Method for enhancing security in distributed systems

    公开(公告)号:US09967091B2

    公开(公告)日:2018-05-08

    申请号:US14620235

    申请日:2015-02-12

    Abstract: A method and system secures an encryption key for utilization on a secured network by receiving, at a trusted node, an encryption key request from a requesting node, the encryption key request including a public encryption key of a public/private encryption key pair associated with the requesting node; determining, at the trusted node, if the requesting node has previously supplied enough virtual currency to support the request; choosing an encryption key for distributing to the requesting node when it is determined the requesting node has enough virtual currency; encrypting the chosen encryption key with the public encryption key of a public/private encryption key pair associated with the requesting node; and sending the encrypted encryption key to the requesting node.

    SYSTEM TO AUTHENTICATE 3D PRINTED OBJECTS
    25.
    发明申请
    SYSTEM TO AUTHENTICATE 3D PRINTED OBJECTS 审中-公开
    认证3D打印对象的系统

    公开(公告)号:US20160259306A1

    公开(公告)日:2016-09-08

    申请号:US14635323

    申请日:2015-03-02

    CPC classification number: H04L9/3247 B33Y50/02 B33Y80/00 G09C1/00

    Abstract: When printing 3D objects designed by a particular designer, authentication information such as a serial number and a digital signature of the designer are inserted into a CAD file for printing the object. The authentication information is represented as physical structures in or on the 3D-printed object. The physical structures (e.g., pits, cavities of one or more shapes, etc.) can be detected by a scanner (e.g., an ultrasound or the like), and the detected authentication information can be transmitted to an authentication server that determines the authenticity of the 3D-printed object and transmits the authenticity determination to a user.

    Abstract translation: 当打印由特定设计者设计的3D对象时,将诸如设计者的序列号和数字签名的认证信息插入用于打印对象的CAD文件中。 认证信息被表示为3D打印对象中或之上的物理结构。 可以通过扫描器(例如,超声波等)来检测物理结构(例如,凹坑,一个或多个形状的空腔),并且可以将检测到的认证信息发送到确定真实性的认证服务器 的3D打印对象,并将真实性确定发送给用户。

    Mobile system and method for improving safety of impromptu meetings
    26.
    发明授权
    Mobile system and method for improving safety of impromptu meetings 有权
    提高临时会议安全的移动系统和方法

    公开(公告)号:US09306753B1

    公开(公告)日:2016-04-05

    申请号:US14516716

    申请日:2014-10-17

    CPC classification number: H04L9/3247 H04L9/3234 H04L2209/80 H04W4/21

    Abstract: A system and method for enabling safety in and for initial impromptu meetings facilitated by electronic devices. Prior to the meeting, participants each download a same generated event ticket and the public key of the other meeting participant. At the meeting location, each individual's electronic device via a mobile application initiates close-proximity communication with the other mobile application; signs the ticket with its stored private key; exchanges signed tickets; verifies the received signed ticket using the downloaded public key; and compares the verified signed ticket with the downloaded ticket to authenticate the other individual.

    Abstract translation: 一种用于使电子装置促进安全和初次临时会议的系统和方法。 会议开始前,与会者每次下载相同的生成事件票和其他会议参加者的公开密钥。 在会议地点,每个人的电子设备经由移动应用程序发起与其他移动应用程序的近距离通信; 用其存储的私钥签发机票; 交换机票; 使用下载的公钥验证所接收的签名票据; 并将已验证的签名票据与下载的票证进行比较,以验证其他个人。

    METHODS AND SYSTEMS FOR CATEGORIZING USERS
    27.
    发明申请
    METHODS AND SYSTEMS FOR CATEGORIZING USERS 审中-公开
    分类用户的方法和系统

    公开(公告)号:US20150302423A1

    公开(公告)日:2015-10-22

    申请号:US14254993

    申请日:2014-04-17

    CPC classification number: G06Q30/0201 G06Q30/0282 G06Q50/01

    Abstract: Methods and systems for categorizing users. A first set of communities and a second set of communities are identified based on a set of keywords and one or more messages posted by at least the users on one or more websites. The first set of communities corresponds to at least one of a product or a service, and second set of communities corresponds to at least one of a competitor-product or a competitor-service. The one or more conversations associated a user in at least one of the first set of communities or the second set of communities are determined. The one or more conversations correspond to exchange of messages at least between the user and a user-representative. The one or more conversations are analyzed to obtained one or more attributes. The users are categorized based on the one or more attributes.

    Abstract translation: 用户分类的方法和系统 基于一组关键字和至少一个或多个网站上的用户发布的一个或多个消息来识别第一组社区和第二组社区。 第一组社区对应于产品或服务中的至少一个,第二组社区对应于竞争对手产品或竞争对手服务中的至少一个。 确定在第一组社区或第二组社区中的至少一个中关联用户的一个或多个会话。 该一个或多个对话至少在用户和用户代表之间对应于消息的交换。 分析一个或多个对话以获得一个或多个属性。 用户根据一个或多个属性进行分类。

    Secure revisioning auditing system for electronic document files

    公开(公告)号:US10270600B2

    公开(公告)日:2019-04-23

    申请号:US16152648

    申请日:2018-10-05

    Abstract: Methods and systems for providing secure recording of revisions made to electronic documents, using secure methods to validate the recorded changes, are disclosed. An electronic device making a change to an electronic document can transmit the change to the network. An audit log chain is residing on the network and shared among all the nodes on the network. A node on the network can verify a change of document made by other nodes and add a new block to the chain using one-way hashes, making the chain resistant to tampering. If an invalid block is detected, the system can send an auditing alert to the network. The audit log can be strongly resistant to tampering, providing reliable evidence for use in audit compliance, investigations, and business or court record keeping.

    Method and system for server based secure auditing for revisioning of electronic document files

    公开(公告)号:US10164952B2

    公开(公告)日:2018-12-25

    申请号:US15044607

    申请日:2016-02-16

    Abstract: Methods and systems for providing secure recording of revisions made to electronic documents, using secure methods to validate the recorded changes, are disclosed. An electronic device making a change to an electronic document can transmit the change to the network. An audit log chain is residing on the network and shared among all the nodes on the network. A node on the network can verify a change of document made by other nodes and add a new block to the chain using one-way hashes, making the chain resistant to tampering. If an invalid block is detected, the system can send an auditing alert to the network. The audit log can be strongly resistant to tampering, providing reliable evidence for use in audit compliance, investigations, and business or court record keeping.

Patent Agency Ranking