Patent classifications
G06F21/6272
Information processing device for generating registration data in a peer-to-peer network
Provided is an information processing device including a registration data generation unit (112) that generates registration data that is registered in a P2P database (120) and that includes encrypted identification information generated through encryption using key information of a subject related to the registration data, the encrypted identification information being used to identify the subject and being different for each registration data.
SECURING CUSTOMER SENSITIVE INFORMATION ON PRIVATE CLOUD PLATFORMS
A method for securing customer sensitive information on private cloud platforms includes receiving, at an on-premises computing system, sensitive information of a user. A local key of the on-premises computing system was previously encrypted by a master key stored at an off-premises computing system. The method includes sending the encrypted local key to the off-premises computing system for decryption, and receiving the decrypted local key in response to sending the encrypted local key to the off-premises computing system. The decrypted local key is decrypted from the received encrypted local key. The method includes decrypting a secret key assigned to the user, encrypting the sensitive information using the decrypted secret key, and storing the encrypted sensitive information.
Data privacy and security in vehicles
A method includes utilizing a user computing device to remove privacy information. The user computing device may obtain a vehicle identification number associated with a target vehicle that has a target in-vehicle device from which privacy information of a user is to be removed. Using the vehicle identification number, the user computing device may obtain vehicle parameters associated with the target vehicle. The user computing device may obtain a privacy information removal file comprising an instruction set associated with removing privacy data from candidate in-vehicle devices, and may present the instruction set. The user computing device may obtain a user feedback experience. The user feedback experience may include a confirmation of removal of the privacy information from the at least one candidate in-vehicle device, user comments, a voice recording, or an image, captured by a camera of the user computing device, of the at least one candidate in-vehicle device.
SYSTEMS, METHODS, APPARATUSES AND COMPUTER PROGRAM PRODUCTS FOR EXECUTING DATA VERIFICATION OPERATIONS BETWEEN INDEPENDENT COMPUTING RESOURCES
Various embodiments are directed to apparatuses, methods, and computer program products for executing centralized data verification using supported data structures associated with one or more third-party system. In various embodiments, an apparatus is configured to retrieve from a verification system repository associated with a verification system a supported data structure associated with a data structure identifier from the verification system repository; based on the third-party system identifier associated with the data structure, provide a data structure inquiry request data packet to a third-party resource to request a verification data structure associated with the data structure identifier from the third-party resource; receive an unsupported verification data structure associated with the data structure identifier from the third-party resource in an unsupported format defined by the third-party resource; convert the unsupported verification data structure into a supported format in association with generating a supported verification data structure using one or more validation rules.
PROCESS FOR MANAGING THE RIGHTS AND ASSETS OF A USER ON A BLOCKCHAIN
The invention relates to a process for managing the rights and assets of a user in a block chain. The user accesses the rights and assets using a pair of private and public keys connected with a terminal. The process provides for the prior storage of the rights and assets of the user in a digital safe connected to the user. The process further allows the user to access his/her rights and assets, for collection of the public key, associating the public key with the user, storing and associating the public key with the safe of the user in order to allow authentication of the user by the digital safe using the public key.
Social account recovery
Systems and methods are provided for performing operations including: receiving, via a messaging application of a user device, a request to recover access to an account of a user of the messaging application; accessing a first object corresponding to a first key; receiving, from a first friend of the user on the messaging application, a second object corresponding to a first portion of a second key; receiving, from a second friend of the user on the messaging application, a third object corresponding to a second portion of the second key; deriving the second key based on the second and third objects; and recovering access to the account of the user based on the first key and the second key.
Adjusting Error Encoding Parameters for Writing Encoded Data Slices
A method includes writing sets of encoded data slices to storage units of a storage network in accordance with error encoding parameters, where for a set of encoded data slices, the error encoding parameters include an error coding number and a decode threshold number, the error coding number indicates a number of encoded data slices that results when a data segment is encoded using an error encoding function and the decode threshold number indicates a minimum number needed to recover the data segment. The method further includes monitoring processing of the writing the sets of encoded data slices to produce write processing performance information. When the write processing performance information compares unfavorably to a desired write performance range, the method further includes adjusting at least one of the error coding number and the decode threshold number to produce adjusted error encoding parameters for writing subsequent encoded data slices.
3D DATA SYSTEM, SERVER, AND METHODS OF HANDLING 3D DATA
A 3D data system includes: a storage means that stores a correspondence, for each of a plurality of 3D data sets, each including a data body representing 3D model, share restriction information describing restrictions on a scope for sharing the data body, the process restriction information describing restrictions on the processing of the 3D model, the correspondence being among the data identifier of the 3D data set, the user identifier of a user who is a subject in the data body included in the 3D data set, and a user identifier of another user who shares the 3D data set from the user; a request receiving means that receives a processing request including a user identifier from the service application; an authenticating means that authenticates the user who has made the request performs the processing; and a response transmitting means that transmits at least a part of the data body and at least a part of the processing limit information to the service application.
TWO-DIMENSIONALITY DETECTION METHOD FOR INDUSTRIAL CONTROL SYSTEM ATTACKS
A two-dimensionality detection method for industrial control system attacks: collecting data; transmitting the data to a PLC and an embedded attack detection system; uploading, by the PLC, received data to an SCADA system; transmitting, by the SCADA system, the data to the embedded attack detection system after classifying and counting the data; before starting detection, directly reading, by the embedded attack detection system, the data measured by sensors; refining data association relationships and probability distribution characteristics of the sensors of normal operation to complete storage of health data model; after starting detection, in first dimensionality, comparing the data collected directly by the sensors with statistical data of the SCADA system to judge the attacked condition of the SCADA system, and in second dimensionality, comparing the characteristics of the data collected directly by the sensors and counted online with the health data model to judge the attacked condition of the sensors.
Information processing apparatus for processing data using processing program based on agreement information on processing method for personal data. computer-readable recording medium recording control program for processing data using processing program based on agreement information on processing method for personal data, and control method for processing data using processing program based on agreement information on processing method for personal data
An information processing apparatus includes: a memory; and a processor coupled to the memory and configured to: receive personal data related to a personal data originator; receive agreement information on a processing method for the personal data agreed between the personal data originator and a personal data user who uses the personal data; process the personal data by the processing method defined in the agreement information; and attach a digital signature to processed data and output the processed data.