Patent classifications
H04L9/0872
Contaminant inhibition pathway control system
A system and method for contaminant control, often infection control, with multiple time and space domains that integrate active and passive infection control devices and processes that preferably feature infection control active additives with controllable dis-passivation to limit post-consumption environmental impact. Additionally, the system executes the infection control devices and process transactions by controlling the dispatch of infection control tasks centered around a potential infection control incidence and/or cross-contamination locations from assets or personnel having probabilistic infection rates to increase compliance of infection control preventative measures.
Authenticating Individuals Based on Game Decisions and Behaviors
A computer that performs authentication is described. During operation, the computer may receive an authentication request associated with an individual playing a video game. In response to the authentication request, the computer may obtain game information associated with current play of the video game by the individual and second game information associated with one or more prior instances of the individual playing the video game. Then, the computer may determine the authentication of the individual based at least in part on the game information and the second game information. Next, the computer may selectively allow the individual to continue to play the video game based at least in part on the authentication.
Managing security in isolated network environments
Security can be provided for data stored using resources that are deployed in an environment managed by a third party. Physical and logical detection mechanisms can be used to monitor various security aspects, and the resulting security data can be used to identify potential threats to these resources. In some embodiments, suspicious activity can cause resources such as data servers to be automatically and remotely rebooted such that keys stored in volatile memory on those data servers will be lost from those servers, such that an attacker will be unable to decrypt data stored on those servers. Once a determination of safety is made, the keys can be provided to the respective data servers such that data operations can resume.
Storing time-sensitive secrets in a blockchain network
A method for storing time-sensitive secrets in a network is provided. The method includes receiving a first encryption key from multiple encryption keys, the multiple encryption keys associated with a first time window and accessing a data packet encoded according to the encryption keys. The method also includes writing a decrypted data packet to a block in a blockchain when the first encryption key matches a first time-sensitive value, and writing the decrypted data packet to the block in the blockchain when a second encryption key, received from the content provider, matches a second time-sensitive value after the first time-sensitive value has lapsed, wherein the first time-sensitive value and the second time-sensitive value are a non-overlapping time sequence in the first time window. A system and a non-transitory, computer-readable medium storing instructions to perform the above method are also provided.
QUANTUM KEY DISTRIBUTION SYSTEM AND METHOD FOR SECURELY DISTRIBUTING QUANTUM KEYS IN A NETWORK
A system and method for securely distributing quantum keys in a network are disclosed. The method includes receiving request for generating pair of quantum keys between source quantum node and target quantum node. Further, the method includes generating first pair of quantum keys based on the request. The method includes transmitting the first pair of quantum keys to the intermediate quantum node using a first quantum link. The method further includes generating intermediate pair of quantum key based on events detected at the intermediate quantum node. The method further includes interleaving the intermediate pair of quantum key with the first pair of quantum keys. Also, the method includes generating a second pair of quantum keys comprising interleaved intermediate pair of quantum key and first pair of quantum keys. Further, the method includes encoding and transmitting the second pair of quantum keys to target quantum node using second quantum link.
SYSTEM AND METHOD FOR MAINTAINING TRUSTED EXECUTION IN AN UNTRUSTED COMPUTING ENVIRONMENT USING A SECURE COMMUNICATION CHANNEL
An Information Handling System (IHS) includes multiple hardware devices, and a baseboard Management Controller (BMC) in communication with the plurality of hardware devices. The BMC includes instructions for executing an assistance application (APP) in an untrusted domain of the BMC. The assistance APP configured to monitor a custom BMC firmware stack executed in the untrusted domain. The instructions are further executed to verify an integrity of the assistance APP from a trusted domain of the BMC by encrypting communications between the trusted and untrusted domains using an encryption key that comprises a function of a time counter value.
System comprising a medical apparatus and a remote control device, method for pairing the remote control device and the medical apparatus, and method for operating the medical apparatus
In a system, a medical apparatus and a remote control device perform a pairing procedure, in which the remote control device sends an identifier of the remote control device, the medical apparatus sends a time-referenced information, the remote control device receives the time-referenced information and generates a first hash key based on the identifier and the time-referenced information, and the medical apparatus receives the identifier and generates a second hash key based on the identifier and the time-referenced information. The second hash key corresponds to the first hash key, wherein, when the pairing has been successfully completed, the remote control device sends an instruction controlling the medical apparatus based on the first hash key, and the medical apparatus accepts the instruction if the first hash key corresponds to the second hash key.
RELIABLE CRYPTOGRAPHIC KEY UPDATE
A method for updating a cryptographic key via a computation unit configured with one or more processors and a memory coupled to the one or more processors is disclosed. The method includes loading a base key into a cryptographic storage unit integrated with a cryptographic application. The method includes generating a temporal key based on the base key using a one-way key update algorithm via cryptographic application logic integrated within the cryptographic application. The temporal key is assigned an update count based on the number of updates performed on the temporal key. The method further includes comparing the update count value to a required update count, updating the temporal key if the update count is less than the required update count, and zeroizing the temporal key if the update count is more than the required update count, in which the temporal key may be regenerated with the required update count.
Secure content augmentation systems and methods
The disclosure relates to, among other things, systems and methods for augmenting and/or otherwise supplementing content using watermarks. Consistent with embodiments disclosed herein, a user device such as a smartphone may be used to retrieve watermark information encoded in a watermark. The watermark information may comprise content that supplements an associated content item, link and/or location information that may be used to retrieve supplemental content, and/or the like. In some embodiments, the watermark information may comprise cryptographic and/or other access token information used to decrypt and/or otherwise access supplemental content.
GENERATING VERIFIABLE AGRICULTURAL DATA
System and methods for generating a verifiable package of agricultural data to determine whether one or more stewardship criteria have been met. Sensor data from one or more sensors, including at least one vision sensor, can be retrieved with corresponding location data. Agricultural data can be generated that includes the sensor data or inferences determined from the sensor data and the agricultural data can be packaged with authentication data to generate a verifiable package. The authentication data can be utilized to determine the authenticity of the agricultural data and compliance with one or more stewardship criteria can be determined based on the agricultural data.