摘要:
A certified application is installed onto a content creation device and a mobile certified application is installed onto a mobile device, the applications establish first and second trust relationships with the cloud service. The certified application and mobile certified application establish the third trust relationship via a proximity network. The mobile certified application generates a first ephemeral key pair having a private part. The certified application generates a second ephemeral key pair having a private part. The mobile certified application requests a service from the content creation device involving the transfer of data between the content creation device and the cloud service. The data is protected by at least one of the first and second ephemeral key pairs in response to invocation of the service. The service results in the data being stored at the cloud service and/or rendered at the content creation device.
摘要:
One embodiment facilities user access to a standalone computing device. During operation, the system receives, by the standalone computing device from a mobile computing device associated with a user, a first command to access capabilities of the standalone computing device, wherein the first command includes an ephemeral user identifier which includes an ephemeral key and indicates user-specific metadata, wherein the ephemeral key is generated by a network service, wherein the ephemeral user identifier is digitally signed with a private key of the network service, and wherein the standalone computing device is not directly accessible by the network service. The system verifies, by the standalone computing device using a public key of the network service, that the ephemeral user identifier was generated by the network service. The system executes, by the standalone computing device, the first command based on the user-specific metadata.
摘要:
A method and system for verifying Internet connectivity at an access point in a fast, secure, and privacy-friendly manner. During operation, the system may perform passive network discovery, challenge response discovery, and/or active discovery to verify Internet connectivity for a mobile device. Passive network discovery involves the mobile device using a public key of a server to decrypt a time value to verify Internet connectivity. The mobile device receives the encrypted time value as part of the server's signed timing information in an overloaded WiFi beacon frame. Challenge response discovery involves the mobile device sending an encrypted challenge to servers, and a server returns a correct response to the challenge to confirm Internet connectivity. Active discovery involves a mobile device sending HTTP GET requests to a randomly selected set of servers without including a user agent, and a server may send an HTTP REPLY to confirm Internet connectivity.
摘要:
One embodiment of the present invention provides a system for privacy-preserving sharing of data for secure collaboration. During operation, the system obtains a first set of data describing network events associated with one or more network addresses. Next, the system negotiates with a potential partner to determine a metric for deciding whether to share data. The potential partner is associated with a second set of data describing network events. The system then computes a value for the metric in a privacy-preserving way, based on the first set of data and the second set of data. Subsequently, the system determines whether the metric value exceeds a predetermined threshold, and, responsive to determining that the metric value exceeds the predetermined threshold, the system shares the first set of data with the potential partner, while controlling how the data should be shared to optimize benefits and risks of collaboration.
摘要:
One embodiment provides a system which facilitates construction of an ensemble of neural network-based classifiers that optimize a diversity metric. During operation, the system defines a diversity metric based on pairwise angles between decision boundaries of three or more affine classifiers. The system includes the diversity metric as a regularization term in a loss function optimization for designing a pair of mutually orthogonal affine classifiers of the three or more affine classifiers. The system trains one or more neural networks such that parameters of the one or more neural networks are consistent with parameters of the affine classifiers to obtain an ensemble of neural network-based classifiers which optimize the diversity metric. The system predicts an outcome for a testing data object based on the obtained ensemble of neural-network based classifiers which optimize the diversity metric.
摘要:
One embodiment provides a method and system which facilitates optimizing a pair of affine classifiers based on a diversity metric. During operation, the system defines a diversity metric based on an angle between decision boundaries of a pair of affine classifiers. The system includes the diversity metric as a regularization term in a loss function optimization for designing the pair of affine classifiers, wherein the designed pair of affine classifiers are mutually orthogonal. The system predicts an outcome for a testing data object based on the designed pair of mutually orthogonal affine classifiers.
摘要:
A system for collecting building environmental sensor data includes a first data collection device having a first transceiver that is configured to receive data from proximate building environmental sensors and a second transceiver that is configured to communicate with an external service. The device will, upon detecting that the first transceiver is within a receiving range of a first building environmental sensor, communicatively connect with the first building environmental sensor to receive a data stream that comprises sensor data captured by the first building environmental sensor. The device will continue to receive the data stream until the first transceiver either receives all of the sensor data or moves out of the receiving range. The device will repeat this process for additional building environmental sensors. The device will use its second transceiver to transfer the sensor data to the external service.
摘要:
A network is organized into a plurality of broadcast domains. Each broadcast domain includes a plurality of nodes each configured to cause messages to be sent to two or more other of the nodes within the broadcast domain. The broadcast domains are coupled via bridging connections. Each bridging connection couples at least one of the nodes from a first of the broadcast domains to at least one of the nodes of a second of the broadcast domains. The messages are caused to be sent through the plurality of broadcast domains via a subset of the bridging connections. The subset of the bridging connections is selected non-deterministically via the plurality of broadcast domains.
摘要:
A multi-function printer is coupled to a mobile device via a proximity network interface. The multi-function printer determines a workflow specified by a user of the mobile device. An ephemeral token associated with the workflow is sent to the mobile user device. The mobile device uses the ephemeral token to create a payment packet that is sent to a payment server which sends a receipt in response thereto. The multi-function printer receives the receipt from the mobile device and in response to receiving the receipt, obtains a list of payments from the payment server. The multi-function printer performs the workflow based on validating the receipt against the list of payments.
摘要:
A method is provided for generating an encrypted database. The method includes: receiving a plaintext database having plaintext data entries in one or more columns; augmenting the received plaintext database to generate an augmented plaintext database, the augmenting including the addition of one or more columns to the received plaintext database, each added column corresponding to an attribute which is to be made available for conditional queries; and encrypting the augmented plaintext database to generate the encrypted database including encrypted data entries. The encrypted database supports at least one form of conditional query for those attributes corresponding to the added columns, the at least one form of conditional query being computed on the encrypted data entries without the decryption thereof to produce an encrypted result.