H04L2463/121

METHOD AND SYSTEM TO DYNAMICALLY OBFUSCATE A WEB SERVICES INTERFACE
20200204583 · 2020-06-25 ·

The present application relates to the handling of what are generally referred to as denial of service (DoS) attacks. More specifically, the present application relates to a method and system for protecting one or more on-line Web service application servers from DoS and/or distributed DoS (DDoS) attacks.

TIME-DEPENDENT BLOCKCHAIN-BASED SELF-VERIFICATION USER AUTHENTICATION METHOD
20200204567 · 2020-06-25 ·

A time-dependent blockchain based self-verification user authentication method of the present disclosure includes, a reservation registration step for registering reservation time which is obtained by adding a set time to an input time, and an authentication subject to a blockchain which is distributed and stored in a plurality of nodes; a reservation notification step for notifying a notification group, which is associated with the authentication subject, of a reservation registered in the reservation registration step; a verification step for verifying authentication request time and the reservation time, which has been registered to the blockchain, when there is an authentication request with respect to the authentication subject; and a step for granting authentication when the authentication request time is within a valid range of the reservation time in the verification step.

Systems data validation

A network connection between a server group of a data intake and query system and each of one or more source network nodes is established. The server group includes an indexer server and a model management server. Source data at the server group is received from at least one of the one or more source network nodes. A model management server detects data constraints for a security model. The data constraints include a data element used by the security model and an availability requirement set. Using the timestamped entries, the data constraints are validated to obtain a validation result. The model management server determines a data availability assessment of the security model based on the validation result. The data availability assessment of the security model is stored in computer storage.

ON-VEHICLE COMMUNICATION DEVICE, ON-VEHICLE COMMUNICATION SYSTEM, SYNCHRONIZATION PROCESSING METHOD, AND RECORDING MEDIUM

The on-vehicle communication device is an on-vehicle communication device to be mounted on a vehicle and is provided with: a storage unit configured to store a first encryption time that is a time required for encryption of data in another on-vehicle communication device, and a first decryption time that is a time required for decryption of data in the on-vehicle communication device itself; and a synchronization processing unit configured to perform synchronization processing of carrying out time synchronization of the on-vehicle communication device itself with the another on-vehicle communication device on the basis of the first encryption time and the first decryption time.

TIME STAMPING OF DATA IN AN OFFLINE NODE

A method for validating timestamps issued by a first node in a communications network, when the first node goes offline. A platform detects disconnection of the first node and triggers a selected second node of the communications network to acquire counter information. When the first node reconnects to the communications network, counter information is retrieved from the second node and timestamped data is received from the first node. The local timestamp information and the counter information are compared to validate or not the local timestamp information. If the local timestamp information is validated, the data can be added to a distributed database such as a Blockchain.

TIMESTAMP-BASED AUTHENTICATION WITH REDIRECTION
20200195639 · 2020-06-18 ·

Techniques for computer security, and more specifically timestamp-abased authentication, are described. Some implementations provide an authentication method that utilizes an authentication process that is shared as a secret between a client and an authenticator. The process provides as output a number that is based on a timestamp. To authenticate the client when it attempts to access a target service, both the client and authenticator execute the authentication process using locally generated timestamps. If the outputs of the authentication process match, the client is authenticated. If not, subsequent network communications from the client are either denied or redirected to an alternative computing system that masquerades as the target service.

TIMESTAMP-BASED AUTHENTICATION
20200195658 · 2020-06-18 ·

Techniques for computer security, and more specifically timestamp-abased authentication, are described. Some implementations provide an authentication method that utilizes an authentication process that is shared as a secret between a first and second computing system. The process provides as output a number that is based on a timestamp. The first computing system executes the authentication process using a timestamp obtained from its clock. The resulting number is transmitted to the second computing system, possibly along with other authentication data, such as a username and/or password. In response, the second computing system executes the authentication process using a timestamp obtained from its clock. If the numbers generated by the first and second computing systems match, the first computing system is authenticated.

Wearable misplacement

An access control system is described in which a primary credential device has a master key and a secondary credential device has a key derived from the master key. Both the master key and the derivative key are required to gain access to the resource protected by the access control system. If the secondary credential device is lost, misplaced, or stolen, it cannot be used to gain illicit access to the protected resource, and it can be easily replaced by providing a different secondary credential device with another key derived from the master key.

Obtaining and using time information on a secure element (SE)
10680833 · 2020-06-09 · ·

A secure element (SE) with a notion of time useful for checking secure items is disclosed herein. Use of Public Key Infrastructure (PKI) with secure elements is improved by verifying secure items used by an SE. Methods of obtaining time information by the SE include push, pull, opportunistic, local interface, and multi-check methods. The SE uses the time information to evaluate arriving and stored public key certificates and to discard those which fail the evaluation. The SE, in some embodiments, uses the time information in cooperation with certificate revocation lists (CRLs) and/or online certificate status protocol (OCSP) stapling procedures. A multi-check architecture is provided herein by which more than entity is involved in checking a time value before the time value reaches the SE. The multi-check architecture uses both PKI and blockchain techniques.

Method and system for classifying network requests
10681052 · 2020-06-09 · ·

Methods, systems and programming for classifying network requests. In one example, a network request for content to be fetched by a content server is received from a client device. At least one non-internet protocol (IP) key is obtained based on the network request. Whether to deny or allow the network request is determined based on the at least one non-IP key.