» 有关网络安全的最新出版物和专利

有关网络安全的最新出版物和专利

网络安全

这是我们最新精选的有关网络安全的全球英文出版物和专利,涉及许多科学在线期刊,分类集中于网络安全、恶意软件、网络钓鱼和防火墙、 加密威胁情报、零时差漏洞利用、拒绝服务、数据泄露和威胁情报。

Network-independent dynamic encryption

Patent published on the 2025-03-06 in WO under Ref WO2025049427 by CONC3AL INC [US] (Ilic Igor [us], Quinn Cary [us], Chase Charles [us], Nastasi Franklin [us])

Abstract: A computer-implemented method to improve the safety of digital documents and assets, including for example digital tickets, may include the steps of: generating a salt/public key by obtaining a longitude and latitude of an event attendee smart device GPS chip and obtaining a time stamp from the smart device operating system; creating a static and unique ID; creating a data carrier/glyph/code, such creating a new quick response code, in intervals using data to be rehashed comprising the unique ID[...]


Our summary: A method for enhancing digital document safety by generating unique IDs and using GPS data to create dynamic encryption codes for validation.

dynamic encryption, digital documents, GPS chip, quick response code

Patent

Method and apparatus for confirming boarding of passenger in uam environment

Patent published on the 2025-03-06 in WO under Ref WO2025048366 by KIA CORP [KR] (Jung Chang Hun [kr], Park Seung Wook [kr])

Abstract: A method and an apparatus for confirming boarding of a passenger in a UAM environment are disclosed. According to one aspect of the present disclosure, the provided method, which is performed by a fuselage system supporting a function of checking whether a user has boarded a fuselage and taken a reserved seat, comprises the steps of: receiving, from a user terminal, a first encryption token including reservation information of the user and identification proof information; receiving, from a flig[...]


Our summary: Method and apparatus for confirming boarding of passenger in UAM environment by using encryption tokens and symmetric key to verify user reservation and seat allocation.

boarding, passenger, UAM, fuselage

Patent

Electronic device, sink device, and control method thereof

Patent published on the 2025-03-06 in WO under Ref WO2025048378 by SAMSUNG ELECTRONICS CO LTD [KR] (Jee Hojeen [kr])

Abstract: An electronic device, a method for controlling the electronic device, a sink device, and a method for controlling the sink device are disclosed. Specifically, the electronic device may include: a communication unit; a memory for storing audio content; and a processor for broadcasting a first signal including the audio content in an encrypted state through the communication unit, wherein the processor: controls the communication unit to transmit a second signal including identification informatio[...]


Our summary: An electronic device and sink device control method involving encrypted audio content transmission and password sharing.

electronic device, control method, sink device, communication unit

Patent

Method and apparatus for supporting protection for control frame in wireless lan system

Patent published on the 2025-03-06 in WO under Ref WO2025048620 by LG ELECTRONICS INC [KR] (Baek Sunhee [kr], Choi Jinsoo [kr], Jang Insun [kr], Kim Geonhwan [kr], Yoon Yelin [kr], Cha Dongju [kr])

Abstract: Disclosed are a method and an apparatus for supporting protection for a control frame in a wireless LAN system. A method performed by a first STA in a wireless local area network (WLAN) system, according to an embodiment of the present disclosure, may comprise the steps of: identifying key information related to protection for a control frame; receiving, from a second STA, a control frame comprising information encrypted on the basis of a specific encryption protocol; and decrypting the encrypte[...]


Our summary: Method and apparatus for supporting protection for control frame in wireless LAN system, including identifying key information, receiving encrypted control frame, and decrypting for integrity check.

wireless LAN, protection, control frame, encryption

Patent

Method and apparatus for supporting protection of control frame in wireless lan system

Patent published on the 2025-03-06 in WO under Ref WO2025048617 by LG ELECTRONICS INC [KR] (Baek Sunhee [kr], Choi Jinsoo [kr], Jang Insun [kr], Kim Geonhwan [kr], Yoon Yelin [kr], Cha Dongju [kr])

Abstract: Disclosed are a method and an apparatus for supporting protection of a control frame in a wireless LAN system. The method performed by a first STA in a wireless local area network (WLAN) system, according to an embodiment of the present disclosure, may comprise the steps of: checking key information related to protection of a control frame; on the basis of a specific encryption protocol, receiving a control frame including encrypted information from a second STA; and on the basis of the key info[...]


