Patent classifications
H04L63/12
Distributed ledger systems for modular vehicles
The disclosure is directed to, among other things, distributed ledger systems for modular vehicles. The disclosure may involve receiving, at a first ledger associated with a first node, information regarding an interaction between the first node and a second node. The same transaction information may also be received at a second ledger associated with the second node, as well as ledgers associated with any other number of nodes. The first node, second node, and any other number of nodes may be modular vehicle components. Additionally, the first ledger, second ledger, and any other number of ledgers include a set of the same information. The first node, second node, and third node may be nodes on a distributed ledger network.
METHOD AND SYSTEM FOR DETECTING RESTRICTED CONTENT ASSOCIATED WITH RETRIEVED CONTENT
In embodiments of the present teachings, improved capabilities are described for detecting restricted content associated with retrieved content. The method and system may include receiving a client request for content, saving contextual information from the client request, and presenting the contextual information from the client request, and retrieved content, to a scanning facility. The scanning facility may use the contextual information and the retrieved content to initiate a remedial action on the client.
RESOURCE TRANSFER METHOD AND APPARATUS, STORAGE MEDIUM, AND COMPUTER DEVICE
A second blockchain system receives a first consensus message from a first blockchain system, the first blockchain system includes first nodes that provide services to at least a first account, and the second blockchain system includes second nodes that provide services to at least a second account. The first consensus message indicates a first plurality of the first nodes reaches a consensus for transferring a resource from the first account to the second account. The second blockchain system transfers the resource in the task to the second account. The transferring includes that a node in the second nodes adds the resource to the second account and generates a fourth block that records a completion of a transfer event. A second consensus message is transmitted from the second blockchain system to the first blockchain system in response to a second plurality of the second nodes completing the transfer event.
SYSTEMS AND METHODS FOR ENSURING CORRECT EXECUTION OF COMPUTER PROGRAM USING A MEDIATOR COMPUTER SYSTEM
In a distributed system, a first computer system may require computationally verifiable assurances of the authenticity and integrity of computations (e.g., performed as part of the execution of a program) performed by a second computer system. Methods described herein may be utilized to enforce and/or ensure the correct execution of a program. The first computer system may delegate execution of a program to a second computer system and a protocol may be employed to constrain the second computer system to perform a correct execution of the program. The protocol may include mitigation and correction routines that mitigate and/or correct the incorrect execution of a program. In various systems and methods described herein, the protocol may utilize a blockchain network such as a Bitcoin-based blockchain network.
KEY-VALUE MAP COMMITMENTS SYSTEM AND METHOD
A method includes a validation computer receiving an authorization request message comprising a user state and a user proof from a user device. The user state comprises first and second user state elements. The user proof comprises first, second, and third user proof elements. The validation computer computes a first verification value by multiplying the first user proof element raised to the power of the second user state element, and the second user proof element raised to the power of the first user state element. The computer computes a second verification value by raising the second user proof element to the power of the second user state element. The computer compares the first verification value to a first accumulated state element of an accumulated state. The compares the second verification value to a second accumulated state element. The validation computer authorizes the authorization request message based on the comparison steps.
MECHANISM FOR MULTI-FACTOR AUTHENTICATION BASED ON DATA
A request is received from a user at a client to access a file of a set of files backed up to a backup server. Upon verifying a password provided by the user, the client is issued another request for authentication. A first data structure is received responsive to the request. The first data structure is generated using identifiers corresponding to a set of files at the client of which at least some presumably have been backed up to the server. A second data structure is generated. The second data structure is generated using identifiers corresponding to the set of files backed up to the server. The first and second data structures are compared to assess a degree of similarity between the files at the client and the files backed up to the backup server. The user is denied access when the degree of similarity is below a threshold.
Secure request authentication for a threat protection service
A client application manages a resolver configuration and sends DNS requests to a threat protection service when a mobile device operating the client application is operating off-network. The client application detects network conditions and automatically configures an appropriate system-wide DNS resolution setting. DNS requests from the client identify the customer and the device to threat protection (TP) service resolvers without introducing a publicly-visible customer or device identifier. The TP system applies the correct policy to DNS requests coming from off-network clients. In particular, the TP resolver recognizes the customer for requests coming from such clients and applies the customer's policy. The resolver is also configured to log the customer and the device associated with requests from the TP off-net client. Request logs from the TP resolver are provided to a cloud security intelligence platform for threat intelligence analytics and customer visible reporting.
Real-time soft combining, CRC validation, and MIC validation of decrypted packets
The apparatus receives a first PDU and a first CRC that is based on the first PDU. The first PDU is encrypted based on a first nonce. The apparatus decrypts the first PDU to obtain a first payload and a first cipher stream. The apparatus soft combines the decrypted first payload with a decrypted set of payloads. The set of payloads have been encrypted based on at least one nonce different than the first nonce. The apparatus generates a second CRC based on the soft combined decrypted payloads and based on the first cipher stream. The apparatus determines whether the generated second CRC for the soft combined decrypted payloads passes a CRC check against the first CRC.
SECURING BORDER GATEWAY PROTOCOL ROUTE PROPAGATION AND UPDATING
Embodiments of the present invention provide systems, methods, and computer storage media directed to propagating and authenticating border gateway protocol route advertisements. A trusted authority device stores and distributes routing information for various autonomous systems. The trusted authority device also issues and maintains digital certificates that are each assigned to one of the autonomous systems. The digital certificate can be utilized by autonomous systems to verify the authenticity of routing information advertised by another autonomous system. Each autonomous system can employ a routing device that can generate a route advertisement based on routing information received from the trusted authority device. The route advertisement can include a digital signature, a digital certificate, and a time-to-live value, among other things, each of which can be utilized by routing devices of other autonomous systems to determine the authenticity and validity of received routing information.
Sharing encrypted documents within and outside an organization
A method and system of creating and managing encryption keys that facilitates sharing of encrypted content. The system may include an information management system with a key management server and a computing device having an encryption service module. The encryption service module detects operations at the computing device and encrypts a document with an encryption key created using user information and a secret.