Secure Import and Export of Keying Material
    12.
    发明申请
    Secure Import and Export of Keying Material 有权
    安全输入和输出键控材料

    公开(公告)号:US20160323264A1

    公开(公告)日:2016-11-03

    申请号:US14367434

    申请日:2013-12-20

    Abstract: An embodiment includes a method executed by at least one processor of a first computing node comprising: generating a key pair including a first public key and a corresponding first private key; receiving an instance of a certificate, including a second public key, from a second computing node located remotely from the first computing node; associating the instance of the certificate with the key pair; receiving an additional instance of the certificate; verifying the additional instance of the certificate is associated with the key pair; and encrypting and exporting the first private key in response to verifying the additional instance of the certificate is associated with the key pair. Other embodiments are described herein.

    Abstract translation: 实施例包括由第一计算节点的至少一个处理器执行的方法,包括:生成包括第一公钥和对应的第一私钥的密钥对; 从位于远离所述第一计算节点的第二计算节点接收包括第二公钥的证书的实例; 将证书的实例与密钥对相关联; 接收证书的附加实例; 验证证书的附加实例与密钥对相关联; 并且响应于验证证书的附加实例而加密和导出第一私钥与密钥对相关联。 本文描述了其它实施例。

    NETWORK-ENABLED DEVICE PROVISIONING
    13.
    发明申请
    NETWORK-ENABLED DEVICE PROVISIONING 有权
    网络启动的设备提供

    公开(公告)号:US20160044001A1

    公开(公告)日:2016-02-11

    申请号:US14456509

    申请日:2014-08-11

    Abstract: Systems, devices, and techniques for network-enabled device provisioning are disclosed herein. In some embodiments, a network-enabled device may include: a storage device; listening logic to wirelessly receive a plurality of key fragments from a corresponding plurality of peer devices, to cause storage of the plurality of key fragments in the storage device, and to receive an encrypted provisioning message from a management device; key generation logic to generate a decryption key based on the plurality of key fragments stored in the storage device to decrypt the encrypted provisioning message, and to decrypt the encrypted provisioning message using the decryption key; and control logic to provision the network-enabled device in accordance with instructions included in the decrypted provisioning message. Other embodiments may be disclosed and/or claimed.

    Abstract translation: 本文公开了用于启用网络的设备供应的系统,设备和技术。 在一些实施例中,启用网络的设备可以包括:存储设备; 侦听逻辑,以从相应的多个对等设备无线地接收多个密钥片段,以使所述多个密钥片段存储在所述存储设备中,以及从管理设备接收加密的供应消息; 密钥生成逻辑,用于基于存储在所述存储装置中的所述多个密钥片段来生成解密密钥,以解密所述加密的配置消息,以及使用所述解密密钥解密所述加密的配置消息; 以及控制逻辑,以根据包括在解密的供应消息中的指令来设置启用网络的设备。 可以公开和/或要求保护其他实施例。

    Security optimizing compute distribution in a hybrid deep learning environment

    公开(公告)号:US11574175B2

    公开(公告)日:2023-02-07

    申请号:US16912152

    申请日:2020-06-25

    Abstract: Embodiments are directed to security optimizing compute distribution in a hybrid deep learning environment. An embodiment of an apparatus includes one or more processors to determine security capabilities and compute capabilities of a client machine requesting to use a machine learning (ML) model hosted by the apparatus; determine, based on the security capabilities and based on exposure criteria of the ML model, that one or more layers of the ML model can be offloaded to the client machine for processing; define, based on the compute capabilities of the client machine, a split level of the one or more layers of the ML model for partition of the ML model, the partition comprising offload layers of the one or more layers of the ML model to be processed at the client machine; and cause the offload layers of the ML model to be downloaded to the client machine.

    ADVERSARIAL SAMPLE PROTECTION FOR MACHINE LEARNING

    公开(公告)号:US20220121944A1

    公开(公告)日:2022-04-21

    申请号:US17560976

    申请日:2021-12-23

    Abstract: Adversarial sample protection for machine learning is described. An example of a storage medium includes instructions for initiating processing of examples for training of an inference engine in a system; dynamically selecting a subset of defensive preprocessing methods from a repository of defensive preprocessing methods for a current iteration of processing, wherein a subset of defensive preprocessing methods is selected for each iteration of processing; performing training of the inference engine with a plurality of examples, wherein the training of the inference engine include operation of the selected subset of defensive preprocessing methods; and performing an inference operation with the inference engine, including utilizing the selected subset of preprocessing defenses for the current iteration of processing.

    PRIVACY-PRESERVING RECONSTRUCTION FOR COMPRESSED SENSING

    公开(公告)号:US20220116513A1

    公开(公告)日:2022-04-14

    申请号:US17560861

    申请日:2021-12-23

    Abstract: Privacy-preserving reconstruction for compressed sensing is described. An example of a method includes capturing raw image data for a scene with a compressed sensing image sensor; performing reconstruction of the raw image data, including performing an enhancement reconstruction of the raw image data; and generating a masked image from the reconstruction of the raw image data, wherein the enhancement reconstruction includes applying enhancement utilizing a neural network trained with examples including image data in which private content is masked.

    METHODS, SYSTEMS AND APPARATUS TO TRACK A PROVENANCE OF GOODS

    公开(公告)号:US20200184489A1

    公开(公告)日:2020-06-11

    申请号:US16609405

    申请日:2017-06-30

    Abstract: Methods, apparatus, systems and articles of manufacture are disclosed to track a provenance of goods. An example apparatus includes an unsigned block generator to generate a first unsigned block to store first processing data associated with the product by a first entity, a block signature engine to sign the first unsigned block with a first private key to generate a blockchain having a first signed block, the unsigned block generator to generate a second unsigned block in response to a second entity generating second processing data associated with the product by the second entity, the block signature engine to expand the blockchain by signing the second unsigned block with a second private key to generate a second signed block within the blockchain, and a blockchain validator to verify the product provenance by validating the first processing data and the second processing data using respective public keys associated with the first entity and the second entity.

    Techniques for integrated endpoint and network detection and eradication of attacks

    公开(公告)号:US10469524B2

    公开(公告)日:2019-11-05

    申请号:US14369587

    申请日:2013-12-18

    Abstract: Various embodiments are generally directed to techniques to detect and eradicate malware attacks by employing information indicative of malware activity received from both endpoint devices and network devices proving network services to endpoint devices. An apparatus to detect malware includes a processor component, an analysis component for execution by the processor component to employ a trust level assigned to a device in a network as a factor in an analysis of an indication received from the device of a malware attack, and an eradication component for execution by the processor component to determine an action to take through the network to eradicate the malware attack based on the analysis. Other embodiments are described and claimed.

Patent Agency Ranking