Patent classifications
H04L63/302
Mutually assured data sharing between distrusting parties in a network environment
An apparatus for sharing information between entities includes a processor and a trusted execution module executing on the processor. The trusted execution module is configured to receive first confidential information from a first client device associated with a first entity, seal the first confidential information within a trusted execution environment, receive second confidential information from a second client device associated with a second entity, seal the second confidential information within the trusted execution environment, and execute code within the trusted execution environment. The code is configured to compute a confidential result based upon the first confidential information and the second confidential information.
Method and system for secure digital object management
A system and method for secure data object management system comprising a cloud-based host environment and a local secure container. The cloud-based host environment creates a controlled digital object from a master digital object, and activates a tether associated with the controlled digital object. The tether includes an access permission, and optionally an operation permission (e.g., view, delete, store, edit, and copy) and a command (e.g., timeout, destroy). The controlled digital object is stored to an isolated storage of the secure container. The tether contents control access and manipulation of the controlled digital object. Certain conditions (e.g., timeout period reached, anomalous data access pattern detected), cause the controlled digital object to be destroyed and/or the tether to be inactivated. In accordance with applicable law, the cloud-based host environment utilizes the tether to detect, identify, and/or thwart unauthorized host environments in possession of the controlled digital object.
Systems and Methods for Acquiring Data with a Handheld Device
A method for covertly acquiring data. Information about an activity associated with a first hand-held device is monitored by initiating covert application software in a first configuration in which a log-in must first be input to the first device. When running the software in the first configuration, no image which overtly exhibits a self-evident association with the software can be viewed on the display to identify the software or indicate that the software is running on the client. Prior to initiating monitoring with the software, a feature having no self-evident association with the covert application software can be accessed on a touch screen display of the device to initiate the software.
THREAT IDENTIFICATION-BASED COLLECTION OF FORENSIC DATA FROM ENDPOINT DEVICES
Techniques and mechanisms are disclosed enabling efficient collection of forensic data from client devices, also referred to herein as endpoint devices, of a networked computer system. Embodiments described herein further enable correlating forensic data with other types of non-forensic data from other data sources. A network security application described herein further enables generating various dashboards, visualizations, and other interfaces for managing forensic data collection, and displaying information related to collected forensic data and information related to identified correlations between items of forensic data and other items of non-forensic data.
VERIFICATION METHOD AND APPARATUS
A method includes performing a flight suitability verification on an unmanned aerial vehicle (UAV) system, determining a handling measure of the UAV system according to a verification result, and controlling the UAV system to follow the handling measure to satisfy safety requirements and obtain safe operations of the UAV. The UAV system includes a UAV and a ground station. The flight suitability verification is performed on at least one of a plurality of verification items. The verification items includes an operator-independent setting of the UAV system and an operator-independent setting of data associated with safe operations.
VISIBILITY AND SCANNING OF A VARIETY OF ENTITIES
Systems, methods, and related technologies for entity visibility are described. In certain aspects, information associated with a type of entity is accessed and a network is scanned for a plurality of entities. One or more entities are selected from plurality of entities based on the type of entity. Properties associated with the one or more selected entities are accessed. The information associated with the one or more selected entities and the one or more properties associated with the selected one or more entities are stored.
Secure forum facilitator in controlled environment
An forum facilitator device is provided that allows for a controlled environment to provide a secure forum for residents to provide communications to other registered users of the secure forum. The communications are provided through posts made in the secure forum and through other types of communications from the inmate such as but not limited to emails and text messages. The forum facilitator device operates the secure forum and implements rules to control what is posted on the secure forum, who is able to access the secure forum, and what entities are allowed to view and interact with residents of the controlled environment.
Method, apparatus, and electronic device for blockchain-based recordkeeping
Provided is a method for blockchain-based recordkeeping and implementable by a terminal device. The method comprises: obtaining target data; computing a data digest of the target data, and extracting a key segment from the target data; signing, in a secure operation environment included in the terminal device, the data digest and/or the key segment based on a private key associated with the terminal device to generate a signature; and submitting to a blockchain the data digest, the key segment, and the signature, for one or more nodes in the blockchain to verify the signature based on a public key corresponding to the private key, and to record the data digest and the key segment in the blockchain in response to the signature being verified to be valid.
System to detect, assess and counter disinformation
A computer-readable medium for the identification, measurement, and combatting of the influence of large-scale creation and distribution of disinformation is herein disclosed. An embodiment of this invention is comprised of one or more repositories of data which involve online comments and articles and attributes derived from them, one or more technical targeting systems, a content analysis system, a cost and influence estimation system, a dialog system, a performance management system, a bot design and test system, a security system, a multimedia content generator, one or more machine learning components, a data collection mechanism, separate consumer and human operator applications, and a mechanism for the creation and management of bots across multiple channels.
System and method for acquiring data with a handheld device
A method for covertly acquiring data. Information about an activity associated with a first hand-held device is monitored by initiating covert application software in a first configuration in which a log-in must first be input to the first device. When running the software in the first configuration, no image which overtly exhibits a self-evident association with the software can be viewed on the display to identify the software or indicate that the software is running on the client. Prior to initiating monitoring with the software, a feature having no self-evident association with the covert application software can be accessed on a touch screen display of the device to initiate the software.