-
1.
公开(公告)号:US20170034844A1
公开(公告)日:2017-02-02
申请号:US14813545
申请日:2015-07-30
Applicant: Raytheon BBN Technologies Corp.
Inventor: Joud Khoury , Christophe Jean-Claude Merlin , Dan Alan Coffin
Abstract: Generally discussed herein are systems, apparatuses, and methods for scheduling node access to a shared resource. A method can include determining a position assignment for each of a plurality of nodes to create a ring schedule, the ring schedule defining time frames in which each node of the plurality of nodes has access to a resource that is shared among the plurality of nodes, the ring schedule comprising a plurality of epochs, and each of the plurality of epochs comprising a plurality of positions that define a time at which access to the resource begins, each of a plurality of nodes including a position assignment each epoch, and updating the ring schedule including permuting positions of the ring schedule with the position assignment remaining static or changing at least one position assignment in an epoch of the plurality of epochs.
Abstract translation: 这里通常讨论的是用于调度对共享资源的节点访问的系统,装置和方法。 一种方法可以包括确定多个节点中的每个节点的位置分配以创建环调度,该环调度定义多个节点中的每个节点具有对多个节点之间共享的资源的访问的时间帧, 所述环调度包括多个历元,并且所述多个历元中的每一个包括多个位置,所述多个位置定义对所述资源的访问开始的时间,所述多个节点中的每一个包括每个时期的位置分配,并且更新所述环 时间表包括环位置分配的置换位置,其中位置分配保持静止,或者改变多个时期的时期中的至少一个位置分配。
-
公开(公告)号:US20230261873A1
公开(公告)日:2023-08-17
申请号:US18138399
申请日:2023-04-24
Applicant: Raytheon BBN Technologies Corp.
Inventor: Joud Khoury , Michael Hassan Atighetchi , Zachary Ratliff
IPC: H04L9/32
CPC classification number: H04L9/3218
Abstract: Techniques for verifiable computation for cross-domain information sharing are disclosed. An untrusted node in a distributed cross-domain solution (CDS) system is configured to: receive a first data item and a first cryptographic proof associated with the first data item; perform a computation on the first data item including one or more of filtering, sanitizing, or validating the first data item, to obtain a second data item; generate, using a proof-carrying data (PCD) computation, a second cryptographic proof that indicates (a) validity of the first cryptographic proof and (b) integrity of the first computation on the first data item; and transmits the second data item and the second cryptographic proof to a recipient node in the distributed CDS system. Alternatively or additionally, the untrusted node may be configured to transmit a cryptographic proof to a trusted aggregator in the CDS system.
-
公开(公告)号:US20220006635A1
公开(公告)日:2022-01-06
申请号:US17364048
申请日:2021-06-30
Applicant: Raytheon BBN Technologies Corp.
Inventor: Daniel Alan Gregory , Prithwish Basu , Zachary Ratliff , Siddharth Pal , Kimberly Gavin , Benjamin Montgomery , Joud Khoury
Abstract: Techniques for geospatial-temporal pathogen tracing in zero knowledge include: generating, by a first user device, a first proximity token for contact tracing; receiving, by the first user device, a second proximity token from a second user device; generating, by the first user device, a hash based on the first proximity token and the second proximity token; generating, by the first user device using a prover function of a preprocessing zero knowledge succinct non-interactive argument of knowledge (pp-zk-SNARK), a cryptographic proof attesting that an individual associated with the first user device tested positive for a pathogen; transmitting, by the first user device, first publicly verifiable exposure data including at least the cryptographic proof and the hash to a public registry; and applying at least the first publicly verifiable exposure data and second publicly verifiable exposure data to a machine learning model, to obtain actionable intelligence associated with the pathogen.
-
公开(公告)号:US09571463B2
公开(公告)日:2017-02-14
申请号:US14330543
申请日:2014-07-14
Applicant: Raytheon BBN Technologies Corp.
Inventor: William Timothy Strayer , Joud Khoury , Armando Luis Caro, Jr. , Vikas Kawadia , Samuel Cunningham Nelson, V
CPC classification number: H04L63/0428 , H04L9/088 , H04L63/105 , H04L63/20 , H04L67/10 , H04L67/1095 , H04L67/20
Abstract: Systems and techniques for policy-based access control in content networks are herein described. Content and metadata describing the content may be encrypted by using an access control policy and a cryptographic key associated with the access control policy. The access control policy may be defined with a set of access control attributes. Each node in the content-based network may be assigned a set of access control attributes and a cryptographic key generated as a function of its assigned set of access control attributes. Each node in the content-based network may be configured to decrypt successfully the metadata or the content if and only if the assigned set of access control attributes of the node satisfies the access control policy used to encrypt the metadata or content.
Abstract translation: 这里描述了用于内容网络中基于策略的访问控制的系统和技术。 可以通过使用访问控制策略和与访问控制策略相关联的加密密钥来加密描述内容的内容和元数据。 访问控制策略可以用一组访问控制属性来定义。 基于内容的网络中的每个节点可以被分配一组访问控制属性和作为其分配的访问控制属性集合的函数而生成的密码密钥。 基于内容的网络中的每个节点可以被配置为当且仅当节点的所分配的一组访问控制属性满足用于加密元数据或内容的访问控制策略时才成功地解密元数据或内容。
-
公开(公告)号:US12058265B2
公开(公告)日:2024-08-06
申请号:US18138399
申请日:2023-04-24
Applicant: Raytheon BBN Technologies Corp.
