Настройки

Укажите год
-

Небесная энциклопедия

Космические корабли и станции, автоматические КА и методы их проектирования, бортовые комплексы управления, системы и средства жизнеобеспечения, особенности технологии производства ракетно-космических систем

Подробнее
-

Мониторинг СМИ

Мониторинг СМИ и социальных сетей. Сканирование интернета, новостных сайтов, специализированных контентных площадок на базе мессенджеров. Гибкие настройки фильтров и первоначальных источников.

Подробнее

Форма поиска

Поддерживает ввод нескольких поисковых фраз (по одной на строку). При поиске обеспечивает поддержку морфологии русского и английского языка
Ведите корректный номера.
Ведите корректный номера.
Ведите корректный номера.
Ведите корректный номера.
Укажите год
Укажите год

Применить Всего найдено 8. Отображено 8.
28-03-2019 дата публикации

ESTABLISHING DATA SECURITY OVER AN INTERNET OF THINGS (IOT) NETWORK

Номер: US20190095640A1
Принадлежит:

Embodiments of the present disclosure provide a technique for establishing data security over an Internet of Things (IoT) network. According to an embodiment, a method includes performing by at least one host entity implemented in a network, tracking distribution of data in the network by maintaining a data location file that includes plurality of parameters of each of plurality of data subsets. The data subsets are distributed in plurality of devices of the network such as key servers, host entities and client entities. The data subsets include any or a combination of an encryption key, a key identifier, a header, an authorization information, a decryption key, a control message, a computer program, a config file, data generated by any client entity of the one or more client entities, and data processed by any host entity of the one or more host entities. 1. A method comprising: storing plurality of device identifiers, each device identifier corresponding to one of plurality of devices connected in the network to allow access and to share information between the plurality of devices, said plurality of devices comprising any or a combination of the one or more host entities, one or more client entities and one or more key servers;', 'storing an association between one or more devices of the plurality of devices, the association being represented as pairing of device identifiers corresponding to the one or more devices connected over a communication link in the network; and', 'tracking distribution of data in the network by maintaining a data location file, said data location file comprising plurality of parameters of each of plurality of data subsets, the plurality of data subsets being distributed in the plurality of devices, wherein each of the plurality of data subsets comprises any or a combination of an encryption key, a key identifier, a header, an authorization information, a decryption key, a control message, a computer program, a config file, data generated ...

Подробнее
27-08-2015 дата публикации

DATA SECURITY MANAGEMENT SYSTEM

Номер: US20150244684A1
Принадлежит:

The present patent application is directed to a data security management system. The system includes a security server configured to store an encryption key to encrypt a file or any data and a decryption key to decrypt the file or the data; a first computing device configured to send an access authorization list with authorization limit to the security server, request an encryption key from the security server, and encrypt the file or data with the encryption key received from the security server; a second computing device configured to request a decryption key from the security server and decrypt the encrypted file with the decryption key received from the security server; and a cloud storage configured to share the file between a first user using the first computing device and a second user using the second computing device. 1. A data security management system comprising:a security server configured to store an encryption key to encrypt a file or any data and a decryption key to decrypt the file or the data;a first computing device configured to send an access authorization list with authorization limit to the security server, request an encryption key from the security server, and encrypt the file or data with the encryption key received from the security server;a second computing device configured to request a decryption key from the security server and decrypt the encrypted file with the decryption key received from the security server; anda storage configured to share the file between a first user using the first computing device and a second user using the second computing device; wherein:the security server is configured to determine whether to send the decryption key to the second computing device upon verifying whether the second user is on the access authorization list and within the authorization limit.2. The data security management system of claim 1 , wherein the first computing device claim 1 , the second computing device claim 1 , the storage claim ...

Подробнее
25-10-2018 дата публикации

ESTABLISHING SECURE COMMUNICATION OVER AN INTERNET OF THINGS (IOT) NETWORK

Номер: US20180309734A1
Принадлежит:

A method includes performing by at least one host entity implemented in a network, receiving an encryption key generated by a key server and a key identifier associated with said encryption key, generating a header comprising an information identifier associated with an information to be protected, the device identifier corresponding to the key server and the key identifier associated with the encryption key, encrypting said information using said encryption key and associating the header with the encrypted information, transmitting said encrypted information and the associated header to a receiving entity and transmitting an authorization information, said key identifier, and said header to the key server. Further, in response to determination that the receiving entity is authorized to access the encrypted information, the receiving entity decrypts the encrypted information using decryption key received from the key server. 1. A method comprising: storing plurality of device identifiers, each device identifier corresponding to one of plurality of devices connected in the network to allow access and to share information between the plurality of devices, said plurality of devices comprising the one or more host entities, one or more client entities and one or more key servers;', 'storing an association between one or more devices of the plurality of devices, the association being represented as pairing of device identifiers corresponding to the one or more devices connected to over a communication link in the network;', 'in response to an encryption key request by the at least one host entity to a key server selected from the one or more key servers, receiving an encryption key generated by the key server and a key identifier associated with said encryption key;', 'generating a header comprising an information identifier associated with an information to be protected, the device identifier corresponding to the key server and the key identifier associated with the ...

