H04L2463/121

Managing information for model training using distributed blockchain ledger

Embodiments are directed to generating and training a distributed machine learning model using data received from a plurality of third parties using a distributed ledger system, such as a blockchain. As each third party submits data suitable for model training, the data submissions are recorded onto the distributed ledger. By traversing the ledger, the learning platform identifies what data has been submitted and by which parties, and trains a model using the submitted data. Each party is also able to remove their data from the learning platform, which is also reflected in the distributed ledger. The distributed ledger thus maintains a record of which parties submitted data, and which parties removed their data from the learning platform, allowing for different third parties to contribute data for model training, while retaining control over their submitted data by being able to remove their data from the learning platform.

PACKET PROCESSING METHOD AND APPARATUS
20230283588 · 2023-09-07 ·

A packet processing method and apparatus are provided. The method includes: on a forwarding path of an IPv6 packet, a key node (for example, a firewall) signs a packet, and a downstream apparatus of the key node verifies the signature, to determine whether the packet passes through the key node in a forwarding process. According to this application, the key node performs checking, to effectively prevent a packet which packet header is modified by attackers from bypassing the key node.

Token node locking with signed fingerprints offloaded to clients

A system and method for providing secure data to a client device having a token is disclosed. In one embodiment, the method comprises: (a) binding the token to the client device according to first token binding information comprising a first token identifier (ID), first client device fingerprint data, and a first timestamp, (b) receiving a request to provide secure data to the client device in a service, the request comprising the signed first token binding information and timestamp, (c) determining if the request to provide the secure data to the client device was received within an acceptable temporal range of the stored timestamp; and (d) providing the requested secure data according to the determination.

Electronic certification data structures for verifying resource integrity

Techniques for certifying a document and for securely transmitting access to the document across a blockchain network are disclosed. A document, which details results of a soft inquiry executed against a user's credit history, is accessed. A hash algorithm is applied to the document to certify it. The hash algorithm is based on a timestamp indicating when the document was created. Applying the hash algorithm also generates a portable identifier reflecting the document is certified at the time indicated by the timestamp. The portable identifier is added as a record to a blockchain. The record is transmitted to a second computer system using public and private keys.

Autonomous vehicle sensor security system

Example methods and systems are disclosed to provide autonomous vehicle sensor security. An example method may include generating, by a first autonomous vehicle, a first map instance of a physical environment using first environmental information generated by a first sensor of a first autonomous vehicle. A second map instance from at least one of a second autonomous vehicle located in the physical environment is received. The first map instance may be correlated with the second map instance. In response to a discrepancy between the first map instance and the second map instance, a secure sensor may be activated to generate a third map instance. In response to the third map instance verifying that the discrepancy accurately describes the physical environment, the first environmental information including the discrepancy is used to navigate the first autonomous vehicle.

UWB SYSTEM
20230138772 · 2023-05-04 · ·

According to an aspect of the present invention, there is provided an ultra-wideband (UWB) system comprising: a memory in which a UWB ranging factor definition program is embedded; and a processor which executes the program, wherein the processor predefines UWB ranging factors to define a nonce in consideration of a unique key characteristic of an individual device.

SHARING ACCESS TO DATA EXTERNALLY
20230135529 · 2023-05-04 · ·

A method including receiving, by a device, a sharing link to be utilized by the device to obtain access to encrypted content, the sharing link including a static portion and a dynamic portion; transmitting, by the device, a request to access the encrypted content, the request being routed based at least in part on the static portion and the request identifying the encrypted content in the dynamic portion; receiving, by the device, access to the encrypted content based at least in part on transmitting the request. Various other aspects are contemplated.

Methods, mediums, and systems for verifying devices in an encrypted messaging system

This application describes methods, mediums, and systems for verifying a device for use in a messaging system. Using the device verification procedures described, a messaging system can securely authorize new devices to send and receive encrypted messages on behalf of a user, preferably without the need to share a private encryption key between the users' different devices. The application describes several techniques that can be used to provide such a system, including distributing a computer-perceptible code that encodes encryption information between a secondary device and a primary device. This allows the information to be distributed without intervention by a server. Other techniques provide unique ways to build and reverify authorized device lists, distribute encryption keys in chat channels, ensure that lists of authorized devices are distributed in the correct order and remain valid for an appropriate amount of time, add new devices to an ongoing or new conversation, and more.

COMPREHENSIBLE THREAT DETECTION

Techniques for combining threat-related events associated with different modalities to provide a complete insight into cyber attack life cycles. The techniques may include receiving telemetry data associated with one or more modalities and detecting, based at least in part on the telemetry data, one or more abnormal events associated with security incidents. The one or more abnormal events may include at least a first abnormal event associated with a first modality and a second abnormal event associated with a second modality. The techniques may also include determining that an entity associated with the abnormal events is a same entity and, based at least in part on the entity comprising the same entity, determining that a correlation between the abnormal events is indicative of a security incident. Based at least in part on the correlation, an indication associated with the security incident may be output.

BIOMETRIC SENSOR ON PORTABLE DEVICE

A method and system for secure remote digital interactions through the use of biometric templates is disclosed. In one example, the method includes an interaction that prompts the use of obtaining a first biometric template and comparing it to a second biometric template to determine if they match. The match process is performed on a portable device.