HIERARCHICAL META-LEDGER TRANSACTION RECORDING

    公开(公告)号:US20190156429A1

    公开(公告)日:2019-05-23

    申请号:US15819516

    申请日:2017-11-21

    Abstract: An original transaction data store may provide information about a series of transactions over time. A transaction data collection platform may group some of those transactions into a subset of transactions and apply a hash function to that subset to create a signature representing verifiable state information associated with an enterprise. The transaction data collection platform may then record information about the signature via a secure, distributed transaction meta-ledger without recording the subset of transactions. According to some embodiments, a transaction audit platform may retrieve the signature from the meta-ledger and retrieve original information associated with the subset of transactions (e.g., from an offline original transaction data store). The transaction audit platform may then apply the hash function to the original information to re-create an original signature, compare the retrieved signature with the original signature, and output an indication of a verification result of the comparison.

    LEARNING METHOD AND SYSTEM FOR SEPARATING INDEPENDENT AND DEPENDENT ATTACKS

    公开(公告)号:US20190230099A1

    公开(公告)日:2019-07-25

    申请号:US15977558

    申请日:2018-05-11

    Abstract: Streams of monitoring node signal values over time, representing a current operation of the industrial asset, are used to generate current monitoring node feature vectors. Each feature vector is compared with a corresponding decision boundary separating normal from abnormal states. When a first monitoring node passes a corresponding decision boundary, an attack is detected and classified as an independent attack. When a second monitoring node passes a decision boundary, an attack is detected and a first decision is generated based on a first set of inputs indicating if the attack is independent/dependent. From the beginning of the attack on the second monitoring node until a final time, the first decision is updated as new signal values are received for the second monitoring node. When the final time is reached, a second decision is generated based on a second set of inputs indicating if the attack is independent/dependent.

Patent Agency Ranking