G06F2221/2151

Massively parallel computing system for processing of values in a distributed ledger blockchain system
11609900 · 2023-03-21 ·

A computer that operates with a distributed ledger system, and stores a copy of a distributed ledger file that is stored by multiple different client computers. The distributed ledger file having plural values therein, and the distributed ledger file also having encryption values that verify the values in the distributed ledger file. The computer processes the values to verify at least some of the values in the distributed ledger file using the encryption values in a way that ascertains a cryptographic accuracy of the values, and to create a report indicating values that have been verified using the encryption values. The computer can use its GPU to process these values in parallel. The computer can also set new sequence numbers using a distributed system, for new values to be added to the distributed ledger.

SMART DATA PROTECTION

When a system receives sensitive data, it can request an encryption key from an encryption/decryption unit. A central processing unit (CPU) of the system can encrypt the sensitive data using the encryption key before writing the sensitive data to memory. Thus, the sensitive data is encrypted when written to memory.

SUPPORTING INVOCATIONS OF THE RDTSC (READ TIME-STAMP COUNTER) INSTRUCTION BY GUEST CODE WITHIN A SECURE HARDWARE ENCLAVE

Techniques for supporting invocations of the RDTSC (Read Time-Stamp Counter) instruction, or equivalents thereof, by guest program code running within a virtual machine (VM), including guest program code running within a secure hardware enclave of the VM, are provided. In one set of embodiments, a hypervisor can activate time virtualization heuristics for the VM, where the time virtualization heuristics cause accelerated delivery of system clock timer interrupts to a guest operating system (OS) of the VM. The hypervisor can further determine a scaling factor to be applied to timestamps generated by one or more physical CPUs, where the timestamps are generated in response to invocations of a CPU instruction made by guest program code running within the VM, and where the scaling factor is based on the activated time virtualization heuristics. The hypervisor can then program the scaling factor into the one or more physical CPUs.

SECURE EXECUTION OF SCRIPTS
20230130985 · 2023-04-27 ·

Method, systems, and computer-readable media for securely executing a script on a computer appliance are disclosed. A script payload is obtained from a requesting entity via an interface of the computer appliance, the script payload comprising the script and script security data. Multiple authentication factors for the script are obtained from the script security data, the multiple authentication factors comprising at least some nested authentication factors, wherein a first one of the authentication factors is encapsulated within a second one of the authentication factors. A first validation is performed to authenticate the script and the first authentication factor based on the second authentication factor and to generate a validated first authentication factor. A second validation is performed to authenticate the script based on the validated first authentication factor. Responsive to the script being authenticated by the first and second validations, the script is executed on the computer appliance.

Systems and methods for continuous user authentication

Disclosed herein are systems and methods for continuous user authentication during access of a digital service. In an exemplary aspect, a continuous authentication module may receive, at a computing device, initial authentication credentials of the user. The initial authentication credentials enable access to a service via the computing device. While the service is being accessed, the continuous authentication module may continuously monitor whether an unauthorized user has replaced the user in accessing the service by comparing usage attributes of the service with historic usage attributes associated with the user. In response to determining that the unauthorized user has replaced the user, the continuous authentication module may cease the access to the service via the computing device.

Method for machine learning of malicious code detecting model and method for detecting malicious code using the same

A method of training a malicious code detection model and a method of detecting a malicious code. The method includes acquiring application programming interface (API) call information of called functions from a result log of performing dynamic analysis of a malicious code, calculating time intervals between timestamps using the timestamps which indicate API call times extracted from the API call information, determining a feature value of the malicious code on the basis of the time intervals, and training the malicious code detection model using an API call sequence included in the API call information and the feature value.

Authenticated elevated access request

A device receives an access-key package. The access-key package comprises a signature. The device obtains a validation package. The validation package comprises a validation device ID and validation timestamp. The device validates the signature in the access-key package. The device also obtains an updated timestamp. The device then compares the validation timestamp to the updated timestamp.

Access control system for controlling access of a user to one or more operating functions of a technical installation

An access control system controls access of a user to one or more operating functions of a technical installation. The access control system includes a receiving device configured to read access authorization data from a mobile data medium and an access control device configured to receive and validate the access authorization data from the receiving device. The receiving device continuously adds a dynamic portion to the access authorization data to create dynamic access authorization data and sends the dynamic access authorization data to the access control device. The access control device, in response to the dynamic access authorization data corresponding to a defined expectation, generates a release signal for those operating functions for which the access authorization data is valid.

BUBBLE SORTING FOR SCHEDULING TASK EXECUTION IN COMPUTING SYSTEMS

One or more embodiments of the present disclosure relate to determining a first execution schedule for execution of a plurality of runnables, the plurality of runnables corresponding to a process executed using a plurality of compute engines. Additionally or alternatively, one or more embodiments may relate to modifying the first execution schedule to generate a second execution schedule. The modifying may include moving one or more runnables of the plurality of runnables to populate one or more gaps in the first execution schedule. The moving of the one or more runnables may be performed in view of one or more moving constraints.

Systems and methods for dynamic polychrome lattice image security

The invention includes a tool for the generation and usage of a dynamic polychrome lattice image for unique and secure authentication and verification purposes. The tool is multi-purposed and can be applied to a variety of use cases and may utilize multiple channels of communication between devices. The dynamic polychrome lattice image may be adjusted according to the display size and resolution of various user devices. System devices may scan the dynamic polychrome lattice image, and upon successful retrieval and decryption of the dynamic polychrome lattice image, the user may be authenticated and verified to access one or more programs or services.