PROVISIONING FEDERATED COMPUTATION ON DISTRIBUTED PRIVATE DATA

    公开(公告)号:US20220012355A1

    公开(公告)日:2022-01-13

    申请号:US17483543

    申请日:2021-09-23

    Abstract: A method comprises receiving in a governor device, from a plurality of data owner devices, metadata for one or more datasets maintained by the plurality of data owner devices, registering the metadata for the one or more datasets with the governor device, in response to a request from an aggregator, providing at least a portion of the metadata for the one or more datasets to the aggregator, receiving, from the aggregator, a compute plan to be implemented by the plurality of data owner devices, distributing at least a portion of the compute plan to the plurality of data owner devices, in response to receiving, from the plurality of data owner devices, a verification report and a certification for an enclave, binding the enclave to a host device, and providing the compute plan to the plurality of data owner devices.

    TECHNOLOGIES FOR ANALYZING UNIFORM RESOURCE LOCATORS

    公开(公告)号:US20180097822A1

    公开(公告)日:2018-04-05

    申请号:US15283389

    申请日:2016-10-01

    CPC classification number: H04L63/1408 G06F21/562 G06F21/57 G06N99/005

    Abstract: Technologies for analyzing a Uniform Resource Locator (URL) include a multi-stage URL analysis system. The multi-stage URL analysis system analyzes the URL using a multi-stage analysis. In the first stage, the multi-stage URL analysis system analyzes the URL using an ensemble lexical analysis. In the second stage, the multi-stage URL analysis system analyzes the URL based on third-party detection results. In the third stage, the multi-stage URL analysis system analyzes the URL based on metadata related to the URL. The multi-stage URL analysis system advances the stages of analysis if a malicious classification score determined by each stage does not satisfy a confidence threshold. The URL may also be selected for additional rigorous analysis using selection criteria not used in by the analysis stages.

    Trusted time service for offline mode

    公开(公告)号:US09705892B2

    公开(公告)日:2017-07-11

    申请号:US14317579

    申请日:2014-06-27

    Abstract: Systems and methods for providing trusted time service for the off-line mode of operation of a processing system. An example processing system comprises: a first processing device communicatively coupled to a real-time clock, the first processing device to modify an epoch value associated with the real-time clock responsive to detecting a reset of the real-time clock; and a second processing device to execute, in a first trusted execution environment, a first application to receive, from the first processing device, a first time value outputted by the real-time clock and a first epoch value associated with the real-time clock.

    Reducing authentication confidence over time based on user history
    18.
    发明授权
    Reducing authentication confidence over time based on user history 有权
    根据用户历史,减少身份验证信心

    公开(公告)号:US09590966B2

    公开(公告)日:2017-03-07

    申请号:US13840572

    申请日:2013-03-15

    Abstract: Technologies are provided in embodiments to manage an authentication confirmation score. Embodiments are configured to identify, in absolute session time, a beginning time and an ending time of an interval of an active user session on a client. Embodiments are also configured to determine a first value representing a first subset of a set of prior user sessions, where the prior user sessions of the first subset were active for at least as long as the beginning time. Embodiments can also determine a second value representing a second subset of the set of prior user sessions, where the prior user sessions of the second subset were active for at least as long as the ending time. Embodiments also determine, based on the first and second values, a decay rate for the authentication confidence score of the active user session. In some embodiments, the set is based on context attributes.

    Abstract translation: 在实施例中提供技术来管理认证确认分数。 实施例被配置为在绝对会话时间中识别客户端上的活动用户会话的间隔的开始时间和结束时间。 实施例还被配置为确定表示一组先前用户会话的第一子集的第一值,其中第一子集的先前用户会话活动至少等于开始时间。 实施例还可以确定表示先前用户会话集合的第二子集的第二值,其中第二子集的先前用户会话活动至少等于结束时间。 实施例还基于第一和第二值确定活动用户会话的认证置信度得分的衰减率。 在一些实施例中,该集合基于上下文属性。

    Virtualizing a hardware monotonic counter
    19.
    发明授权
    Virtualizing a hardware monotonic counter 有权
    虚拟化硬件单调计数器

    公开(公告)号:US09465933B2

    公开(公告)日:2016-10-11

    申请号:US13690111

    申请日:2012-11-30

    CPC classification number: G06F21/50 G06F21/54 G06F21/71

    Abstract: Embodiments of an invention for virtualizing a hardware monotonic counter are disclosed. In one embodiment, an apparatus includes a hardware monotonic counter, virtualization logic, a first non-volatile storage location, and a second non-volatile storage location. The virtualization logic is to create a virtual monotonic counter from the hardware monotonic counter. The first non-volatile storage location is to store an indicator that the count of the hardware monotonic counter has changed. The second non-volatile storage location is to store an indicator that the count of the virtual monotonic counter has changed.

    Abstract translation: 公开了用于虚拟化硬件单调计数器的发明的实施例。 在一个实施例中,装置包括硬件单调计数器,虚拟化逻辑,第一非易失性存储位置和第二非易失性存储位置。 虚拟化逻辑是从硬件单调计数器创建一个虚拟单调计数器。 第一个非易失性存储位置是存储硬件单调计数器的计数改变的指示符。 第二非易失性存储位置是存储虚拟单调计数器的计数改变的指示符。

    Verified Sensor Data Processing
    20.
    发明申请
    Verified Sensor Data Processing 审中-公开
    验证的传感器数据处理

    公开(公告)号:US20150350255A1

    公开(公告)日:2015-12-03

    申请号:US14825645

    申请日:2015-08-13

    CPC classification number: H04L63/20 G06K9/00228 H04L63/105 H04L67/24

    Abstract: Sensor data may be filtered in a secure environment. The filtering may limit distribution of the sensor data. Filtering may modify the sensor data, for example, to prevent identification of a person depicted in a captured image or to prevent acquiring a user's precise location. Filtering may also add or require other data use controls to access the data. Attestation that a filter policy is being applied and working properly or not may be provided as well.

    Abstract translation: 传感器数据可能会在安全的环境中进行过滤。 滤波可能会限制传感器数据的分布。 过滤可以修改传感器数据,例如,以防止识别拍摄图像中描绘的人,或阻止获取用户的精确位置。 过滤还可以添加或要求其他数据使用控制来访问数据。 也可以提供过滤器策略正在应用和正常工作的证明。

Patent Agency Ranking