H04L9/0643

Method for determining duplication of security vulnerability and analysis apparatus using same

A method for determining duplication of a vulnerability may include a vulnerability extraction step of extracting vulnerability uniform resource locator (URL) addresses including the vulnerability from an analysis target server; a hash generation step of generating the URL hash value corresponding to the extracted vulnerability from the vulnerability URL address; and a duplication determination step of determining, when the URL hash value is present in the first comparison table, that the vulnerability is duplicated and excluding the corresponding vulnerability from vulnerability information.

Distributed ledger systems and methods for importing, accessing, verifying, and comparing documents

Some implementations of the disclosure are directed to a method, comprising: retrieving, using a device associated with an entity, a document from a system of record; uploading the document for storage in an off-chain system accessible by entities having access to a distributed ledger of a distributed ledger network, the entities comprising the entity; hashing, using the device, one or more fields contained in the document to generate a hash representing a unique reference to the document; generating, using the device, a message comprising a plurality of fields contained in the document and the hash; digitally signing, by the device, using a private key associated with the entity, the message to endorse the hash and the fields contained in the document; and after digitally signing the message, transmitting, by the device, the message to the distributed ledger network to store the hash and the fields in the distributed ledger.

Method to opportunistically reduce the number of SSD IOs, and reduce the encryption payload, in an SSD based cache in a deduplication file system

Disclosed is a storage system comprising: receiving a first data segment and first metadata associated with the first data segment to be stored in the storage system; storing the first data segment and the first metadata in a persistent storage device of the storage system; compressing the first data segment using a predetermined compression algorithm to generate a first compressed data segment; and storing the first metadata and the first compressed data segment in a solid state drive (SSD) cache device of the storage system, including aligning the first metadata and the first compressed data segment to a page boundary of the SSD device to reduce a number of input and output (IO) operations required for accessing the first metadata and the first compressed data segment from the SSD cache device.

Systems and methods for managing a vehicle fleet based on compliance regulations
11568743 · 2023-01-31 · ·

Systems and methods are provided herein for managing a vehicle fleet based on compliance regulations, and, in some embodiments, involve blockchain or other distributed ledger technologies. Systems and methods for managing a vehicle fleet based on compliance regulations may include receiving a service request, wherein the service request is a request for a passenger ride or a request for a cargo transport, receiving first information for a first node, wherein the first information comprises a vehicle size, a vehicle weight, and/or a number of seats, receiving second information comprising a first threshold number of vehicle occupants and/or a first threshold vehicle occupant weight limit, determining that the first threshold number of vehicle occupants or the first threshold vehicle occupant weight limit are exceeded, and sending an indication that the first node has not accepted the service request.

Detection of phishing attacks using similarity analysis
11570211 · 2023-01-31 · ·

A computerized system and method to detect phishing cyber-attacks is described. The approach entails analyzing one or more displayable images of a webpage referenced by a URL to ascertain whether the one or more displayable images, and thus the webpage and potentially an email including the URL, are part of a phishing cyber-attack.

Distributed storage of state information and session recovery using state information

A method for storing session state data of a session between a system having a plurality of nodes and a client device includes delivering a service to the client device during a session identified or otherwise specified by a session identifier. The service is delivered by a first of the plurality of nodes in the system. During the session, at least a second node in the system is selected on which session state data associated with the session is to be saved. The second node is selected based on the session identifier such that another node in the system is able to locate the session state data when stored on the second node from the session identifier without contacting a centralized mechanism that specifies where session state data is stored. The session state data is saved to the second node that is selected.

Methods to protect neural network models
11568062 · 2023-01-31 · ·

A method and system is disclosed for protecting neural network models by segmenting partitions of the models into segments of pre-configured memory size, hashing the segmented models, and concatenating the hash segments. The concatenated hash segment may be further hashed, encrypted, and stored with the neural network models as an executable loadable file (ELF) in memories external to the neural network prior to the use of the models by the neural network. The models may include model weights of the inference layers and metadata. The model weights and the metadata may be hashed as separate hash segments and concatenated. Segmenting the models into segments of pre-configured memory size and hashing the segmented models offline prior to the operation of the neural network enables rapid validation of the models when the models are used in the inference layers during online operation of the neural network.

Apparatus for monitoring multicast group

An apparatus for monitoring a multicast group is provided. The apparatus includes a storage, a receiver and an operation processor. The storage is configured to store first data including a first authenticated message authenticated as being published by a publisher of the multicast group to n-th data including an n-th authenticated message authenticated as being published by the publisher where n is a natural number of 2 or more. The receiver is configured to receive status data including a first propagation message to be delivered to the multicast group. Further, the operation processor is configured to generate monitoring information including status information of the multicast group by using the status data and the first to n-th data.

Systems and methods for location enabled search and secure authentication
11716616 · 2023-08-01 · ·

A method of authentication in ride hailing situations may include directing, by a first computing device of a passenger, the passenger to point a camera of the first computing device toward a location of a second computing device of a driver located in a vehicle, receiving data from the camera, wherein the data comprises streaming image frames including vehicle information pertaining to a vehicle included in the streaming image frames, analyzing the data to obtain the vehicle information, and determining whether the vehicle in the streaming image frames corresponds to an expected vehicle for the driver, the determination based on the vehicle information and expected vehicle information.

Detecting and mitigating attacks using forged authentication objects within a domain
11570209 · 2023-01-31 · ·

A system for detecting and mitigating attacks using forged authentication objects within a domain is provided, comprising an authentication object inspector configured to observe a new authentication object generated by an identity provider, and retrieve the new authentication object; and a hashing engine configured to retrieve the new authentication object from the authentication object inspector, calculate a cryptographic hash for the new authentication object, and store the cryptographic hash for the new authentication object in a data store; wherein subsequent access requests accompanied by authentication objects are validated by comparing hashes for each authentication object to previous generated hashes.