H04L9/34

DETERMINATION OF A DATA TRANSMISSION SCHEDULE

A device for communication includes a processor and a transmitter. The processor is configured to determine a target quality of service (QoS). The processor is also configured to determine, based on the target QoS, a transmission schedule identifying one or more transmission time-blocks. The transmitter is configured to transmit data to at least one device during a transmission time-block of the one or more transmission time-blocks.

VARIABLE DATA PROTECTION
20220060316 · 2022-02-24 ·

Systems and methods of protecting data in a message for communication from a sender to a receiver, the sender and receiver sharing a secret including splitting the message into a number of ordered message blocks, the order being a proper order such that an aggregation of the blocks in the proper order constitutes the message; generating an encoded indication of a position of the block in the proper order of blocks, the encoding being reversible and based on at least a hash value for the block, a secret shared between the sender and the receiver, and a position of the block in the proper order; communicating the blocks and the encoded indications to the receiver, the blocks being communicated in an order different to the proper order so as to obfuscate the message, such that the blocks can be reassembled by the receiver in the proper order on the basis of the shared secret.

Smart compressor based on adaptive CPU/QAT scheduling method
11431480 · 2022-08-30 · ·

A method, apparatus, and system for assigning the execution of a cryptography and/or compression operation on a data segment to either a central processing unit (CPU) or a hardware cryptography/compression accelerator is disclosed. In particular, a data segment on which a cryptography and/or compression operation is to be executed is received. Status information relating to a CPU and a hardware cryptography/compression accelerator is determined. Whether the operation is to be executed on the CPU or on the hardware accelerator is determined based at least in part on the status information. In response to determining that the operation is to be executed on the CPU, the data segment is forwarded to the CPU for execution of the operation. On the other hand, in response to determining that the operation is to be executed on the hardware accelerator, the data segment is forwarded to the hardware accelerator for execution of the operation.

Smart compressor based on adaptive CPU/QAT scheduling method
11431480 · 2022-08-30 · ·

A method, apparatus, and system for assigning the execution of a cryptography and/or compression operation on a data segment to either a central processing unit (CPU) or a hardware cryptography/compression accelerator is disclosed. In particular, a data segment on which a cryptography and/or compression operation is to be executed is received. Status information relating to a CPU and a hardware cryptography/compression accelerator is determined. Whether the operation is to be executed on the CPU or on the hardware accelerator is determined based at least in part on the status information. In response to determining that the operation is to be executed on the CPU, the data segment is forwarded to the CPU for execution of the operation. On the other hand, in response to determining that the operation is to be executed on the hardware accelerator, the data segment is forwarded to the hardware accelerator for execution of the operation.

SYSTEMS AND METHODS FOR STORING AND SHARING TRANSACTIONAL DATA USING A DISTRIBUTED COMPUTING SYSTEMS
20170230189 · 2017-08-10 ·

A computer system that interfaces with a blockchain is provided. The computer system receives match data for a match between a first data transaction request that is associated with a first identifier and a second data transaction request that is associated with a second identifier. A first blockchain transaction is generated based on the match data and stored to a blockchain. At least one further blockchain transaction is generates that splits the match into two different transactions—one between the first identifier and an intermediary and the second between the intermediary. These are recorded to the blockchain via the further blockchain transactions.

SYSTEMS AND METHODS FOR STORING AND SHARING TRANSACTIONAL DATA USING A DISTRIBUTED COMPUTING SYSTEMS
20170230189 · 2017-08-10 ·

A computer system that interfaces with a blockchain is provided. The computer system receives match data for a match between a first data transaction request that is associated with a first identifier and a second data transaction request that is associated with a second identifier. A first blockchain transaction is generated based on the match data and stored to a blockchain. At least one further blockchain transaction is generates that splits the match into two different transactions—one between the first identifier and an intermediary and the second between the intermediary. These are recorded to the blockchain via the further blockchain transactions.

Apparatus and methods for authenticating cyber secure control system configurations using distributed ledgers

Control systems and methods for securely authenticating and validating a control system. The control system may include a plurality of dependent control nodes and master control nodes. Each dependent control node is communicatively coupled to one or more peripheral devices. Each control node maintains a unit level distributed ledger, where each unit level distributed ledger includes information from corresponding peripheral devices. Each control node may transmit a portion of the unit level distributed ledger to a master control node. Each master control node may maintain a system level distributed ledger that includes information from the corresponding unit level distributed ledgers. Each master node may transmit a portion of the system level distributed ledger to a central node that maintains a separate secure distributed ledger. The master node may authenticate the control system based on the received portion of the system level distributed ledgers and the secure distributed ledgers.

Generating a protected key for selective use

A protected key to be used by a select processor on behalf of an entity unauthorized to use the protected key is created. The creating includes obtaining a system mask and a system key. A clear key is wrapped with the system key to provide a wrapped key. The system mask is applied to the wrapped key to create the protected key.

Generating a protected key for selective use

A protected key to be used by a select processor on behalf of an entity unauthorized to use the protected key is created. The creating includes obtaining a system mask and a system key. A clear key is wrapped with the system key to provide a wrapped key. The system mask is applied to the wrapped key to create the protected key.

USER STATION FOR A SERIAL BUS SYSTEM, AND METHOD FOR TRANSFERRING DATA WITH MANIPULATION PROTECTION IN A SERIAL BUS SYSTEM
20210377075 · 2021-12-02 ·

A user station for a serial bus system and a method for transferring data with manipulation protection in a serial bus system. The user station includes a communication control device for creating messages which are to be transmitted serially via a bus line to at least one other user station of the bus system, and/or for reading the messages which have been received serially from the bus line. The communication control device is designed to use a predetermined communication rule for creating and/or reading messages, and the communication control device, for creating and/or reading messages, is designed to use at least one rule for creating and/or reading the messages, which is different from the predetermined communication rule, when a predetermined trigger occurs.