers a product corresponding to a first information acquisition unit (11-A (A is an integer equal to or greater 1 and equal to or smaller than N)) in association with customer identification information when the customer identification information is input through the first information acquisition unit (11-A), a reception unit (13) that receives a request for a product list associated with the customer identification information from a customer terminal, and a transmission unit (14) that transmits the product list to the customer terminal in response to the request.
Proof-of-approval distributed ledger
A method and system for determining whether a consensus has been achieved for adding a block to a distributed ledger. The system receives a candidate block to add to the distributed ledger and receives block approvals of approving participants for the candidate block. The system calculates a total block approval stake that the approving participants have in the distributed ledger. The system identifies a total stake that participants have in the distributed ledger. When the total block approval stake is at least a threshold fraction of the total skate, the system indicates that the consensus has been achieved for adding the candidate block to the distributed ledger.
Authenticating software images
Methods, systems, and devices for authenticating software images are described. A system may include one or more control units that use software images for managing different functions of the system. The system may also include a secure storage device configured to validate or authenticate the software images used by the different control units of the system. A software image of a control unit may be authenticated by generating a first hash associated with a portion of its underlying source code and generating a second hash associated with a corresponding portion of the source code of the copy of the software image stored to the secure storage device. Different patterns of the source code of the software images may be used to generate the hashes. The first hash and second hash may be compared, and the software image may be authenticated based on the hashes matching.
Wireless security protocol
This disclosure relates to a data storage device. A data port transmits data between a host computer system and the data storage device over a data channel. The device repeatedly broadcasts advertising packets over a wireless communication channel different from the data channel. Each advertising packet comprises a random value and a message authentication code calculated based on the random value and an identity key. The identity key is readable by a device to be connected and in proximity of the data storage device out of band of the data channel and the communication channel. The identity key enables the device to be connected to verify the message authentication code based on the random value and the identity key to thereby authenticate the data storage device.
Recordation of device usage to public/private blockchains
A personal blockchain is generated as a cloud-based software service in a blockchain environment. The personal blockchain immutably archives usage of any device, perhaps as requested by a user. However, some of the usage may be authorized for public disclosure, while other usage may be designated as private and restricted from public disclosure. The public disclosure may permit public ledgering by still other blockchains, thus providing two-way public/private ledgering for improved record keeping. Private usage, though, may only be documented by the personal blockchain.
System for context-based data storage scrutinization and capture
A system for context-based data scrutinization and capture is provided. The system comprises: a memory device with computer-readable program code stored thereon; a communication device connected to a network; a processing device, wherein the processing device is configured to execute the computer-readable program code to: monitor a data storage location using a crawler bot configured for scanning an artifact stored in the data storage location; scan the artifact, using the crawler bot, for one or more data fields, wherein at least one of the one or more data fields comprises unobscured private data; identify an artifact type for the artifact based on the one or more data fields; and capture the artifact from the data storage location based on the artifact and the unobscured private data, wherein capturing the artifact comprises temporarily removing the artifact from the data storage location.
System for context-based data storage scrutinization and capture
A system for context-based data scrutinization and capture is provided. The system comprises: a memory device with computer-readable program code stored thereon; a communication device connected to a network; a processing device, wherein the processing device is configured to execute the computer-readable program code to: monitor a data storage location using a crawler bot configured for scanning an artifact stored in the data storage location; scan the artifact, using the crawler bot, for one or more data fields, wherein at least one of the one or more data fields comprises unobscured private data; identify an artifact type for the artifact based on the one or more data fields; and capture the artifact from the data storage location based on the artifact and the unobscured private data, wherein capturing the artifact comprises temporarily removing the artifact from the data storage location.
Data masking in a microservice architecture
A method includes retrieving an object from storage and copying the object, generating a list that identifies one or more byte ranges, of the copy of the object, to be masked, providing the list to a masker controller microservice that examines a recipe corresponding to the copy of the object, where the recipe references a slice of the copy of the object, and the slice includes one or more data segments, masking, by the masker controller microservice, a segment of the slice that is in one of the byte ranges, to create a masked segment, and replacing, in the slice, the segment with the masked segment, to create a masked slice and creating a masked object recipe that contains a reference to the masked slice, creating a masked object that includes the masked slice, and that references any unmasked segments of the slice, and deduplicating the masked object.