Patent classifications
H04L63/123
METHOD AND SYSTEM FOR DATA EXCHANGE ON A NETWORK TO ENHANCE SECURITY MEASURES OF THE NETWORK, VEHICLE COMPRISING SUCH SYSTEM
A method for data exchange on a communication network, operating according to a protocol, and including a transmission bus, a first node and a second node. The first node carries out the steps of: constructing a first and a second data frame which transport first and second information data; calculating a first message authentication code as a function of the first and the second information data; constructing a third data frame which transports the first message authentication code; transmitting all of the data frames thus constructed. The second node carries out the steps of: receiving the first, the second and the third data frames; extracting the first and the second information data and the first message authentication code; calculating a second message authentication code as a function of the first and the second information data extracted; comparing the message authentication code extracted with the message authentication code calculated in order to verify the identity thereof.
Blockchain Implemented Data Hiding Solutions For Improvements In Secure Communication, Storage And Transmission Of Data
Embodiments of the disclosure provide blockchain-implemented methods and systems for secure data transfer and/or storage via the use of data hiding (e.g. steganography algorithms, watermarking etc). In accordance with one aspect, a data hiding algorithm is applied multiple times to a portion of secret data to embed it in a cover file. This constructs layers of hidden data, e.g. secret data hidden in an image that is then used as secret data in a further cover file and so on. Each layer can incorporate encryption and authentication techniques to further enhance security. The final layer or a compressed version is provided within a blockchain transaction. Additionally or alternatively, the secret data can be split into a plurality of shares. This can be achieved using a splitting scheme such as, for example Shamir's Secret Sharing Scheme. Different shares of the secret data can then be encrypted before being hidden within a cover file. Different cover files can hide different shares, preferably each share being provided on the blockchain in a different transaction. To access the secret data, all of the cover files need to be identified and accessed from the blockchain, the relevant steganography, compression and encryption technique(s) applied to each, and then the secret data is reconstructed.
SPECULATIVE RENDERING
Predictive rendering (also referred to herein as speculative rendering) is disclosed. The predictive rendering is performed by an endpoint browser in response to a user input made by a user. The predictive rendering is verified using a surrogate browser that is executed on a remote server. The verification can be performed asynchronously.
Methods for Securely Adding Data to a Blockchain Using Dynamic Time Quanta and Version Authentication
Devices can be configured to implement distributed ledgers capable of immutably recording ledger entries that have validated version identifiers. The devices can include network interfaces, memory and processors. Processors can be configured to obtain ledger entries including version identifiers and version authenticator values, determine software versions that correspond to version identifiers, determine that version identifiers are valid based on version authenticator values, obtain challenges using cryptographic systems, wherein challenges are based on ledger entries, and/or broadcast blocks that incorporate ledger entries to securely add blocks to distributed ledgers. Blocks can be capable of being validated by using cryptographic systems to obtain proofs based on challenges.
DATABASE SYSTEM PUBLIC TRUST LEDGER ARCHITECTURE
A request may be received to transfer from a first entity to a second entity a right related to a digital asset stored in an on-demand database system. The on-demand database system may provide computing services to a plurality of entities via the internet. A token associated with the digital asset may be identified. The token may being included in a smart contract recorded within a distributed trust ledger and may be owned by a first distributed trust ledger account. The smart contract may be executed within the distributed trust ledger to record a transfer of the token from the first distributed trust ledger account to a second distributed trust ledger account. The on-demand database system may be updated to include one or more database entries reflecting the recorded transfer.
PACKET AUTHENTICATION IN A VXLAN SYSTEM
Embodiments of the present disclosure relate to methods, systems, and computer program products for event management. In a method, a token is obtained at a first agent device that is included in a network system, the token is for authenticating a first packet that is transmitted in the network system, and the first packet is generated according to a first network format. A second packet is generated based on the first packet and the token according to a second network format. The second packet is transmitted to a second agent device that is included in the network system, here both of the first and second agent devices support the first and second network formats. With these embodiments, the packet may be authenticated in a more effective way.
On-board communication system, switching device, verification method, and verification program
An on-vehicle communication system includes: a plurality of function units; and one or a plurality of switch devices, each switch device being configured to perform a relay process of relaying communication data between the function units. When unauthorized communication by a function unit has been detected, the switch device performs a validation process of validating a function unit other than an unauthorized-communication function unit that is the function unit for which the unauthorized communication has been detected.
Network transmission path verification
A data packet transits through a series of network nodes (a series of intermediate hops) while being transmitted from a source node to a destination node. A network node (router, gateway, server, or any network device) that handles the data packet, adds new information to the file header of the data packet. The new header information identifies the previous and next network nodes in the transmission path. The network node further validates information provided by a previous node, and generates further new header information that attests as to the validity of the information provided by the previous node. The network node secures and signs the new information cryptographically, and adds the new information to the file header. If a malicious actor attempts to tamper with the data packet, or routing thereof, the secured header information renders such tampering discoverable, enabling performance of a responsive action.
Secure communication for remote devices
A security system that provides for secure communication from a remote system operating on an unsecure network without the need for encrypting the packets related to the communication. The packets for the communications are sent over the network in clear text, which are readable by any systems on the network, however, only the systems that are authorized are able to determine what packets are the correct packets and what packets are the imitation packets. Moreover, a remote secure network may be utilized such that any system operating on an unsecure network may send packets through the remote secure network in a randomized routing in order to aid in hiding the systems sending and receiving the packets and the relays through which the packets are being sent.
Invoking an automatic process in a web-based target system using a chat-bot
A method, apparatus and product for chat-based application interface for automation. Using a natural language interface, receiving user input. Based on the user input, determining an automation process of a computer program having a user interface (UI), to be executed. The automation process is executed by utilizing the UI to input data thereto or execute functionality thereof. Additionally or alternatively, a conversation to be implemented by a natural language interface may be defined. The conversation is configured to obtain from the user one or more values corresponding to one or more parameters. The conversation is associated with a parameterized automation process depending on the one or more parameters. The parameterized automation process is invoked automatically by a natural language interface and using one or more values provided by the user to the natural language interface for the one or more parameters.