Patent classifications
H04L2463/121
SHARED KEY GENERATION BASED ON DUAL CLOCKS
Techniques for computer security, and more specifically timestamp-based key generation techniques, are described. Some implementations provide a table of key generation processes that is shared as a secret between a first computing system and a second computing system, both of which have two clocks. The first clock is a real-time clock and the second clock is a variable-time clock. The variable time clocks are synchronized and run at the same rate, faster or slower than real time. Both computing systems use the same technique for selecting a key generation process from the table, such as based on a random number generator seeded with a timestamp obtained from their variable time clocks. Since the computing systems have synchronized variable-time clocks, they both select and use the same key generation process, thereby generating the same encryption key without the need to communicate the key from one system to another.
NEURAL NETWORK MODEL UPDATE METHOD AND DEVICE, AND COMPUTER STORAGE MEDIUM
Disclosed are a neural network model update method and device, and a computer storage medium. The method includes: randomly generating a preset number of sub-neural network models as nodes in a blockchain; using a ring signature to share a local data set in the blockchain, and uniformly dividing a data set in the blockchain to generate a training set and a test set; training each node through the training set to generate a trained model, packaging the trained model as a model transaction and sharing the model transaction in the blockchain; using the test set selected by voting to test the model transaction and generating a test result; when the test result is greater than a benchmark evaluation, taking the sub-neural network model corresponding to the test result as a valid vote; and voting a previous block corresponding to the valid vote, selecting a consistent block, and updating all nodes.
CONTEXT-AWARE INTRUSION DETECTION SYSTEM
Example methods and systems for context-aware intrusion detection are described. In one example, in response to determination that there is a matching intrusion detection signature based on packet flow information associated with a packet, a computer system may generate an intrusion detection alert that identifies the matching intrusion detection signature and the packet flow information. Further, the computer system may map the intrusion detection alert to contextual information, and generate a context-aware intrusion detection alert to trigger a context-aware remediation action based on at least the contextual information. The intrusion detection alert may be enhanced with context information associated with at least one of the following: the virtualized computing instance, a client device associated with the virtualized computing instance, and a user operating the client device.
Real-time detection of network attacks
An apparatus includes multiple ports, packet communication processing circuitry coupled to the ports, and a processor that is configured to receive, from the packet communication processing circuitry, metadata that is indicative of a temporal pattern of control messages communicated via one or more of the ports, and to identify a network attack by applying anomaly detection to the temporal pattern of the control messages.
SYSTEM AND METHOD FOR CERTIFICATE-LESS SECURITY MANAGEMENT OF INTERCONNECTED HYBRID RESOURCES
This disclosure relates to method and system for certificate-less security management of interconnected hybrid resources. The method includes selecting at least one hybrid resource from a plurality of hybrid resources in network to install pre-calculated security configuration. For each of the at least one hybrid resource, the method further includes receiving a One Time Password (OTP) valid for pre-configured time period, in response to an identity generation request for a hybrid resource; installing security data payload including the OTP and the pre-calculated security configuration, in the hybrid resource; receiving an identity issuance request from the hybrid resource through a secure channel upon installation of security data payload in the hybrid resource; assigning unique identity to the hybrid resource upon successful validation of the OTP received in identity issuance request; and generating, upon assignment, metadata corresponding to the hybrid resource for a Security Association Map (SAM) associated with the hybrid resource.
Image processing apparatus, authentication apparatus, and user authentication method of image processing apparatus
The present embodiments relate to an image processing apparatus and a user authentication method of the image processing apparatus. The image processing apparatus according to an embodiment of the disclosure includes: a first authentication unit configured to receive first authentication data from a user terminal, and to determine whether the first authentication data matches pre-stored first reference data to authenticate the user terminal; and a second authentication unit configured to generate, when additional authentication is set up, second reference data, requesting the user terminal to send second authentication data, to receive the second authentication data from the user terminal, and to determine whether the second authentication data matches the second reference data to authenticate the user terminal.
Detecting anomalous network behavior
Approaches provide for monitoring attempted network activity such as network port connections and corresponding payloads of network data obtained by a network device and, based on the attempted connections and/or payloads, identifying malicious network activity in real time. For example, network activity obtained from a plurality of network devices in a service provider environment can be monitored to attempt to detect compliance with appropriate standards and/or any of a variety of resource usage guidelines (e.g., network behavioral standards or other such rules, guidelines, or network behavior tests) based at least in part on network port connection activity with respect to at least one network device. If it is determined that network activity is not in compliance with the usage guidelines, or other such network behavior test, the system can take one or more remedial actions, which can include generating a notification identifying the malicious network activity.
METHODS, DEVICES, AND SYSTEMS FOR SECURE COMMUNICATIONS OVER A NETWORK
A system and a method for secure communications over a network, the method comprising: receiving a data packet from a first device, the data packet comprising an encrypted data part and a metadata part, the metadata part comprising a cleartext part and removable metadata, the removable metadata comprising a network access code that is authenticatable by means of a network access key; validating the data packet, wherein validating the data packet comprises authenticating the network access code using the network access key; removing the removable metadata from the data packet after validating the data packet, thereby altering the data packet; and transmitting the altered data packet to a second device. The system comprises a first, a second, and a third device. The third device may comprise a receiver and a transmitter, and a validator that comprises a processor and a memory.
ESTABLISHMENT OF BATTERY-FREE INSERT ACCESS TO SECURE NETWORK
A method is provided for establishing secure network communication for a wireless network module of a battery-free insert. The method includes establishing communication with a low security module of an access point of a secure network, wherein a timestamp is not used to establish the communication with the low security module, obtaining a timestamp from the low security module, discontinuing communication with the low security module, and sending a request to a high security module to establish communication with the high security module of the access point. The request includes the timestamp. Communication is established with the high security module using the timestamp for establishing high security communication with the secure network.
AGGREGATES INDEX
The disclosed technology addresses the need in the art for a content management system that can be highly flexible to the needs of its subjects. The present technology permits any object to be shared by providing a robust and flexible access control list mechanism. The present technology utilizes a data structure that is highly efficient that both minimizes the amount of information that needs to be written into any database, but also allows for fast reads and writes of information from authoritative tables that are a source of truth for the content management system, while allowing for maintenance of indexes containing more refined data that allow for efficient retrieval of certain information that would normally need to be calculated when it is needed.