G06F21/645

Method and Device for Determining a Definite Distance

A method for determining a definite safe distance between a wirelessly communicating object transponder and at least one anchor gateway in accordance with a two-way ranging method, wherein transmission and reception timestamps are detected for each communication message via the transponder and the at least one anchor gateway, each of the timestamps from the transponder and the at least one anchor gateway together with at least one respective piece of timestamp monitoring information are transmitted to a failsafe computing device, at least one check is implemented via the failsafe computing device, and the definite safe distance is determined via the failsafe computing device aided by the checked timestamps, where timestamp errors occurring during the detection of the timestamps are caused solely by the transponder or alternatively solely the one anchor gateway.

METHOD, APPARATUS, ADAPTER AND SYSTEM FOR CROSS-CHAIN DATA ACCESS OF BLOCKCHAIN

Disclosed are a method and a system for cross-chain data access of blockchain. According to the technical solution, an adapter is added between a service blockchain and a witness blockchain, a cross-chain initiation event and a cross-chain response event on a local service blockchain are registered to the witness blockchain by using the adapter, so as to provide query and push services of cross-chain events to other nodes on the local service blockchain, and trigger related operations on the local service blockchain according to the cross-chain events of the witness blockchain.

Facilitating processing of a query on shareable data in a temporary vault
11556667 · 2023-01-17 · ·

A method includes obtaining, by a consumer computing device of a data communication network, a temporary credential in accordance with a temporary credential protocol. The method continues with accessing, by the consumer computing device, a temporary vault in accordance with the temporary credential, where the temporary vault stores or is to store a set of shareable data records. The method continues with facilitating, by the consumer computing device, execution of a data analysis function on the set of shareable data records to produce an analytical result. The method continues with receiving, by the consumer computing device from the temporary vault, the analytical result. The method continues with storing, by the consumer computing device, the analytical result in memory associated with the user computing device.

Data certification system and process for centralized user file encapsulation, encryption, notarization, and verification using a blockchain

A process for centralized user file encapsulation, encryption, notarization and verification using a blockchain and a system that certifies data in a proprietary “capsule” file format, with tamper-proof blockchain are disclosed. By utilizing a hybridization of both cloud and blockchain storage mechanisms, the present invention allows for the performant and cost-effective certification of large amounts of data. Furthermore, the generation of the capsule allows for users to store both the data payload and its digital notarization. The system then allows for users to share the capsule with others (by way of permissions enforced by the notary system) and upload it for verification of authenticity at a later point in time.

Methods and apparatus for performing attestation

Aspects of the present disclosure relate to an apparatus comprising first interface circuitry to communicate with relying party circuitry, the first interface circuitry being configured to receive, from the relying party circuitry, an attestation request in respect of a processing operation requested by attester circuitry to be performed by the relying party circuitry; second interface circuitry to communicate with the attester circuitry, the second interface circuitry being configured to: transmit the attestation request to the attester circuitry; and receive, from the attester circuitry, evidence data associated with the processing operation, and third interface circuitry to communicate with verifier circuitry, the third interface circuitry being configured to: transmit the evidence data to the verifier circuitry; and receive, from the verifier circuitry, attestation result data indicative of a verification of the evidence data, wherein the first interface circuitry is configured to transmit the attestation result data to the relying party circuitry.

Secure Boot and Software Upgrade of A Device
20180004956 · 2018-01-04 ·

A method of securely resetting a first device comprising a UICC, the method comprising providing a secure reset control application to a secure element of the UICC of the first device wherein the secure reset control application is capable of commanding the UICC to provide notification indicative of a secure reset of the first device being requested if a corresponding signal is received from a remote management server; and/or communication between the secure reset control application and a remote management server cannot be established for a predetermined period of time and upon the next first device reset, determine whether a secure reset has been requested.

CONTROLLING VERIFICATION OF KEY-VALUE STORES

Deferred verification of the integrity of data operations over a set of data that is hosted at an untrusted module (UM) is controlled. The controlling includes generating a request for a data operation on the set of data. The request includes an authentication portion. The request is sent to the UM. A response to the request is received from the UM. The response includes cryptographic verification information attesting the integrity of the data operation with respect to prior data operations on the set of data. The response includes results from deferred verification at a trusted module (TM).

BLOCKCHAIN-BASED HOST SECURITY MONITORING METHOD AND APPARATUS, MEDIUM AND ELECTRONIC DEVICE

The present disclosure relates to a blockchain-based host security monitoring method and apparatus, a computer readable medium and an electronic device. The host security monitoring method in the embodiments of the present disclosure comprises: monitoring traffic data of a host in network communication, and determining whether the traffic data is malicious traffic; if the traffic data is malicious traffic, obtaining security state information of the host, and saving the security state information to a security state blockchain; generating an invasion log corresponding to the malicious traffic, and saving the invasion log and the security state information to a log storage blockchain.

REPLICATION FOR CYBER RECOVERY FOR MULTIPLE TIER DATA
20230004466 · 2023-01-05 ·

Replication of a filesystem or a mount point or share may replicate all data that it consists of irrespective of where the data is stored. Replication protects data irrespective of location. One method is to replicate the filesystem namespace as is while skipping the data outside of the appliance/machine so that replication cost and time are reasonable. The data outside of the machine, like cloud/tape data is protected differently. One example method includes a data protection operation configured to replication a namespace associated with multiple data tiers. During replication, data from one of the tiers is skipped while all of the namespace metadata is replicated. The recovery restores the namespace metadata and the data that was replicated from the other tier. This may be performed in connection with cyber security, for example when replicating multi-tier data to a vault.

Secure signature creation on a secondary device

Methods and systems for acquiring a freehand or cursive signature on a secondary device with a touch receiving surface for use on a primary device without a touch receiving surface are provided. The primary device sends a message to the secondary device requesting a signature. The user responds by signing her name, using a finger or stylus, on a touch receiving surface. As the user signs her name, the signature is displayed on the secondary device and transmitted to the primary device. The signature may then be stored, displayed, analyzed, or validated by the primary device.