Abstract:
The present invention relates to a method for analysing a log (10) of a device or a plurality of devices of a first entity (1), the method comprising:generating an encrypted log (11) by encrypting said log (10) on at least one device of the first entity (1); generating at least an encrypted query (16) by encrypting said query (16) on at least one device for analysing the log (10); transferring said encrypted log (11) and said encrypted query (16) from said first entity (1) to a second entity (2); analysing said encrypted log (11) on said second entity (2) by using the encrypted query (16) and generating (20) an encrypted analysis result (21); transferring said encrypted analysis result (21) from said second entity (2) to said first entity (1); and decrypting (22) said encrypted analysis result (21) on said first entity (1), wherein said decrypted analysis result (23) can be verified by said first entity (1).
Abstract:
The invention relates to a method for aggregation of a performance indicator of a device comprising the steps of: concatenating a respective first data item to a plurality of second data items in the device; encrypting the plurality of concatenated second data items relevant for computing the performance indicator using a first encryption key in the device, wherein the first encryption key is based on an additive homomorphic encryption scheme; sending the encrypted concatenated second data items to a computation cluster; computing the performance indicator on the computation cluster using the encrypted concatenated second data items and computing an aggregate value regarding the performance indicator by summing up the encrypted concatenated second data items; sending the aggregate value to a server of a service provider of the device; decrypting the aggregate value using a second encryption key on the server of the service provider; and verifying the decrypted result by checking whether the decrypted sum computed by summing up the encrypted concatenated second data items comprises a predetermined value. The present invention also relates to a corresponding system and corresponding computer program product comprising one or more computer readable media having computer executable instructions for performing the steps of the method.
Abstract:
A method of automatically generating secure code (12, 26) comprises: receiving source code (22) and security constraints (24) for the source code (22), the security constraints (24) encoding, to what extent a variable (44) in the source code (22) is considered secure; and generating secure code (12, 26) from the source code (22) and the security constraints (24) by replacing non-secure operations (46) in the source code (22), which operate on the variables (44) considered as secure, with secure operations (46a); wherein a secure operation (46a) is an operation, which, when applied to at least one encrypted variable (44), generates an encrypted result, which, when decrypted, is the result of the non-secure operation (46) applied to the not encrypted variable (44).
Abstract:
The invention relates to a method and system for detecting and mitigating cabling issues with devices connected in industrial redundant networks. An agent runs on each device and generates information about traffic received at the corresponding device. The agent running on a node generates indicators of traffic received at each port, and error rates for traffic at each port. The agent running on a switch generates information about switch misconfiguration by collecting device identifiers for each port of the switch. The agents send the information to a network manager, which determines switch misconfigurations and wrong cabling from the received information. The network manager also mitigates cabling issues by sending a signal to the affected device(s) or sending a communication to mitigate the issue.
Abstract:
The invention relates to a method for storing data blocks from client devices (1, 4) to a cloud storage system (3), the method comprising the steps of: d) storing an encrypted first data block (2) and a challenge of the first data block (2) of a first client device (1) on the cloud storage system (3), e) determining if a hash of a second data block (5) of a second client device (4) stored on the cloud storage system (3) equals the hash of the first data block (2), f) if yes, transmitting the challenge of the first data block (2) from the cloud storage system (3) to the second client device (4), g) extracting, at the second client device (4), the bits at the positions or at the range contained in the challenge, hashing the extracted bits, encrypting the hashed bits with a public key of the first client device (1) or of the second client device (4) and uploading the encrypted bits from the second client device (4) to the cloud storage system (3), and h) storing the encrypted bits from the second client device (4) on the cloud storage system (3).
Abstract:
A method for evaluating data (28) is based on a computational model, the computational model comprising model data (26), a training function and a prediction function. The method comprises training the computational model by: receiving training data (22) and training result data (24) for training the computational model, and computing the model data (26) from the training data (22) and the training result data (24) with the training function. The method comprises predicting result data (30) by: receiving field data (28) for predicting result data (30); and computing the result data (30) from the field data (28) and the model data (26) with the prediction function. The training data (22) may be plaintext and the training result data (24) may be encrypted with a homomorphic encryption algorithm, wherein the model data (26) may be computed in encrypted form from the training data (22) and the encrypted training result data (24) with the training function. The field data (28) may be plaintext, wherein the result data (30) may be computed in encrypted form from the field data (28) and the encrypted model data (26) with the prediction function.
Abstract:
The invention relates to a method computing a probabilistic encryption scheme for encrypting a data item in an electronic device comprising the steps of: computing a plurality of random bit strings in a computation cluster; sending the computed plurality of random strings to the electronic device; generating a random string (r E ) for using in the encryption scheme in the electronic device using a subset of the plurality of the random strings computed in the computation cluster and encrypting the data item using the random string computed in the electronic device. The present invention also relates to a corresponding system and corresponding computer program product comprising one or more computer readable media having computer executable instructions for performing the steps of the method.
Abstract:
A method for evaluating data (28) is based on a computational model, the computational model comprising model data (26), a training function and a prediction function. The method comprises training the computational model by: receiving training data (22) and training result data (24) for training the computational model, and computing the model data (26) from the training data (22) and the training result data (24) with the training function. The method comprises predicting result data (30) by: receiving field data (28) for predicting result data (30); and computing the result data (30) from the field data (28) and the model data (26) with the prediction function. The training data (22) may be plaintext and the training result data (24) may be encrypted with a homomorphic encryption algorithm, wherein the model data (26) may be computed in encrypted form from the training data (22) and the encrypted training result data (24) with the training function. The field data (28) may be plaintext, wherein the result data (30) may be computed in encrypted form from the field data (28) and the encrypted model data (26) with the prediction function.