H04L63/04

SUPPORTING DATA PROCESSING TRANSACTIONS USING MACHINE TO MACHINE (M2M) DATA TRANSFER

A system is provided for implementing a data processing transaction for a home processor located within a home region. The system is configured to receive a query from a user device of a user, search a list of partner processors located within a foreign region based on the query and transmit to the user device information relating to one or more partner processors determined as a result of the search. The system receives a request to authenticate the data processing transaction at a selected partner processor, verifies an identity of the user based on the request and transmits an indication of successful authentication. The system transmits at least a portion of data relating to a registration of the user at the home processor to the selected partner processor, wherein the data processing transaction is processed by the partner processor based on the transferred data.

PLAGIARISM DETECTION FROM ENCRYPTED DOCUMENTS

An example operation may include one or more of receiving a request to verify a first encrypted document from a computing device, retrieving a second set of encrypted tokens of a second encrypted document from a blockchain, determining a similarity value of the first encrypted document with respect to the second encrypted document based on a first set of encrypted tokens in the first encrypted document and the second set of encrypted tokens in the second encrypted document, and outputting the determined similarity value to the computing device in response to the request.

Secured multi-payload antennas operators operations

A disclosed method for secured multi-payload antennas operators operations comprises generating, by an antenna operations center (AOC), AOC commands using an antenna location pointing request for each of at least one antenna associated with each of at least one customer. The method further comprises transmitting, by a satellite operation center (SOC), the AOC commands and SOC commands to a vehicle via a ground antenna, where the SOC commands are related to at least one antenna associated with a host. Also, the method comprises generating customer antenna gimballing commands by using the AOC commands, and generating host antenna gimballing commands by using the SOC commands. Further, the method comprises gimballing respectively each of the antenna(s) associated with each of the customer(s) by using the customer antenna gimballing commands, and gimballing respectively each of the antenna(s) associated with the host by using the host antenna gimballing commands.

Peer-based policy definitions

Described is a system for a Policy Derivation Engine (PDE) that, when accessed by one or more organizations, assists such organizations in updating and managing data protection policies based on external policy updates from one or more other organizations that share the same organizational peer group. The system receives a policy request from a first computing system associated with a first organization. The system computes a list of peer organizations of the first organization. The system builds policy update data based on respective policy data received from one or more peer organizations and transmits at least a portion of policy update data to the first computing system associated with the first organization.

Distributed private ledger systems and methods
11521185 · 2022-12-06 · ·

A distributed private ledger function of a server of a first consortium member receives data representing an alias for one of its customers from the customer and also receives data that represents an alias for a customer of a second member replicated by a distributed private ledger function of a server of the second member to all members of the consortium. Thereafter, the distributed private ledger function of the first member's server identifies a recipient account of the second member's customer based on an account pointer associated with the alias of the second member's customer and initiates a transfer of funds from a source account of the first member's customer corresponding to an account pointer associated with the alias for the first member's customer to the identified recipient account of the second member's customer.

SELECTING A VPN CONNECTION USING NEGOTIATED CRYPTOGRAPHIC ALGORITHMS TO IMPROVE THROUGHPUT

The techniques described herein enable a virtual private network (VPN) gateway to select a VPN connection, from multiple VPN connections established between a network VPN gateway and a remote VPN gateway, based on performance factors such as throughput. A system may measure throughput in megabytes per second (Mbps). More specifically, a VPN gateway (e.g., a remote VPN gateway or a network VPN gateway) can configure a routing preference that selects a VPN connection that is more performant based on a cryptographic algorithm that is used for the VPN connection. The VPN gateway can update the routing preference to select an alternative VPN connection when the performance of the VPN connection suffers.

CREDENTIAL BOOTSTRAPPING
20220385483 · 2022-12-01 ·

A device can establish operational credentials for enabling the device to provide an attestation of the device's identity to another party, by performing a method comprising: obtaining bootstrap credentials from a hardware secure element or a trusted execution environment (TEE) of the device; using the bootstrap credentials to establish a secure session with an enrolment server; and via the secure session, establishing the operational credentials with the enrolment server.

Systems and methods for managing the processing of customer information within a global enterprise
11514187 · 2022-11-29 · ·

A method for managing customer information pertaining to at least one application associated with a provider. The method includes obtaining initial application information pertaining to the at least one application. The initial application information includes a location of processing of the customer information by the at least one application. The method further includes determining whether additional application information is required based on the location of processing. The method further includes, upon determining that the additional application information is required, obtaining the additional application information based at least in part on the location of processing. The method further includes determining a risk level associated with the at least one application based on the initial application information and the additional application information.

Method For Applying Local Volume File System Policies(encryption, compression and etc) on Cloud(HTTP(S) Server) Files
20220374392 · 2022-11-24 ·

The user can apply the local volume file system policies like encryption/decryption, file, backup, antivirus, file compression/decompression, file monitoring and etc to the cloud (HTTPS server) files:

The cloud (HTTPS server) files are not vulnerable to man in the middle attack when they are on the way to the cloud (HTTPS server) from the local computer and vice versa, since the files are secured by local volume file system policies (encryption/decryption) in the local computer before they are stored in the cloud (HTTPS server).

The user need not to rely on the cloud (HTTPS server) for the security of the cloud (HTTPS server) files, since the: files are secured by local volume file system policies (encryption/decryption) in the local computer before they are stored in the cloud (HTTPS Server).

Systems and methods for data distribution using a publication subscriber model with a federation of trusted data distribution networks

Federation of trusted data distribution systems is accomplished by treating an entire data distribution network as either a publisher or subscriber to a feed in another data distribution network. A first data feed is created in a first data feed management subsystem associated with a first data distribution network. A second data feed related to the first data feed is created in a second data feed management subsystem associated with a second data distribution network. A first data access policy is associated with the second data feed and a publisher for the second data feed is created in the second data distribution network. The identity and authentication of a second subscriber to the second data feed in the second data distribution network is managed by referencing the first data access policy.