-
61.
公开(公告)号:US20220237443A1
公开(公告)日:2022-07-28
申请号:US17158631
申请日:2021-01-26
发明人: Shantanu Rane , Alejandro E. Brito , Hamed Soroush
摘要: One embodiment provides a system which facilitates reasoning about classifiers. During operation, the system determines a plurality of neural networks. The system derives, from a respective neural network, a linear model, wherein the linear model is constructed based on an output of a penultimate layer of the respective neural network. The system trains the linear model based on activations of the penultimate layer. The system maps parameters of the trained linear model into a version space.
-
公开(公告)号:US11265331B2
公开(公告)日:2022-03-01
申请号:US16601767
申请日:2019-10-15
发明人: Alejandro E. Brito , Shantanu Rane , Eric A. Bier
摘要: A multifunction printer connects to a controlled device via a proximity network link. The multifunction printer is connected as a master of the controlled device. The multifunction printer connects with a mobile device via a Bluetooth link, such that the mobile device is connected as a master of the multifunction printer. The mobile device is authenticated to determine credentials and access permissions relative to the controlled device. The mobile device's access to the controlled device is controlled from the multifunction printer via the Bluetooth link based on the credentials and access permissions.
-
公开(公告)号:US11088834B2
公开(公告)日:2021-08-10
申请号:US14698678
申请日:2015-04-28
摘要: The current invention provides a system and method for Data Owners to share with Data Seekers extracted insights from the Big Data, instead of raw data or anonymized raw data, thus reducing or eliminating privacy concerns on the data owned by the Data Owners. An Oblivious Pseudo Random Function (OPRF) is used, with operations using OPRFs occur over encrypted data, thus Data Owners learn only the primary object from Data Seeker and nothing else about the remainder of Data Owners' data. Similarly, Data Seeker learns a list of associated secondary objects and nothing else about Data Owners' data. The extent of sharing can be limited using a predefined threshold depending how much private information Data Owner is willing to share or Data Seeker is willing to pay.
-
公开(公告)号:US11070231B2
公开(公告)日:2021-07-20
申请号:US16237586
申请日:2018-12-31
发明人: Eric Allan Bier , Alejandro Brito , Shantanu Rane
IPC分类号: G06F16/21 , H03M7/30 , H04L9/06 , G06F16/907
摘要: A method of reducing the storage requirements of blockchain metadata via dictionary-style compression includes receiving a request to add a transaction block to a blockchain. The method further includes determining an identifier (ID) of a dictionary block most recently stored on the blockchain. The method further includes compressing, by a processing device, one or more transactions of the transaction block based on the dictionary block to generate a compressed transaction block. The method further includes adding the ID of the dictionary block to the compressed transaction block. The method further includes providing the compressed transaction block, including the ID of the dictionary block, for storage on the blockchain.
-
公开(公告)号:US20210014263A1
公开(公告)日:2021-01-14
申请号:US16918966
申请日:2020-07-01
摘要: Embodiments provide a system and method for extracting configuration-related information for reasoning about the security and functionality of a composed system. During operation, the system determines, by a computing device, information sources associated with hardware and software components of a system, wherein the information sources include at least specification sheets, standard operating procedures, user manuals, and vulnerability databases. The system selects a set of categories of vulnerabilities in a vulnerability database, and ingests the information sources to obtain data in a normalized format. The system extracts, from the ingested information sources, configuration information, vulnerability information, dependency information, and functionality requirements to create a model for the system. The system displays, on a screen of a user device, one or more interactive elements which allow the user to view or select the information sources and the categories of vulnerabilities, initiate ingesting the information sources, and view the extracted configuration information.
-
公开(公告)号:US10831890B2
公开(公告)日:2020-11-10
申请号:US15709259
申请日:2017-09-19
发明人: Shantanu Rane
摘要: One embodiment facilitates detection of attacks in a cyber-physical system of interacting elements with physical inputs and outputs. During operation, the system receives, by a first entity of a plurality of entities, a first reading from a first set of sensors of the cyber-physical system via a first network. The system receives, by the first entity, a second reading from a second set of sensors of the cyber-physical system via a second network, wherein the second network includes security measures which prevent access by any external entity or any of the plurality of entities. The system executes a set of instructions based on the first reading and the second reading. The system determines that a result of the executed instructions does not match an expected condition. The system performs a remedial action based on the result.
