H04L63/12

Verification and identification of a neural network
11715005 · 2023-08-01 · ·

The application relates to a method for verifying characteristic features of a neural network, comprising obtaining the neural network as well as an identifier assigned to the neural network, determining the characteristic features of the neural network, calculating a first hash code using a predetermined hash function from the characteristic features of the neural network, obtaining a second hash code assigned to the identifier from a secure database, as well as verifying the neural network by comparing the first hash code to the second hash code. The application furthermore comprises a computer software product which can be downloaded to the internal memory of a digital computer and which comprises software code sections with which the steps according to the method described here are carried out when the software is executed on a computer.

METHODS AND SYSTEMS FOR PROVIDING DATA FROM AN INTERNAL DATA PROCESSING SYSTEM OF AN INDUSTRIAL PLANT TO AN EXTERNAL DATA PROCESSING SYSTEM
20230022849 · 2023-01-26 · ·

Data are sent from an internal data processing system of an industrial plant to an external data processing system of the industrial plant by generating with an industrial edge device data packets from data related to an industrial machine, and generating therefrom signed data packets signed with a first digital signature. While the signed data packet are read, a user-defined data filter is applied, which lets either pass or rejects the signed data packets. The data packets that passed the user-defined data filter are then sent to the external data processing system.

Systems and methods for gated offer eligibility verification
11711203 · 2023-07-25 · ·

Systems and methods for determining consumer eligibility for a gated offer using verification data from a verification source, while reducing exposure of the verification data, are herein disclosed. In one example, a method for a verification source comprises, generating a seed hash from a pre-determined data specification, aggregating verification data based on one or more data fields indicated by the data specification to produce aggregated verification data, hashing the aggregated verification data using the seed hash to produce hashed verification data, receiving hashed customer data from a verification platform, receiving a comparison request from the verification platform, comparing the hashed customer data with the hashed verification data; and returning a result to the verification platform indicating if the hashed customer data matches the verification data.

STORAGE DEVICE AUTHENTICATION

Systems and methods authenticate storage devices. In one implementation, a computer-implemented method is provided for authenticating a storage device. According to the method, a manifest that identifies a destination is receive. A transfer station reads a digital signature from the storage device. The digital signature is validated and, based on the validation of the digital signature, a transfer of one or more files from the storage device via the transfer station is authorized to the destination identified in the manifest.

Protecting information using policies and encryption
11563735 · 2023-01-24 · ·

A technique and system protects documents at rest and in motion using declarative policies and encryption. Encryption in the system is provided transparently and can work in conjunction with policy enforcers installed at a system. A system can protect information or documents from: (i) insider theft; (ii) ensure confidentiality; and (iii) prevent data loss, while enabling collaboration both inside and outside of a company.

Identity authentication and verification
11704707 · 2023-07-18 ·

Methods, software, products and systems of an identity authentication and verification system which provide one or more users to verify by electronic and non-electronic means the identity of a person with whom a user is interacting.

Method and system for generating watermark on the basis of graphic, terminal, and medium

The invention provides a method and system for generating a watermark on the basis of graphic, a terminal, and a medium. The method includes acquiring a watermark image and at least one watermark unit image; acquiring watermark encryption information; determining the distribution information of the watermark unit images in the watermark image according to the watermark encryption information and a preset encryption model, the distribution information comprising imaging regions of the watermark unit images in the watermark image; and overlaying each watermark unit image into a corresponding imaging region in the watermark image to generate the watermark. The watermark encryption information has a one-to-one corresponding relationship with the distribution information of the watermark unit images in the watermark image, and the corresponding relationship can be defined by a user so that others cannot crack the watermark without knowing the encryption model, thereby improving the watermark cracking difficulty. Moreover, the method can generate the watermark according to the watermark image and the watermark unit images input by the user, and provide personalized customization of the watermark under the function of encryption to improve the user experience.

Threat detection and security for edge devices

Disclosed are various examples for threat detection and security for edge devices in communication with Internet-of-Things (IoT) devices. In one example, a baseline behavior profile for a gateway virtual machine is transmitted from a management service to a gateway security process executed in a gateway device. The management service receives an anomaly notification including an indication of an anomaly from the baseline behavior profile. The managements service generates a user interface that shows a description of the anomaly.

DATA VERIFICATION METHOD AND APPARATUS, COMPUTER DEVICE, AND COMPUTER READABLE STORAGE MEDIUM

A data verification method and apparatus, a computer device and a computer-readable storage medium are provided, and belong to the technical field of networks. The method includes the following steps: acquiring a data verification request; acquiring at least one set of first data from at least one data source; and verifying target data based on the at least one set of first data. According to the solution, by acquiring data having a production and life relationship with the target data, during data verification, the authenticity of the target data can be verified based on different dimensions and different production and life links.

ELECTRONIC DEVICE AND CONTROL METHOD THEREOF
20230012779 · 2023-01-19 ·

An electronic device is provided. The electronic device includes a communication interface, a memory for storing at least one instruction and storing a plurality of pieces of transaction information and a plurality of index values corresponding to the plurality of pieces of transaction information, and at least one processor configured to control the electronic device by being connected to the memory, wherein the at least one processor is further configured to execute the at least one instruction to, when a delete request including an index value corresponding to transaction information is received, compare the index value included in the delete request with the plurality of index values stored in the memory, delete transaction information corresponding to the index value included in the delete request from the memory, based on a result of the comparison, generate verification data corresponding to the interface to transmit the generated verification data to an external server included in a blockchain network.