Patent classifications
H04L9/088
Protecting user privacy in playback of user sessions
Methods, systems, and apparatus, including computer programs encoded on a computer storage medium, for protecting user privacy in the playback of user sessions are described. In one aspect, a method includes accessing, for a user session with one or more user interfaces, event data that includes interface data specifying a structure of the user interface(s), and, for each of one or more user interface elements for which content was presented by the user interface(s) during the user session, an encrypted content element including the content of the user interface element encrypted using a public key corresponding to a rule enabling recording of the content of the user interface element and data identifying the rule. Playback of the user session is generated including, for each of the interface element(s), decrypting the encrypted content element for the user interface element and presenting the decrypted content during the playback of the user session.
MAC TAG LIST GENERATING APPARATUS, MAC TAG LIST VERIFYING APPARATUS, MAC TAG LIST GENERATING METHOD, MAC TAG LIST VERIFYING METHOD AND PROGRAM RECORDING MEDIUM
Disclosed is a MAC tag list generating apparatus capable of efficiently performing message authentication through which information pertaining to a falsified position as well as existence of falsification can be obtained. This MAC tag list generating apparatus is provided with: a group test matrix generating means for generating a group test matrix W, which is a parameter of a combined group test, on the basis of a plurality of items obtained by dividing an obtained message M; and a MAC tag list generating means that, while sharing results obtained by applying a pseudo random function to the items forming each row of the generated group test matrix W, sums the results, and then applies the summed results to pseudo random permutation to generate a MAC tag list T, which is a MAC tag list pertaining to the message M.
Systems, methods and apparatus for geofence networks
Systems, methods and devices for location-based services are disclosed in the present invention. A multiplicity of network devices, a database, and a server platform in network-based communication. The database stores a space-network model binding IP addresses and physical locations. The server platform is operable to generate at least one geofence in the space-network model and specify entitlements for the location-based services within the at least one geofence. The at least one geofence and specific entitlement are stored to the database. The multiplicity of network devices is configured to learn the space-network model and the at least one geofence and perform tasks based on the entitlements specified for the location-based services within the at least one geofence.
APPARATUS FOR OBFUSCATING AND RESTORING PROGRAM EXECUTION CODE AND METHOD THEREOF
The present invention provides an apparatus for obfuscating and restoring a program execution code. The apparatus for restoring an obfuscated program execution code may include a memory loading a program execution code obfuscated so as not to be executed before restoration from a storage medium; a restoring unit, not allowing access by a third party who is not a user of the apparatus, restoring the obfuscated program execution code delivered from the memory and directly delivering it to a central processing unit (CPU); and a CPU executing the restored program execution code. Thus, since the execution code order which shows the same operation as the original program execution cannot be known even by a third party who achieved and analyzed a program execution code executed in a single equipment, it is not possible to analyze the algorithm, etc. through program execution code analysis, and it is not possible to execute the achieved execution code at a different equipment. Accordingly, intellectual property right can be protected.
SYSTEMS AND METHODS FOR ENABLING TRUSTED COMMUNICATIONS BETWEEN CONTROLLERS
Systems and methods are described that enable trusted communications between two entities. In one implementation, a controller of a vehicle may include one or more processors configured to receive data and a controller signature from a second controller of the vehicle. The controller signature may be generated based on at least a first portion of the data. The one or more processors may be further configured to transmit the data and the controller signature to a gateway of the vehicle and receive a gateway signature from the gateway. The gateway signature may be generated based on at least a second portion of the data and transmitted to the controller after the gateway verified the controller signature. In addition, the one or more processors may be configured to verify the gateway signature and process the data.
SYSTEMS AND METHODS FOR MITIGATING AND/OR PREVENTING DISTRIBUTED DENIAL-OF-SERVICE ATTACKS
Systems and methods are described that mitigates and/or prevents distributed denial-of-service (DDOS) attacks. In one implementation, a gateway include one or more processors configured to obtain network data from one or more entities associated with the gateway, provide the network data to a server, and obtain a set of entity identifiers from the server. The set of entity identifiers may be generated based on at least the network data. The one or more processors may be further configured to filter communications based on the set of entity identifiers.
Method and device for managing a pairing request of a first device with a second device
A method for managing a request to pair a first item of equipment with a second item of equipment is implemented by a device for managing a pairing request. The managing device is configured to communicate with the first item of equipment via an optical communication channel. The managing method includes: reception, via the optical communication channel, of a pairing request including data representative of the identity of the first item of equipment; and if the pairing request is authorized, transmission, via the optical communication channel, of a security key to the first item of equipment to be used during communications between the first item of equipment and the second item of equipment once the items of equipment have been paired.
System and Method for Internal Etching Surfaces of Transparent Materials with Information Pertaining to a Blockchain
In one embodiment, a system includes a tangible token comprising a transparent gemstone, wherein: the transparent gemstone is internally etched with information pertaining to a blockchain, and the information comprises at least a private key, a public key, and an address, and the information is represented as a quick response code. The system includes a computing device configured to execute instructions that cause the computing device to: read the information, and validate, via a network and the address, the public key and the private key are associated with at least one block on the blockchain.
SYSTEM AND METHOD FOR MANAGING TRANSPARENT DATA ENCRYPTION OF DATABASE
Disclosed is a system for managing transparent data encryption of a database. The system comprises an encrypted vault application and an application server. The encrypted vault application stores at least one encryption key for the database. The application server is configured to provide an authorization token to the encrypted vault application after unsealing of the encrypted vault application; receive an access token from the encrypted vault application, after authentication of the application server; provide the access token to the encrypted vault application to receive at least one encryption key therefrom; and communicate the at least one encryption key, via a key talker, to the database; and wherein the database comprises a key listener that listens for the at least one encryption key and provides the at least one encryption key to the database.
METHOD AND APPARATUS FOR SECURE PRIVATE KEY STORAGE ON IOT DEVICE
An apparatus is disclosed for storing a private key on an IoT device for encrypted communication with an external user device and includes a proximity-based communication interface, encryption circuitry and IoT functional circuitry. The encryption circuitry includes a memory having a dedicated memory location allocated for storage of encryption keys utilized in the encrypting/decrypting operations, an encryption engine for performing the encryption/decryption operation with at least one of the stored encryption keys in association with the operation of the IoT functional circuitry, an input/output interface for interfacing with the proximity-based communication interface to allow information to be exchanged with a user device in a dedicated private key transfer operation, an internal system interface for interfacing with the IoT functional circuitry for transfer of information therebetween, memory control circuitry for controlling storage of a received private key from the input/output interface for storage in the dedicated memory location in the memory, in a Write-only memory storage operation relative to the private key received from the input/output interface over the proximity-based communication interface, the memory control circuitry inhibiting any Read operation of the dedicated memory location in the memory through the input/output interface. The IoT functional circuitry includes a controller for controlling the operation of the input/output interface and the memory control circuitry in a private key transfer operation to interface with the external user device to control the encryption circuitry for transfer of a private key from the user device through the proximity-based communication interface for storage in the dedicated memory location in the memory, the controller interfacing with the encryption circuitry via the internal system interface, and operational circuitry for interfacing with the user device over a peer to peer communication link and encrypting/decrypting information therebetween with the encryption engine in the encryption circuitry.