Patent classifications
H04L2209/68
Device and method for comparing geometric files
The invention concerns a method of generating a digital signature of a geometric design represented by a geometric design file, the method involving generating, by a data processing device, the digital signature based on a single axis projection of the geometric design.
Time-based digital signature
Various embodiments relate to a method performed by a processor of a computing system. An example method includes receiving, by a computing system, an event. The event is associated with a digital signature in a first time-based message. The event signals a change to a property of the digital signature. The first time-based message includes a first trusted time stamp token from a timing authority. The first trusted time stamp token is generated using a first hash of digitally signed content, the digitally signed content generated by digitally signing content. The first time-based message is retrieved. A second hash of the first trusted time stamp token is generated. The second hash is transmitted to a timing authority. A second trusted time stamp token is received from the trusted timing authority in response to transmitting the second hash. A second time-based message is generated including the second trusted time stamp token.
Non-contact vehicle measurement system
A vehicle measurement station utilizing one or more displacement sensors disposed on each opposite side of an inspection region of a vehicle inspection lane to acquire displacement measurement data along associated measurement axes. At least a portion of the displacement measurement data is associated with the outermost wheel assemblies on an axle of a moving vehicle passing through the inspection region, and utilized to determine one or more vehicle characteristics, such as an axle total toe condition.
DEVICE AND METHOD FOR COMPARING GEOMETRIC FILES
The invention concerns a method of generating a digital signature of a geometric design represented by a geometric design file, the method involving generating, by a data processing device, the digital signature based on a single axis projection of the geometric design.
Selective enforcement of secure boot database entries in an information handling system
A method and an information handling system (IHS) for authenticating unified extensible firmware interface (UEFI) images in an IHS. The method includes receiving, by a processor of the IHS, a request to authenticate an image. The method also includes determining a type of the image and retrieving, from an entry within a UEFI signature database, a certificate utilized to sign the image. The method further includes determining a verification entry of a verification database of the HIS that corresponds to the entry of the UEFI signature database and identifying, from the verification entry, a particular type of image which the certificate may be used to authenticate. The method further includes determining whether the type of the image is the particular type. In response to determining the type of the image is the particular type, the method includes authenticating the image using the certificate.
RESOLVING CRYPTOGRAPHIC BOTTLENECKS FOR DISTRIBUTED MULTI-SIGNATURE CONTRACTS SHARED WITH CRYPTOGRAPHIC ACCELERATORS
Various embodiments are provided for managing cryptographic bottlenecks for distributed multi-signature blockchain contracts in a computing environment. One or more cryptographic bottlenecks of cryptographic requests at a cryptographic accelerator may be resolved by switching between a blockchain node cryptographic library and an accelerator cryptographic library upon a number of the cryptographic requests at the accelerator exceeding a defined threshold.
SYSTEM AND METHOD FOR BLOCKCHAIN COEXISTENCE
This disclosure relates generally to a system and method for blockchain coexistence. The blockchain coexistence between a blockchain ecosystem and a non-blockchain ecosystem is enabled by a gateway which establishes communication between any existing system and the blockchain ecosystem. Herein, the system is used to connect a blockchain solution with at least one existing application by utilizing the gateway framework. The gateway framework includes a gateway and information on a set of smart solutions. The gateway incudes a simple Java APIs (Application Programming Interfaces) on one side for the existing systems or the traditional applications to connect to the distributed ledger application programming interface (DLAPI) on the other side for connecting with the different block chain technologies.
Certificate-initiated access to services
A system includes terminating, at a reverse proxy, a mutual authentication handshake with a client computing system, the handshake including reception by the reverse proxy of a public key certificate associated with the client computing system, generating, by the reverse proxy, of an authentication token based on the public key certificate, receiving, at the reverse proxy, a request to access an application from the client computing system, forwarding the request and the authentication token from the reverse proxy to the application, receiving the request and the authentication token at the application, requesting, by the application, of an authorization token from an OAuth server based on the authentication token, receiving the authorization token from the OAuth server, storing the authorization token in association with a session identifier associated with the request received from the client computing system, and transmitting a response to the client computing system based on the authorization token and the request received from the client computing system.
MULTIPLE SIGNATURES IN METADATA FOR THE SAME DATA RECORD
Aspects include accessing, by a processing system, one or more data records and a metadata record. The metadata record includes a first digital signature associated with the one or more data records. One or more additional digital signatures associated with the one or more data records are generated, where the first digital signature and the one or more additional digital signatures are generated based on applying at least one different digital signature generation aspect with respect to the one or more data records. The one or more additional digital signatures are stored in the metadata record.
Secure electronic mail system
An e-mail system is disclosed that overcomes many deficiencies of, but is backward compatible with, existing e-mail systems. Embodiments of the system may include various features, including but not limited to: (1) secure transfer of e-mail messages, without the need for users to replace existing e-mail clients or to change e-mail addresses; (2) tracking of all actions performed in connection with an e-mail transmission; (3) the ability for a recipient to view information about an e-mail message, optionally including information about how other addressees have responded to it, before deciding whether to retrieve the e-mail message; (4) the aggregation of entire e-mail conversations into a single threaded view; (5) the ability to include both private and public messages in a single e-mail communication; (6) sender control over downstream actions performed in connection with an e-mail message; (7) flexible control over cryptographic methods used to encrypt emails messages for storage.