摘要:
The invention provides a method for on-boarding at least one personal attribute from a token to an external entity (200), the method comprising: - authenticating (204) the external entity by the token; - if the external entity is authenticated, computing (206) at least one shared session key by both the external entity and the token; - ciphering at least one personal attribute stored by the token based on the at least one shared session key; - on boarding the at least one personal attribute from the token to the by transferring (207) the ciphered at least one personal attribute to the external entity, on a communication link between the token and the external entity.
摘要:
In a distributed system, a first computer system may require computationally verifiable assurances of the authenticity and integrity of computations (e.g., performed as part of the execution of a program) performed by a second computer system. Methods described herein may be utilized to enforce and/or ensure the correct execution of a program. The first computer system may delegate execution of a program to a second computer system and a protocol may be employed to constrain the second computer system to perform a correct execution of the program. The protocol may include mitigation and correction routines that mitigate and/or correct the incorrect execution of a program. In various systems and methods described herein, the protocol may utilize a blockchain network such as a Bitcoin-based blockchain network.
摘要:
A system and method may obtain a connection profile, the connection profile including at least one rule related to at least one PII data element; associate the connection profile with a network connection; receive a data unit transmitted over the network connection, the data unit including at least a portion of the PII data element; and, based on the rule, perform at least one of: blocking transmission of the data unit, modifying the data unit, forwarding at least a portion of the data unit to a selected destination, storing the data unit, storing metadata related to the data unit, and reporting an event related to the data unit. A system and method may associate the connection profile with a set of connection. A system and method may automatically modify a set of connection profiles based on an event.
摘要:
Disclosed are a data transmission method and a data transmission apparatus. The data transmission method comprises: a first computer sends first data to a first image capture apparatus through an image output port of the first computer; the first image capture apparatus receives the first data; the first image capture apparatus sends the first data to a second computer; or, the first image capture apparatus processes the first data to generate second data, and sends the second data to the second computer, the first image capture apparatus having an image input port, the image input port being configured to connect the image output port of the first computer, and the image output port of the first computer comprising an output port of a graphics card of the first computer. The present invention can effectively reduce leakage of company data.
摘要:
A method performed in relation to a private conversation conducted over a network between a selected group of two or more users, each of the group of users participating in the conversation from a respective instance of a communication client application run on a respective user device. The private conversation comprises one or more content items, each of these content items being shared by a respective source user of the group with one or more other users of the group internally within the private conversation. The method comprises associating a respective permissions model with each respective one of the content items, the permission model being configured to act on the client application to control permission for the one or more other users to use the respective content item outside of said conversation.
摘要:
A client device securely transfers personal information to a third-party website. The client device stores personal information of a user and encrypts personal information requested by the third-party website, so that the third-party website can decrypt and retrieve the personal information, and so that a remote proxy server facilitating the transfer of personal information from the client device to the third-party website cannot read the encrypted personal information and has no access to unencrypted personal information.
摘要:
Hardware acceleration supports complex software processes. In particular, a hardware security module provides encryption support for transaction chains. In one implementation, the security module circuitry provides high-speed security features and acceleration of the security features for blockchain processing.
摘要:
A method and apparatus for managing transmit power for device-to-device communication is provided. According to an embodiment of the invention, a UE uses a component carrier of one cell to engage in D2D communication. In parallel with its D2D communication, the UE uses one or more other component carriers of one or more other cells to engage in cellular communication. The UE configures its D2D transmit power as well as its cellular transmit power so that its total transmit power does not exceed the UEs maximum power limit, and so that the transmit power on a component carrier of a cell does not exceed the maximum power limit for the cell that provides the component carrier.