Inventor: Joud Khoury , Michael Hassan Atighetchi , Zachary Ratliff , Katarzyna Lucja Olejnik
IPC: H04L9/32
CPC classification number: H04L9/3218
Abstract: Techniques for verifiable computation for cross-domain information sharing are disclosed. An untrusted node in a distributed cross-domain solution (CDS) system is configured to: receive a first data item and a first cryptographic proof associated with the first data item; perform a computation on the first data item including one or more of filtering, sanitizing, or validating the first data item, to obtain a second data item; generate, using a proof-carrying data (PCD) computation, a second cryptographic proof that indicates (a) validity of the first cryptographic proof and (b) integrity of the first computation on the first data item; and transmits the second data item and the second cryptographic proof to a recipient node in the distributed CDS system. Alternatively or additionally, the untrusted node may be configured to transmit a cryptographic proof to a trusted aggregator in the CDS system.
-
公开(公告)号:US20210365585A1
公开(公告)日:2021-11-25
申请号:US17326498
申请日:2021-05-21
Applicant: Raytheon BBN Technologies Corp.
Inventor: Zachary Ratliff , Joud Khoury
Abstract: Techniques for privacy-preserving contact tracing are disclosed, including: generating, by a first user device, a first proximity token for contact tracing; receiving, by the first user device, a second proximity token from a second user device; generating, by the first user device, a hash based on the first proximity token and the second proximity token; generating, by the first user device using a prover function of a preprocessing zero knowledge succinct non-interactive argument of knowledge (pp-zk-SNARK), a cryptographic proof attesting that an individual associated with the first user device tested positive for a pathogen; and transmitting, by the first user device, publicly verifiable exposure data including at least the cryptographic proof and the hash to a public registry.
-
公开(公告)号:US20210029015A1
公开(公告)日:2021-01-28
申请号:US16518712
申请日:2019-07-22
Applicant: Raytheon BBN Technologies Corp.
Inventor: Joud Khoury , Michael Brandon Kremer
IPC: H04L12/751 , H04L12/703
Abstract: Discussed herein is technology for verifiable network configuration repair. A method can include adding a routing adjacency or route redistribution edge to a router of an aETG to generate an enhanced aETG (eaETG), adding, for each dETG of dETGs, static route edges to a destination of the dETG to generate an enhanced dETG (edETG), determining, for each of the edETGs, all simple paths from all sources to the destination of the edETG, determining a set of paths (pathset) over the determined simple paths that satisfies the policies, and translating the edge additions and/or removals in the eaETG and in the edETGs to an addition and/or removal of one or more of a routing adjacency, routing filter, or static route based on the determined pathset.
-
公开(公告)号:US20180234996A1
公开(公告)日:2018-08-16
申请号:US15385821
申请日:2016-12-20
Applicant: Raytheon Company , Raytheon BBN Technologies Corp.
Inventor: Joud Khoury , Christopher Paul Vander Valk , Michael Brandon Kremer , Subramanian Ramanathan , Jeffery Jay Logan , Charles Hansen
CPC classification number: H04W72/1263 , G01S7/006 , G01S7/023 , G06F17/30958 , H04L5/0016 , H04L5/006 , H04L5/0073 , H04W72/0453 , H04W72/082 , H04W72/121
Abstract: Generally discussed herein are systems, devices, and methods for scheduling node performance of communication and/or function. A method can include receiving, from a plurality of nodes, parameters indicating a trajectory and position of each of the plurality of nodes, creating a directed communication graph, creating a communications conflict graph, creating a function conflict graph indicating which function performed by one node of the plurality of nodes interferes with at least one of a function and communication performed by another node of the plurality of nodes, creating a universal conflict graph based on the communications conflict graph and the function conflict graph, creating a schedule for communication and function performance for each of the nodes based on the universal conflict graph, and providing data indicative of the schedule to nodes of the plurality of nodes.
-
公开(公告)号:US20170093817A1
公开(公告)日:2017-03-30
申请号:US14958089
申请日:2015-12-03
Applicant: Raytheon BBN Technologies Corp.
Inventor: Joud Khoury , William Timothy Strayer
CPC classification number: H04L63/0471 , G06F21/62 , H04L9/006 , H04L9/3073 , H04L63/105
Abstract: Techniques for cryptographically secure, cross-domain information sharing are described. A first information domain including a first attribute-based encryption (ABE) authority defines a first universe of ABE attributes. Plaintext is encrypted using ABE encryption, producing ABE ciphertext. The ABE encryption uses an ABE access control expression defined with a set of ABE attributes comprising a first ABE attribute subset from the first universe of ABE attributes and second ABE attribute subset from a second universe of ABE attributes defined by a second ABE authority of a second information domain. The ABE ciphertext and the ABE access control expression are combined to produce an ABE package. The ABE package is encrypted, using predicate-based encryption (PBE), producing a PBE ciphertext. The PBE encryption uses a first set of PBE attributes from a universe of PBE attributes defined by a PBE authority.
-
公开(公告)号:US11637702B2
公开(公告)日:2023-04-25
申请号:US17172825
申请日:2021-02-10
Applicant: Raytheon BBN Technologies Corp.
Inventor: Joud Khoury , Michael Hassan Atighetchi , Zachary Ratliff
IPC: H04L9/32
Abstract: Techniques for verifiable computation for cross-domain information sharing are disclosed. An untrusted node in a distributed cross-domain solution (CDS) system is configured to: receive a first data item and a first cryptographic proof associated with the first data item; perform a computation on the first data item including one or more of filtering, sanitizing, or validating the first data item, to obtain a second data item; generate, using a proof-carrying data (PCD) computation, a second cryptographic proof that indicates (a) validity of the first cryptographic proof and (b) integrity of the first computation on the first data item; and transmits the second data item and the second cryptographic proof to a recipient node in the distributed CDS system. Alternatively or additionally, the untrusted node may be configured to transmit a cryptographic proof to a trusted aggregator in the CDS system.
-
-
-
-
-
-
-
-
-