-
67.
公开(公告)号:US20200154271A1
公开(公告)日:2020-05-14
申请号:US16184811
申请日:2018-11-08
发明人: Shantanu Rane , Alejandro E. Brito
摘要: One embodiment facilities user access to a standalone computing device. During operation, the system receives, by the standalone computing device from a mobile computing device associated with a user, a first command to access capabilities of the standalone computing device, wherein the first command includes an ephemeral user identifier which includes an ephemeral key and indicates user-specific metadata, wherein the ephemeral key is generated by a network service, wherein the ephemeral user identifier is digitally signed with a private key of the network service, and wherein the standalone computing device is not directly accessible by the network service. The system verifies, by the standalone computing device using a public key of the network service, that the ephemeral user identifier was generated by the network service. The system executes, by the standalone computing device, the first command based on the user-specific metadata.
-
公开(公告)号:US20190050589A1
公开(公告)日:2019-02-14
申请号:US15675055
申请日:2017-08-11
CPC分类号: G06F21/6218 , G06F16/254 , G06F2221/2107 , H04L9/008 , H04L9/085 , H04L9/0894 , H04L63/0435 , H04L63/0442 , H04L63/061
摘要: A method is provided for generating an encrypted database. The method includes: receiving a plaintext database having plaintext data entries in one or more columns; augmenting the received plaintext database to generate an augmented plaintext database, the augmenting including the addition of one or more columns to the received plaintext database, each added column corresponding to an attribute which is to be made available for conditional queries; and encrypting the augmented plaintext database to generate the encrypted database including encrypted data entries. The encrypted database supports at least one form of conditional query for those attributes corresponding to the added columns, the at least one form of conditional query being computed on the encrypted data entries without the decryption thereof to produce an encrypted result.
-
公开(公告)号:US09852317B2
公开(公告)日:2017-12-26
申请号:US14954369
申请日:2015-11-30
发明人: Michael Kuniavsky , Paula M. Te , Shantanu Rane
CPC分类号: G06K7/10019 , G06K7/10009 , G06K19/06028 , G06K19/06037 , G06K19/0723 , G06K19/07758 , G06K19/0776
摘要: An article includes a writeable memory printed on a substrate, a characteristic of the article usable to derive a seed value, and a value stored in the memory, wherein the value is generated by a hashing process using the seed value. The writeable memory may also be a readable memory, and may store more than one value.
-
70.
公开(公告)号:US20170208631A1
公开(公告)日:2017-07-20
申请号:US15002160
申请日:2016-01-20
IPC分类号: H04W76/02 , H04L29/12 , H04W72/04 , H04L9/30 , H04W4/06 , H04W12/02 , H04L29/06 , H04L29/08 , H04W76/06
CPC分类号: H04W76/10 , H04L9/30 , H04L61/1511 , H04L63/0421 , H04L63/06 , H04L67/02 , H04W4/06 , H04W12/02 , H04W72/046 , H04W76/38
摘要: A method and system for verifying Internet connectivity at an access point in a fast, secure, and privacy-friendly manner. During operation, the system may perform passive network discovery, challenge response discovery, and/or active discovery to verify Internet connectivity for a mobile device. Passive network discovery involves the mobile device using a public key of a server to decrypt a time value to verify Internet connectivity. The mobile device receives the encrypted time value as part of the server's signed timing information in an overloaded WiFi beacon frame. Challenge response discovery involves the mobile device sending an encrypted challenge to servers, and a server returns a correct response to the challenge to confirm Internet connectivity. Active discovery involves a mobile device sending HTTP GET requests to a randomly selected set of servers without including a user agent, and a server may send an HTTP REPLY to confirm Internet connectivity.
-
-
-
-
-
-
-
-
-