G06F2221/2135

SYSTEMS AND METHODS FOR REACTIVE INTENT-DRIVEN END-TO-END ORCHESTRATION

Various systems and methods for reactive intent-driven end-to-end (E2E) orchestration are described herein. An orchestrator system, includes a processor; and memory to store instructions, which when executed by the processor, cause the system to: receive, at the orchestrator system, an intent-based service level agreement (SLA) for execution of a series of tasks on a plurality of compute nodes; calculate, based on the intent-based SLA, intermediate latency thresholds corresponding to each task of the series of tasks; calculate slack estimates based on the latency thresholds and real-time telemetry of the plurality of compute nodes or real-time telemetry of connections between the plurality of compute nodes; monitor execution of the series of tasks on the plurality of compute nodes; and perform a corrective action in response to determining that the execution of the series of tasks is predicted to exceed one of the intermediate latency thresholds

INTENT-BASED ORCHESTRATION IN HETEROGENOUS COMPUTE PLATFORMS

Various systems and methods for implementing intent-based orchestration in heterogenous compute platforms are described herein. An orchestration system is configured to: receive, at the orchestration system, a workload request for a workload, the workload request including an intent-based service level objective (SLO); generate rules for resource allocation based on the workload request; generate a deployment plan using the rules for resource allocation and the intent-based SLO; deploy the workload using the deployment plan; monitor performance of the workload using real-time telemetry; and modify the rules for resource allocation and the deployment plan based on the real-time telemetry.

Authentication device and authentication method
11269980 · 2022-03-08 · ·

An authentication device authenticates a user using biometric information. The authentication device including: a storage unit, a first acquisition unit, a second acquisition unit, a controller, an authentication processing unit, and an update processing unit. When the first acquisition unit acquires identification information, and a combination for which the number of successes for the acquired identification information is greater than or equal to a predetermined number is present in combination information, the controller sets a threshold such that a false acceptance rate for erroneously authenticating a person other than a registered user becomes lower than when the combination is not present.

CONTROL FLOW PROTECTION BASED ON PHANTOM ADDRESSING

Disclosed are methods, systems, devices, media, circuits, and other implementations, including a method that includes generating for a code block of a process executing on a controller-based device one or more code block copies defined in a virtual address space of the controller-based device, with the code block of the process being stored in a particular segment of a physical address space of the controller-based device, and with the code block configured to separately map to each of the one or more of the code block copies in the virtual address space. The method further includes processing at least a portion of one of the one or more code block copies defined in the virtual address space when the corresponding code block of the process is to be processed.

PROVISIONING CONTROL APPARATUS, SYSTEM AND METHOD
20210336846 · 2021-10-28 ·

A provisioning control apparatus couples to a provisioning equipment server electrically connectable with an electronic device(s) for provisioning the electronic device(s) with a program code. The provisioning control apparatus has a communication interface which transmits the program code to the provisioning equipment server for provisioning the electronic device(s) with the program code and to receive an electronic provisioning token having provisioning control data. The provisioning control apparatus includes a processor that controls the transmission of the program code via the communication interface to the provisioning equipment server. The electronic provisioning token has time adjustment information for adjusting the clock, and the processor adjusts the time of the clock. A provisioning control system includes the provisioning control apparatus and a method involves provisioning the electronic device(s).

DETECTION OF LASER FAULT INJECTION ATTACKS ON CRYPTOGRAPHIC DEVICES
20210328761 · 2021-10-21 ·

Countermeasures against fault injection attacks of a cryptographic integrated circuit, and more specifically laser fault injection attacks are provided. The invention consists in generating sequences of bits belonging to a set of allowed sequences, and storing these sequences on a set of Flip-Flops. Then the sequences stored on the Flip-Flops are checked and, if they do not belong to the allowed sequence, this is the sign that a fault injection attack occurred and caused a bit flip in one of the flip-flops. An alarm signal is then generated.

Approaches for managing restrictions for middleware applications

Systems and methods are provided for determining an access request provided by an application that seeks to interact with one or more backend systems through a computing system. One or more predefined restrictions can be enforced on the application, the computing system, or the one or more backend systems.

Encrypted photographing method and system based on fingerprint recognition
20210288797 · 2021-09-16 ·

An encrypted photographing method based on fingerprint recognition, and a system thereof are disclosed. The method may include: when detecting starting an encrypted photographing mode, obtaining an unlocking fingerprint for starting the encrypted photographing mode; when detecting a photographing instruction, generating an original photo and generating a key pair based on the unlocking fingerprint wherein the key pair may include an encryption key and a decryption key; encrypting the original photo according to the encryption key so as to generate an encrypted photo; and generating a corresponding system directory according to the decryption key, and saving the encrypted photo to the generated system directory. The present disclosure improves the security of a photo, and avoids leaking the content of an encrypted photo.

Methods, systems, apparatus and articles of manufacture to obfuscate metered data using a mask

A technique allows a smart meter to receive a mask. The smart meter may receive the mask from a utility company or an escrow service. The smart meter may apply the mask to original metered data on a continuous schedule, on a periodic schedule, or on a determined schedule, or on a randomized schedule to conceal the original metered data. The smart meter may apply different masks at different times. The smart meter transmits the concealed metered data as augmented metered data remotely to an electric utility via a communication network.

Method For Protecting A Payment Terminal

The present invention relates to a method for protecting a payment terminal, comprising: —a data encryption key; —a monitoring module comprising a means for measuring a physical parameter; —a counter unit of a microcontroller, the counter unit being slaved to a clock for incrementing a counter value; said method comprising the steps of: —measuring a physical parameter by the means for measuring the monitoring device; comparing the measured value with a predetermined threshold value corresponding to a physical attack; —resetting the counter unit; and if one of the following conditions is met: ○at least one physical parameter value is indicative of a physical attack on said terminal; ○the counter value is greater than a predefined threshold value; the method also comprises a step of removing access to the encryption key.