会员体验
专利管家(专利管理)
工作空间(专利管理)
风险监控(情报监控)
数据分析(专利分析)
侵权分析(诉讼无效)
联系我们
交流群
官方交流:
QQ群: 891211   
微信请扫码    >>>
现在联系顾问~
热词
    • 28. 发明专利
    • Computer network apparatus
    • GB2604337A
    • 2022-09-07
    • GB202102750
    • 2021-02-26
    • DEEP SECURE LTD
    • SIMON WISEMAN
    • H04L9/32G06F21/60G06F21/64H04L9/40H04L65/60H04L65/756H04L67/01H04L67/1396
    • A verification unit 7 receives a set of data and a corresponding signature from a first network 1, encrypts the data using an encryption key, and transmits the encrypted data to a second network 2. The verification unit subsequently checks the signature of the data set and if the signature is verified it then also transmits the key to allow decryption of the data at the second network. Sending the encrypted data before verifying the signature reduces the latency period and does not require as much storage at the verification unit. The unit may comprise a verification calculator to calculate a value of a data set which is compared to the signature. A signature checker 12 may decrypt the signature and compare it to the calculated value, verifying the signature if they match. The unit may have a memory 13 for decryption keys. The unit may comprise a key generator 9. Keys may be discarded if the signature is not verified. Transmission of encrypted data may be done concurrently with reception. The second network may comprise a gateway unit 14 to receive the encrypted data and key, the gateway comprising a buffer 16 and a decryption engine 17.
    • 30. 发明专利
    • Processing input data
    • GB2604102A
    • 2022-08-31
    • GB202102251
    • 2021-02-17
    • VALIDSOFT LTD
    • PATRICK MATTHEW CARROLLJOHN PETERSEN
    • H04L9/32G06F21/32G10L15/22H04L9/40
    • A server receives speech data from a client, extracts structured input data from the speech, determines if the speech corresponds to an authorised user and executes a process based on the extracted structured input data. If the speech does not correspond to an authorised user, then this may indicate that the speech has been altered, e.g. intercepted by a man-in-the-middle (MITM) or man-in-the browser (MITB) attack. Extracting structured input from speech may comprise converting the speech into text and extracting the input from the text. Determining that speech comes from an authorised user may be done by comparing speech to a stored sample of the user. Determination that speech is from an authorised user may be done by a biometric authentication server, that may perform the determination using an artificial intelligence (AI). Extraction of structured input data may be done by a speech recognition server or by speech recognition software. Speech data may be received through a web browser or mobile application request. If speech data does correspond to an authorised user, a notification may be sent to the client that the input data may have been modified.