Our summary: Method and apparatus for protecting control frames in a wireless LAN system by checking key information, receiving encrypted control frames, and performing decryption and integrity check based on the key information.

wireless LAN, control frame, encryption protocol, decryption

Patent

Identifying a phishing attempt

Patent published on the 2025-02-19 in EP under Ref EP4510508 by BLACKBERRY LTD [CA] (Sircar Shiladitya [ca])

Abstract: Systems, methods, and software can be used to determine a classification of a network accessible page, for example a web page on Internet. In some aspects, a method comprises receiving, at a gateway, a request for accessing a network accessible page from an end-user device; processing the network accessible page to generate a first embedding that characterizes network attributes of a domain of the network accessible page, and a second embedding that characterizes content attributes of the networ[...]


Our summary: Systems, methods, and software for identifying phishing attempts by analyzing network accessible pages, generating scores based on network and content attributes, and determining page classification.

Phishing, Classification, Network, Embedding

Patent

A Systematic Bibliometric Review

Published on 2025-02-18 by Ruhaimatu Abudu, Raj Bridgelall, Bright Parker Quayson, Denver Tolliver, Kwabena Dadson @MDPI

Abstract: Cybersecurity challenges are increasing in the rail industry because of constant technological evolution that includes the Internet of Things, blockchains, automation, and artificial intelligence. Consequently, many railroads and supply chain stakeholders have implemented strategies and practices to address these challenges. However, the pace of cybersecurity implementation in the railroad industry is slow even as cyberthreats escalate. This study uniquely integrates bibliometric analysis with a[...]


Our summary: Systematic review of cybersecurity challenges in the rail industry, Integration of bibliometric analysis, Recommendations for stakeholders to address cybersecurity risks.

Cybersecurity, Rail industry, Bibliometric analysis, Technological evolution

Publication

A Blockchain-Based Smart Contract Approach

Published on 2025-02-15 by Abdullahi Chowdhury, Sakib Shahriar Shafin, Saleh Masum, Joarder Kamruzzaman, Shi Dong @MDPI

Abstract: Increasing adoption of electric vehicles (EVs) and the expansion of EV charging infrastructure present opportunities for enhancing sustainable transportation within smart cities. However, the interconnected nature of EV charging stations (EVCSs) exposes this infrastructure to various cyber threats, including false data injection, man-in-the-middle attacks, malware intrusions, and denial of service attacks. Financial attacks, such as false billing and theft of credit card information, also pose s[...]


Our summary: Blockchain-based smart contract approach for enhancing sustainable transportation within smart cities, mitigating cyber threats in EV charging stations, and increasing user trust in EVCS systems.

Blockchain, Smart Contract, Hyperledger Fabric, EV Charging Infrastructure

Publication

目录
    إضافة رأس لبدء إنشاء جدول المحتويات

    设计或项目挑战?
    机械工程师、项目或研发经理
    有效的产品开发

    可在法国和瑞士短期内接受新的挑战。
    通过 LinkedIn 联系我
    塑料和金属制品、按成本设计、人体工程学、中高产量、受监管行业、CE 和 FDA、CAD、Solidworks、精益西格玛黑带、医疗 ISO 13485 II 级和 III 级

    我们正在寻找新的赞助商

     

    贵公司或机构从事技术、科学或研究工作?
    > 给我们发送消息 <

    接收所有新文章
    免费,无垃圾邮件,电子邮件不分发也不转售

    或者您可以免费获得完整会员资格以访问所有受限制的内容>这里<

    涵盖的主题: 网络安全、恶意软件、网络钓鱼、防火墙、加密、零日漏洞、拒绝服务、数据泄露、威胁情报、区块链、基于属性的动态访问控制、零信任、边缘计算、雾计算、6G 网络、数字文档、快速反应代码和 UAM。

    1. Livia Sullivan

      Interesting read, but do these new cybersecurity patents really guarantee increased data protection or are they just corporate power-plays? Thoughts?

    2. Berkley Harding

      Interesting read, but dont you think we should focus more on practical solutions rather than patenting cybersecurity innovations?

    3. Layton

      Interesting read, but dont you think focusing on cyber threats from AI rather than human hackers would be more relevant in future discussions?

    4. Bexley

      Are patents potentially stifling innovation in cybersecurity?

    评论已关闭。

    相关文章

    滚动至顶部

    你可能还喜欢