Patent classifications
H04L2463/062
SYSTEM AND METHOD TO SECURELY BROADCAST A MESSAGE TO ACCELERATORS USING VIRTUAL CHANNELS
Embodiments disclosed systems and methods to broadcast a message to one or more virtual data processing (DP) accelerators. In response to receiving a broadcast instruction from an application, the broadcast instruction designating one or more virtual DP accelerators of a plurality of virtual DP accelerators to receive a broadcast message, the system encrypts the broadcast message based on a broadcast session key for a broadcast communication session. The system determines one or more public keys of one or more security key pairs each associated with one of the designated virtual DP accelerators. The system encrypts the broadcast session key based on the determined one or more public keys. The system broadcasts the encrypted broadcast message, and the one or more encrypted broadcast session keys to adjacent virtual DP accelerators for propagation.
Thwarting one-time password theft
Thwarting one-time password (OTP) theft. In one embodiment, a method may include receiving, at a messaging application executing on the mobile device, a text message from a website that includes an original OTP. The method may also include encrypting, by the messaging application, the original OTP included in the text message to thwart theft of the original OTP from the text message.
DATA SHARING BETWEEN TRUSTED EXECUTION ENVIRONMENTS
Disclosed is a method of sharing data among multiple processing devices incorporating a trusted execution environment. The method may include receiving a data encryption key (DEK) from a management software communicating with multiple processing devices; encrypting the received DEK using a sealing key accessible within the trusted execution environment; storing the encrypted DEK within the storage of the processing device; decrypting, using the sealing key, the stored DEK in response to a data sharing request; encrypting the data to be protected and shared using the decrypted DEK; and storing the encrypted data in a shared storage apparatus.
SYSTEM AND METHOD FOR AUTHORIZING SECONDARY USERS TO ACCESS A PRIMARY USER'S ACCOUNT USING BLOCKCHAIN
Described herein is a system for authorizing secondary users to access a primary user's account using blockchain. The primary user can transmit a request for providing access to a primary user's account to a secondary user. In response to receiving the request, the system may generate a new block in the blockchain ledger specifying the permissions of the secondary user. Furthermore, the new block may include the permission details. This way, when the secondary user attempts to access the primary user's account, the system may verify the secondary user based on the permission details in the last block in the sequence of blocks. Each new block may include the permission details.
SYSTEM AND METHOD FOR PROVIDING A SEARCH ENTITY-BASED PAYMENT PROCESS
Disclosed is a method including presenting an input field on a user interface of a generalized search entity, wherein the generalized search entity processes data using a generalized search engine that indexes and searches both merchant sites and non-merchant sites, receiving user input in the input field and determining whether the user input corresponds to a product in a product database to yield a determination. When the determination indicates that the user input does correspond to the product in the product database, the method includes presenting a purchase-related search result, wherein the purchase-related search result is configured such that when a user interacts with the purchase-related search result and confirms a purchase associated with the purchase-related search result, the generalized search entity initiates a purchasing process for the product.
SYSTEM AND METHOD TO SECURELY BROADCAST A MESSAGE TO ACCELERATORS
According to one embodiment, a broadcast request is received from a host that hosts an application that initiated a broadcast message to be broadcast to one or more DP accelerators of a plurality of DP accelerators coupled to the host, where the broadcast request includes one or more DP accelerator identifiers (IDs) identifying the one or more DP accelerators. A broadcast session key for a broadcast communication session to broadcast the broadcast message is received from the host. For each of the one or more DP accelerator IDs, a public key of a security key pair corresponding to the DP accelerator ID is identified. The broadcast message is encrypted using the broadcast session key. The broadcast session key is encrypted using the public key. The encrypted broadcast message and the encrypted broadcast session key are transmitted to a DP accelerator identified by the DP accelerator ID.
APPARATUS FOR CONTROLLING A VEHICLE USING LOW POWER COMMUNICATION AND METHOD THEREOF
An apparatus for controlling a vehicle and a method thereof are provided. The apparatus includes a connectivity control unit (CCU) to internetwork with a server through a wireless network to provide a connected car service and an integrated body unit (IBU) to perform low power communication with another vehicle to control the CCU.
System, Method, and Computer Program Product for Managing Computational Cluster Access to Multiple Domains
Provided are computer-implemented methods for managing computational cluster access to multiple domains. The method includes generating, using a ticket-based computer network authentication protocol, a primary set of keys based on remote system access credentials for a primary domain and a secondary set of keys based on remote system access credentials for a secondary domain. The method includes merging the primary set of keys with the secondary set of keys to form a merged set of keys. The method further includes activating a system daemon to provide access to the primary domain and the secondary domain by a computational cluster based on the merged set of keys. The method further includes connecting, using the ticket-based computer network authentication protocol via the system daemon, a remote computing device of the primary domain and a remote computing device of the secondary domain to the computational cluster.
USER INTERFACE FOR ACCESS CONTROL ENABLED NETWORK SHARING
Technology for a user interface that supports an access control mechanism for network sharing. An example method involves providing a user interface comprising media items and media availability indicators, wherein a media availability indicator indicates one or more states of a media item; updating the media availability indicator to represent that an encrypted version of the media item and a wrapped key have been received over a connection, wherein the wrapped key was encrypted using a public key of a server; enabling the user interface to initiate the transmission of the wrapped key to the server, wherein the wrapped key comprises a cryptographic key for the encrypted version of the media item; receiving the cryptographic key that is unwrapped by the server using a private key of the server; and updating the media availability indicator of the user interface to represent the media item is available to be experienced.
Access control technology for peer-to-peer sharing
Implementations disclose an access control mechanism for peer-to-peer sharing technology. A method includes receiving, by a processing device of a first user device, an encrypted media item and a wrapped key from a second user device, wherein the wrapped key comprises content masked from the first user device; transmitting, by the first user device, the wrapped key and a request to a media server to determine whether the first user device is authorized to play the encrypted media item; receiving, from the media server, a response indicating the first user device is authorized to play the encrypted media item, the response comprising a cryptographic key derived from the wrapped key; and decrypting the encrypted media item using the cryptographic key.