-
公开(公告)号:US10929558B2
公开(公告)日:2021-02-23
申请号:US16047399
申请日:2018-07-27
Applicant: Advanced New Technologies Co., Ltd.
Inventor: Ling Xie , Xiaolong Li
Abstract: Encrypted user data are received at a service device from at least one user equipment, and the user data is encrypted in a trusted zone of the at least one user equipment. The encrypted user data then be decrypted in a trust zone of the service device by a first central processing unit (CPU) to obtain decrypted user data. A model is trained by using the decrypted user data to determine a training intermediate value and a training effective representative value, and a determination is made whether the training effective representative value satisfies a specified condition is determined. If so, the trained model is generated based on a model parameter. Otherwise, a model parameter is iterately adjusted and the model is iteratively trained based on an adjusted model parameter until the trained effective representative value satisfies the specified condition.
-
公开(公告)号:US10917426B2
公开(公告)日:2021-02-09
申请号:US16911078
申请日:2020-06-24
Applicant: Advanced New Technologies Co., Ltd.
Abstract: Computer-implemented methods, non-transitory, computer-readable media, and computer-implemented systems for determination of anomalous data are provided. In a computer-implemented method, a plurality of data packets is received within a predetermined time period, the plurality of data packets comprising a data structure. A historical distribution of historical data including the data structure as the data packets is determined. The plurality of data packets is compared to the historical distribution to generate a comparison result. If it is determined that data anomaly exists in the plurality of data packets according to the comparison result, an alert indicating the data anomaly is generated.
-
公开(公告)号:US11792190B2
公开(公告)日:2023-10-17
申请号:US17528101
申请日:2021-11-16
Applicant: Advanced New Technologies Co., Ltd.
Inventor: Qunshan Huang , Xingyu Chen , Ling Xie , Lei Wang
CPC classification number: H04L63/0869 , H04L9/085
Abstract: The implementations provide a method and an apparatus for establishing a trusted cluster. The method is used to form a trusted computing cluster by using N trusted computing units, the method including: grouping the N trusted computing units into a plurality of groups; identifying a first trusted computing unit in each group, and causing first trusted computing units in the plurality of groups to each respectively perform inter-unit trust authentication with other trusted computing units in a same group in parallel; performing inter-group trust authentication between/among the plurality of groups in parallel to obtain the N trusted computing units on which trust authentication succeeds; and propagating secret information in the N trusted computing units on which trust authentication succeeds, so that the N trusted computing units obtain the same secret information to form the trusted computing cluster.
-
公开(公告)号:US11196741B2
公开(公告)日:2021-12-07
申请号:US17161359
申请日:2021-01-28
Applicant: Advanced New Technologies Co., Ltd.
Inventor: Qunshan Huang , Xingyu Chen , Ling Xie , Lei Wang
Abstract: The implementations provide a method and an apparatus for establishing a trusted cluster. The method is used to form a trusted computing cluster by using N trusted computing units, the method including: grouping the N trusted computing units into a plurality of groups; identifying a first trusted computing unit in each group, and causing first trusted computing units in the plurality of groups to each respectively perform inter-unit trust authentication with other trusted computing units in a same group in parallel; performing inter-group trust authentication between/among the plurality of groups in parallel to obtain the N trusted computing units on which trust authentication succeeds; and propagating secret information in the N trusted computing units on which trust authentication succeeds, so that the N trusted computing units obtain the same secret information to form the trusted computing cluster.
-
公开(公告)号:US10917424B2
公开(公告)日:2021-02-09
申请号:US16810961
申请日:2020-03-06
Applicant: Advanced New Technologies Co., Ltd.
Abstract: Computer-implemented methods, non-transitory, computer-readable media, and computer-implemented systems for determination of anomalous data are provided. In a computer-implemented method, a plurality of data packets is received within a predetermined time period, the plurality of data packets comprising a data structure. A historical distribution of historical data including the data structure as the data packets is determined. The plurality of data packets is compared to the historical distribution to generate a comparison result. If it is determined that data anomaly exists in the plurality of data packets according to the comparison result, an alert indicating the data anomaly is generated.
-
-
-
-