Patent classifications
H04L2463/062
Providing Data Services During Migration
In an embodiment, a migration of a dataset from a source storage system to a target storage system is initiated. The target storage system provides data services for the dataset before completing migration of the dataset from the source storage system to the target storage system. The data services can include snapshotting, cloning, data reduction, virtual copy, and replication. In some cases, the data services are provided before any portion of the dataset is copied.
Systems and methods for crowd-storing encrypiion keys
The disclosed computer-implemented method for crowd-storing encryption keys may include (i) sending, from a client computing device and to a server, a recovery request, (ii) creating a first public-private key pair, (iii) receiving a plurality of encrypted shares of an encryption key from the server in response to the recovery request, where the encrypted shares are encrypted with a first public key of the first public-private key pair, and (iv) performing a security action including (A) decrypting the plurality of encrypted shares of the encryption key with a first private key of the first public-private key pair and (B) recovering the encryption key from the decrypted plurality of shares of the encryption key. Various other methods, systems, and computer-readable media are also disclosed.
In-vehicle network system
An in-vehicle network system includes one first node and a plurality of second nodes. The first node is configured to transmit predetermined data to the respective second nodes, and transmit verification data for verifying whether the predetermined data has been normally received by the second nodes to the second nodes when the predetermined data has been transmitted to the second node. Each of the second nodes is configured to receive the predetermined data transmitted from the first node, receive the verification data transmitted from the first node, verify whether the received predetermined data has been normally received based on the received predetermined data and the received verification data, and transmit a verification result to the first node.
Backups of file system instances of encrypted data objects
Example implementations relate to encrypting data objects. In an example, data objects of a file system instance contained by a security domain are encrypted using a Data Encryption Key that is specific to the security domain and is wrapped by a Key Encryption Key shared exclusively within a cluster. A backup of the file system instance is created on a backup node. The backup includes at least some of the encrypted data objects. The DEK is sent to the backup node. The backup node cannot decrypt the backup unless the backup node is a member of the cluster and has access to the KEK to unwrap the DEK.
RE-KEYING THE CONTENTS OF A STORAGE DEVICE
Periodically re-encrypting user data stored on a storage device, including: determining that data stored in a first location of a storage device is encrypted with a data encryption key that has been decommissioned; re-encrypting the data utilizing a current data encryption key; and writing the data that is encrypted utilizing the current data encryption key to a second location of the storage device.
SYSTEM AND METHOD FOR PROVIDING A SOCIAL MEDIA SHOPPING EXPERIENCE
Disclosed are a system and process of providing social networking purchasing processes. A method includes receiving, from a posting entity and at the social networking entity, a posting or a submission of a text, an image or a video. When the submission is associated with a product within a product catalog of the posting entity, the social networking entity presents in a newsfeed of users or otherwise on the social networking entity, the text, image or video with an associated option to buy. The option to buy might be presented through a messenger application or as the user browses the posting. When there is a correlation between the posting and the product catalog, and when the user makes a purchase of the product, the user is not transitioned away from the social networking entity. Initiating a payment process occurs within the social networking entity.
ACCESS SECURITY SYSTEM USING SECURITY CARD AND MOBILE TERMINAL, AND SECURITY METHOD FOR SAME
Disclosed are an access security system using a security card and a mobile terminal, and a security method for same. The present disclosure configures a mutual security function for storing an encrypted public key in a security card (E-card), and storing a private key, which can decrypt the encrypted public key, in a mobile terminal. Accordingly, a security function that is strengthened to the next level is achieved which: only allows secure access at an entrance by means of a mutual certification procedure through an NFC connection between the security card and the mobile terminal; increases the security efficiency of access management while preventing the security of a secure server from being neutralized by an information leak that has occurred due to the loss, theft, hacking, duplication, or the like of the security card; and in particular, fundamentally prevents abnormal connections by third parties to IoT equipment that can be connected to the secure server as a result of the neutralization of security.
TECHNIQUES FOR SECURE DOCUMENT MANAGEMENT AND VERIFICATION
The present innovative solution solves the problem of managing secure documents so that they can be verified, and protected from tampering and illegal printing. A legal document is converted to a secure document by embedding into the legal document one or more security codes that have been encrypted with a standard of proprietary cryptographic algorithm. The security codes are supplemented by a QR code associated with the archive location of each page of the secure document, and stored at a server or database. The security codes stored in the document and can be printed together with the document, as a form of watermark, using UV-sensitive ink or toner at a security printer. The security codes are encrypted and can be printed on varying locations in the secure document pages, which are defined in a geolocation template, separately transmitted in encrypted format.
Ultrasound assisted device activation
An onboarding server uses an ultrasound token to securely onboard a new device to an organizational structure. The onboarding server obtains a registration from the new device and provides the new device with an ultrasound token. The onboarding server also obtains a notification from a user device that detected the ultrasound token broadcast from the new device. The onboarding server determines a device identity for the new device and provides cryptographic information to the new device. The cryptographic information enables the new device to connect to an organizational structure with the device identity.
SYSTEM AND METHOD FOR PROVIDING A UNIVERSAL SHOPPING CART ACROSS MULTIPLE SEARCH PLATFORMS
Systems and methods are disclosed that provide for a linking of a product database across different search platforms and then managing payments by a generalized search entity such that users are not transitioned to a merchant site from advertisements or search results. A method includes establishing, at a generalized search entity, a link to a product database of a merchant, offering, by the generalized search entity and based on a correlation of search terms to the product database of the merchant, search results across at least a first search platform and a second search platform and receiving, from a user, a confirmation of a payment for a product associated with a search result presented on the first search platform by the generalized search entity. The generalized search entity processes the payment for the product without transitioning the user to a site operated by the merchant. A universal shopping cart can be used to pay once for a plurality of products selected from different merchants as managed by the generalized search entity.