SYSTEMS AND METHODS FOR SCHEDULING OF A SHARED RESOURCE
    1.
    发明申请
    SYSTEMS AND METHODS FOR SCHEDULING OF A SHARED RESOURCE 有权
    用于调度共享资源的系统和方法

    公开(公告)号:US20170034844A1

    公开(公告)日:2017-02-02

    申请号:US14813545

    申请日:2015-07-30

    CPC classification number: H04W74/04 H04W16/12

    Abstract: Generally discussed herein are systems, apparatuses, and methods for scheduling node access to a shared resource. A method can include determining a position assignment for each of a plurality of nodes to create a ring schedule, the ring schedule defining time frames in which each node of the plurality of nodes has access to a resource that is shared among the plurality of nodes, the ring schedule comprising a plurality of epochs, and each of the plurality of epochs comprising a plurality of positions that define a time at which access to the resource begins, each of a plurality of nodes including a position assignment each epoch, and updating the ring schedule including permuting positions of the ring schedule with the position assignment remaining static or changing at least one position assignment in an epoch of the plurality of epochs.

    Abstract translation: 这里通常讨论的是用于调度对共享资源的节点访问的系统,装置和方法。 一种方法可以包括确定多个节点中的每个节点的位置分配以创建环调度,该环调度定义多个节点中的每个节点具有对多个节点之间共享的资源的访问的时间帧, 所述环调度包括多个历元,并且所述多个历元中的每一个包括多个位置,所述多个位置定义对所述资源的访问开始的时间,所述多个节点中的每一个包括每个时期的位置分配,并且更新所述环 时间表包括环位置分配的置换位置,其中位置分配保持静止,或者改变多个时期的时期中的至少一个位置分配。

    VERIFIABLE COMPUTATION FOR CROSS-DOMAIN INFORMATION SHARING

    公开(公告)号:US20230261873A1

    公开(公告)日:2023-08-17

    申请号:US18138399

    申请日:2023-04-24

    CPC classification number: H04L9/3218

    Abstract: Techniques for verifiable computation for cross-domain information sharing are disclosed. An untrusted node in a distributed cross-domain solution (CDS) system is configured to: receive a first data item and a first cryptographic proof associated with the first data item; perform a computation on the first data item including one or more of filtering, sanitizing, or validating the first data item, to obtain a second data item; generate, using a proof-carrying data (PCD) computation, a second cryptographic proof that indicates (a) validity of the first cryptographic proof and (b) integrity of the first computation on the first data item; and transmits the second data item and the second cryptographic proof to a recipient node in the distributed CDS system. Alternatively or additionally, the untrusted node may be configured to transmit a cryptographic proof to a trusted aggregator in the CDS system.

    GEOSPATIAL-TEMPORAL PATHOGEN TRACING IN ZERO KNOWLEDGE

    公开(公告)号:US20220006635A1

    公开(公告)日:2022-01-06

    申请号:US17364048

    申请日:2021-06-30

    Abstract: Techniques for geospatial-temporal pathogen tracing in zero knowledge include: generating, by a first user device, a first proximity token for contact tracing; receiving, by the first user device, a second proximity token from a second user device; generating, by the first user device, a hash based on the first proximity token and the second proximity token; generating, by the first user device using a prover function of a preprocessing zero knowledge succinct non-interactive argument of knowledge (pp-zk-SNARK), a cryptographic proof attesting that an individual associated with the first user device tested positive for a pathogen; transmitting, by the first user device, first publicly verifiable exposure data including at least the cryptographic proof and the hash to a public registry; and applying at least the first publicly verifiable exposure data and second publicly verifiable exposure data to a machine learning model, to obtain actionable intelligence associated with the pathogen.

    Policy-based access control in content networks
    4.
    发明授权
    Policy-based access control in content networks 有权
    内容网络中基于策略的访问控制

    公开(公告)号:US09571463B2

    公开(公告)日:2017-02-14

    申请号:US14330543

    申请日:2014-07-14

    Abstract: Systems and techniques for policy-based access control in content networks are herein described. Content and metadata describing the content may be encrypted by using an access control policy and a cryptographic key associated with the access control policy. The access control policy may be defined with a set of access control attributes. Each node in the content-based network may be assigned a set of access control attributes and a cryptographic key generated as a function of its assigned set of access control attributes. Each node in the content-based network may be configured to decrypt successfully the metadata or the content if and only if the assigned set of access control attributes of the node satisfies the access control policy used to encrypt the metadata or content.

