Patent classifications
G06F2221/2143
TECHNIQUES FOR PRIVATE AND SECURE COLLECTION AND PROCESSING OF DATA FOR GENERALIZED ANALYSIS
The present disclosure relates to techniques for collection and processing of data over a network, and in particular to in providing generalized analysis for preserving privacy of data sources. In some embodiments, a system receives a request for analytical data made by a requester, wherein the request includes: information for identifying one or more data source devices to be queried for input data, a type of data processing to be performed on the input data for generating the analytical data, and a data type for the analytical data. In response to receiving the request, the system causes the one or more data source devices to be queried for the input data. The system causes a response that includes the analytical data to be sent to the requester. Other embodiments are described throughout the present disclosure.
DEFERRED RECLAIMING OF SECURE GUEST RESOURCES
Deferred reclaiming of secure guest resources within a computing environment is provided, which includes initiating, by a host of the computing environment, removal of a secure guest from the computing environment, while leaving one or more resources of the secure guest to be reclaimed asynchronous to the removal of the secure guest. The deferring also includes reclaiming the one or more secure guest resources asynchronous to the removal of the secure guest, where the one or more secure guest resources are available for reuse as the one or more secure guest resources are reclaimed asynchronous to the removal of the secure guest.
Securing private information using two-dimensional barcodes
A computer program product includes a non-volatile computer readable medium and non-transitory program instructions embodied therein, the program instructions being configured to be executable by a processor to cause the processor to perform various operations. The operations may include obtaining first encoded data that encodes information of a first party, obtaining second encoded data that encodes information of a second party, performing a forward mashup algorithm on the first encoded data and second encoded data to form a third data set, and providing the third data set to the first party as a mashup two-dimensional barcode.
Information processing method, apparatus, device, and storage medium
The present application discloses an information processing method. The method includes: acquiring a resource package parameter determined by a sender client; invoking an interface with a second server, and acquiring a current conversion rate that is between the first-type resource and a second-type resource and is issued by the second server; calculating a quantity of second-type resources equal in value to the first quantity of first-type resources according to the conversion rate, and using the quantity as a second quantity; deducting the second quantity of second-type resources from a second-type resource account of the sender client, and generating at least one resource package, a sum of quantities corresponding to the at least one resource package being equal to the first quantity; and distributing the at least one resource package to at least one receiver client by using the link information.
ELECTRONIC DEVICE AND REMOTE CONTROL SYSTEM
A computer includes an SMS module that communicates with a management server apparatus via a network, a display that displays predetermined information, and a CPU that controls an operation of the display. When the SMS module receives a control command from the management server apparatus via the network, the CPU executes processing corresponding to the control command. Furthermore, the CPU transmits a notification signal including information, which indicates a state of execution of the control program, to the management server apparatus via the network.
Furthermore, the CPU displays, on the display, a state indicator including information which indicates a state of execution of the control program when the notification signal cannot be transmitted to the management server apparatus via the network.
METHOD AND SYSTEM FOR A SMALL UNMANNED AERIAL SYSTEM FOR DELIVERING ELECTRONIC WARFARE AND CYBER EFFECTS
A system and method for conducting electronic warfare on a target site includes the use of a small unmanned aircraft system (SUAS) having a fuselage and a Prandtl wing, wherein at least two electric ducted fans are positioned on the fuselage. A power system of the SUAS has a plurality of hydrogen fuel cells positioned within the Prandtl wing. An electronic warfare payload is carried by the fuselage, wherein the electronic warfare payload and the at least two electric ducted fans are powered by at least a portion of the plurality of hydrogen fuel cells. During an operation, the SUAS may launch near an IAD site and initiate an electronic warfare effect on an integrated air defense site with electronic warfare payload carried by the SUAS to interfere with at least one surface-to-air missile (SAM) system.
FUSE BASED REPLAY PROTECTION WITH CONSERVATIVE FUSE USAGE
A TPM is implemented in an SOC for thwarting PIN state replay attacks. Programmable fuses are used as a counter and an on-die RAM stores a blown-fuse count and a TPM state that includes a PIN-failure count and a fuse count. TPM initialization includes incrementing the TPM state PIN-failure count if the blown-fuse count is greater than the TPM state fuse count. Once a PIN is received, if the TPM state PIN-failure count satisfies a PIN failure policy and the PIN is correct, the TPM state PIN-failure count is cleared, and if the PIN is incorrect, a fuse is blown and the blown-fuse count is incremented. If the fuse blow fails, TPM activity is halted. If the fuse blow succeeds, the TPM state PIN-failure count is incremented and the TPM state fuse count is set equal to the blown-fuse count. The TPM state is saved to off-die non-volatile memory.
SECURELY ARMING A MEMORY DEVICE FOR SELF-DESTRUCTION BY IMPLEMENTING A SELF-DESTRUCTION COUNTDOWN TIMER USING A BATTERY BACKED REAL-TIME CLOCK
A processing device receives a command to arm a memory device for self-destruction. In response to the command, a self-destruction countdown timer is commenced. An expiry of the self-destruction countdown timer and based on detecting the expiry of the self-destruction countdown timer, data stored by the memory device is destructed.
Control systems and methods for blood or fluid handling medical devices
A processor of a medical device configured to communicate with a remote server can be programmed to protect the medical device from exposure to unauthorized or malicious software. A system or method to implement this form of protection can include, for example, at least one processor on the medical device, a control software module that controls the operation of the medical device and is executable on the processor, a data management module that manages data flow to and from the control software module from sources external to the medical device, and an agent module that has access to a limited number of designated memory locations in the medical device. In addition, a hemodialysis apparatus can be configured to operate in conjunction with an apparatus for providing purified water from a source such as a municipal water supply or a well. A system for controlling delivery of purified water to the hemodialysis apparatus can comprise a therapy controller of the hemodialysis apparatus configured to communicate with a controller of a water purification device, and a user interface controller of the hemodialysis apparatus configured to communicate with the therapy controller, and to send data to and receive data from a user interface.
Data privacy protected machine learning systems
Approaches for private and interpretable machine learning systems include a system for processing a query. The system includes one or more teacher modules for receiving a query and generating a respective output, one or more privacy sanitization modules for privacy sanitizing the respective output of each of the one or more teacher modules, and a student module for receiving a query and the privacy sanitized respective output of each of the one or more teacher modules and generating a result. Each of the one or more teacher modules is trained using a respective private data set. The student module is trained using a public data set. In some embodiments, human understandable interpretations of an output from the student module is provided to a model user.