Подробнее
04-10-1994 дата публикации

Rotating storage device track format emulation

Номер: CA1332247C
Принадлежит: International Business Machines Corp

ABSTRACT OF THE DISCLOSURE ROTATING STORAGE DEVICE TRACK FORMAT EMULATION Disclosed is a method for recording a record that emulates a first recording format, which includes a track reference point, such as an index field, used for determining a position of a record on a track according to the first recording format, on a moving storage device operating according to a second recording format which also includes a track reference point. The invention comprises the steps, responsive to location information generated according to the first recording formats, of: (1) determining an original angular position of a record according to the first recording format; (2) calculating in response to the original angular position and a parameter a preferred angular position for the record according to the second recording format; (3) determining an actual angular position of the record recorded according to the second recording format; and (4) recording an extension of the record to compensate for the difference between the preferred angular position and the actual angular position.

Подробнее
24-09-2019 дата публикации

Establishing data security over an internet of things (IoT) network

Номер: US10423802B2
Принадлежит: Sky1 Technology Ltd

Embodiments of the present disclosure provide a technique for establishing data security over an Internet of Things (IoT) network. According to an embodiment, a method includes performing by at least one host entity implemented in a network, tracking distribution of data in the network by maintaining a data location file that includes plurality of parameters of each of plurality of data subsets. The data subsets are distributed in plurality of devices of the network such as key servers, host entities and client entities. The data subsets include any or a combination of an encryption key, a key identifier, a header, an authorization information, a decryption key, a control message, a computer program, a config file, data generated by any client entity of the one or more client entities, and data processed by any host entity of the one or more host entities.

Подробнее
14-09-1999 дата публикации

Method and system for detection and reconstruction of corrupted data in a data storage subsystem

Номер: US5951691A
Принадлежит: International Business Machines Corp

The present invention provides a method and system for detecting corrupted data of a plurality of hard disk drives (HDDs) in a data storage subsystem. In this system a predetermined number of fixed blocks within each of the HDDs emulate a track of a first track format. The predetermined number of fixed blocks provide a logical track. The logical track of one of the plurality of HDDs is generated by the others of the plurality of HDDs. The plurality of logical tracks forming a plurality of track groups. In a first aspect the method and system comprises assigning each of the plurality of logical tracks an address translation (ADT) number, comparing each of the ADT numbers of the plurality of logical tracks to an expected value until a mismatch occurs in a logical track, and determining if other logical tracks in a same track group have accurate ADT numbers. The first aspect further includes reconstructing the logical track if the other tracks within the same track group have accurate ADT numbers. In a second aspect the method and system comprises determining each of the plurality of logical tracks is formatted in accordance with first track format, comparing each of the formats of the plurality of logical tracks to the expected format until a mismatch occurs in a logical track, and determining if other logical tracks in a same track group have accurate first track formats. The second aspect includes reconstructing the logical track if the other tracks within the same track group have accurate first formats.

Подробнее
25-12-2018 дата публикации

Establishing secure communication over an internet of things (IoT) network

Номер: US10164951B2
Принадлежит: Skyi Technology Ltd

A method includes performing by at least one host entity implemented in a network, receiving an encryption key generated by a key server and a key identifier associated with said encryption key, generating a header comprising an information identifier associated with an information to be protected, the device identifier corresponding to the key server and the key identifier associated with the encryption key, encrypting said information using said encryption key and associating the header with the encrypted information, transmitting said encrypted information and the associated header to a receiving entity and transmitting an authorization information, said key identifier, and said header to the key server. Further, in response to determination that the receiving entity is authorized to access the encrypted information, the receiving entity decrypts the encrypted information using decryption key received from the key server.

Подробнее
15-07-2015 дата публикации

Data security management system

Номер: EP2893690A1
Принадлежит: Nwstor Ltd

The present patent application is directed to a data security management system. The system includes a security server configured to store an encryption key to encrypt a file or any data and a decryption key to decrypt the file or the data; a first computing device configured to send an access authorization list with authorization limit to the security server, request an encryption key from the security server, and encrypt the file or data with the encryption key received from the security server; a second computing device configured to request a decryption key from the security server and decrypt the encrypted file with the decryption key received from the security server; and a cloud storage configured to share the file between a first user using the first computing device and a second user using the second computing device.

Подробнее