    Abstract translation: 这里描述了用于内容网络中基于策略的访问控制的系统和技术。 可以通过使用访问控制策略和与访问控制策略相关联的加密密钥来加密描述内容的内容和元数据。 访问控制策略可以用一组访问控制属性来定义。 基于内容的网络中的每个节点可以被分配一组访问控制属性和作为其分配的访问控制属性集合的函数而生成的密码密钥。 基于内容的网络中的每个节点可以被配置为当且仅当节点的所分配的一组访问控制属性满足用于加密元数据或内容的访问控制策略时才成功地解密元数据或内容。

    Verifiable computation for cross-domain information sharing

    公开(公告)号:US12058265B2

    公开(公告)日:2024-08-06

    申请号:US18138399

    申请日:2023-04-24

    CPC classification number: H04L9/3218

    Abstract: Techniques for verifiable computation for cross-domain information sharing are disclosed. An untrusted node in a distributed cross-domain solution (CDS) system is configured to: receive a first data item and a first cryptographic proof associated with the first data item; perform a computation on the first data item including one or more of filtering, sanitizing, or validating the first data item, to obtain a second data item; generate, using a proof-carrying data (PCD) computation, a second cryptographic proof that indicates (a) validity of the first cryptographic proof and (b) integrity of the first computation on the first data item; and transmits the second data item and the second cryptographic proof to a recipient node in the distributed CDS system. Alternatively or additionally, the untrusted node may be configured to transmit a cryptographic proof to a trusted aggregator in the CDS system.

    PRIVACY-PRESERVING CONTACT TRACING

    公开(公告)号:US20210365585A1

    公开(公告)日:2021-11-25

    申请号:US17326498

    申请日:2021-05-21

    Abstract: Techniques for privacy-preserving contact tracing are disclosed, including: generating, by a first user device, a first proximity token for contact tracing; receiving, by the first user device, a second proximity token from a second user device; generating, by the first user device, a hash based on the first proximity token and the second proximity token; generating, by the first user device using a prover function of a preprocessing zero knowledge succinct non-interactive argument of knowledge (pp-zk-SNARK), a cryptographic proof attesting that an individual associated with the first user device tested positive for a pathogen; and transmitting, by the first user device, publicly verifiable exposure data including at least the cryptographic proof and the hash to a public registry.

    RAPID AND VERIFIABLE NETWORK CONFIGURATION REPAIR

    公开(公告)号:US20210029015A1

    公开(公告)日:2021-01-28

    申请号:US16518712

    申请日:2019-07-22

    Abstract: Discussed herein is technology for verifiable network configuration repair. A method can include adding a routing adjacency or route redistribution edge to a router of an aETG to generate an enhanced aETG (eaETG), adding, for each dETG of dETGs, static route edges to a destination of the dETG to generate an enhanced dETG (edETG), determining, for each of the edETGs, all simple paths from all sources to the destination of the edETG, determining a set of paths (pathset) over the determined simple paths that satisfies the policies, and translating the edge additions and/or removals in the eaETG and in the edETGs to an addition and/or removal of one or more of a routing adjacency, routing filter, or static route based on the determined pathset.

    CRYPTOGRAPHICALLY SECURE CROSS-DOMAIN INFORMATION SHARING

    公开(公告)号:US20170093817A1

    公开(公告)日:2017-03-30

    申请号:US14958089

    申请日:2015-12-03

    Abstract: Techniques for cryptographically secure, cross-domain information sharing are described. A first information domain including a first attribute-based encryption (ABE) authority defines a first universe of ABE attributes. Plaintext is encrypted using ABE encryption, producing ABE ciphertext. The ABE encryption uses an ABE access control expression defined with a set of ABE attributes comprising a first ABE attribute subset from the first universe of ABE attributes and second ABE attribute subset from a second universe of ABE attributes defined by a second ABE authority of a second information domain. The ABE ciphertext and the ABE access control expression are combined to produce an ABE package. The ABE package is encrypted, using predicate-based encryption (PBE), producing a PBE ciphertext. The PBE encryption uses a first set of PBE attributes from a universe of PBE attributes defined by a PBE authority.

    Verifiable computation for cross-domain information sharing

    公开(公告)号:US11637702B2

    公开(公告)日:2023-04-25

    申请号:US17172825

    申请日:2021-02-10

    Abstract: Techniques for verifiable computation for cross-domain information sharing are disclosed. An untrusted node in a distributed cross-domain solution (CDS) system is configured to: receive a first data item and a first cryptographic proof associated with the first data item; perform a computation on the first data item including one or more of filtering, sanitizing, or validating the first data item, to obtain a second data item; generate, using a proof-carrying data (PCD) computation, a second cryptographic proof that indicates (a) validity of the first cryptographic proof and (b) integrity of the first computation on the first data item; and transmits the second data item and the second cryptographic proof to a recipient node in the distributed CDS system. Alternatively or additionally, the untrusted node may be configured to transmit a cryptographic proof to a trusted aggregator in the CDS system.

Patent Agency Ranking