8,315 research outputs found

    An Outline of Security in Wireless Sensor Networks: Threats, Countermeasures and Implementations

    Full text link
    With the expansion of wireless sensor networks (WSNs), the need for securing the data flow through these networks is increasing. These sensor networks allow for easy-to-apply and flexible installations which have enabled them to be used for numerous applications. Due to these properties, they face distinct information security threats. Security of the data flowing through across networks provides the researchers with an interesting and intriguing potential for research. Design of these networks to ensure the protection of data faces the constraints of limited power and processing resources. We provide the basics of wireless sensor network security to help the researchers and engineers in better understanding of this applications field. In this chapter, we will provide the basics of information security with special emphasis on WSNs. The chapter will also give an overview of the information security requirements in these networks. Threats to the security of data in WSNs and some of their counter measures are also presented

    CREDIT POINTS EXCHANGE

    Get PDF
    The present disclosure relates to a method and a system for establishing a credit exchange platform that allows users to effectively utilize the unused credit points. In an embodiment, the present disclosure discloses aggregating the credit points accumulated on multiple credit cards using the credit exchange platform. Further, the disclosure suggests allowing the users to redeem the aggregated credit points or sell them to a different user, resulting in effective and best use of the credit points

    SYSTEM AND METHOD FOR REVOKING COMPROMISED CRYPTOGRAPHIC KEY FROM DATABASE

    Get PDF
    The present disclosure provides a system and a method for revoking compromised cryptographic key from a database. The proposed system provides a database which is a graph that stores information on dependencies between a working key and cryptographic algorithms and keys used in establishing the working keys. The proposed system upon identifying the compromised keys revokes the compromised cryptographic keys and corresponding keys from the database. The proposed system provides data security and an efficient revocation process of the compromised cryptographic keys

    SYSTEM AND METHOD FOR PROVIDING SECURE BNPL FOR B2B

    Get PDF
    The present disclosure provides a method and prediction system for providing secure BNPL for B2B using federated blockchain and AI. The prediction system provides shared digital ledger using federated blockchain i.e., by using shared digital ledger, participants can see history and transfer of assets and identify fraudulent transactions easily. Further, the prediction system provides secure BNPL using Deep Learning. The prediction system performs data pre-processing and feature engineering. Further, the prediction system analyses business using machine learning models. Thereafter, the prediction system performs BNPL amount prediction using neural networks and regression. Thus, the present disclosure prevents frauds and provides loaning for secure BNPL for B2B. Figures 3a-3

    SYSTEM AND METHOD TO MAINTAIN USER PROFILE IN METAVERSE

    Get PDF
    The present disclosure provides a method and system for maintaining user profile in metaverse. The system integrates user identity, wallets, integrated payment methods, subscriptions and access controls with various metaverse systems. Initially, user creates a digital identity on blockchain by verifying identity through a government-issued ID or similar secure means. This identity is used as a unique identifier within the metaverse and acts as a user profile. Further, these user profiles are used to implement access controls, ensuring that the users have the appropriate level of access to different areas of the metaverse systems. Thus, the present disclosure prevents the user from the need to remember credentials for authentication to use different metaverse systems

    GENERIC SYSTEM AND METHOD FOR JSON DATA PARSING

    Get PDF
    The present disclosure provides a method and system that is generic for automatic JSON data parsing. The system obtains the JSON data of various structures as input for parsing. During the parsing, if the JSON data is not valid or corrupt then the system filters out that JSON data and stores at a different location. Thereafter, the system parses the JSON data from top to bottom after analysing each key and stores the values of each key. During the parsing, a schema of the JSON data is created by the system. The system derives unique names of column after analysing the schema and stores the value corresponding to its column name. Upon deriving the column name and values, the system stores them in a data frame, or a file. The present disclosure prevents manually intervention and automatically parse the various JSON data. Figure 1

    METHOD AND SYSTEM FOR DETERMINING SUSTAINABILITY INFORMATION IN AUTHORISATION MESSAGE

    Get PDF
    The present disclosure relates to method and system for calculating sustainability information in authorisation message based on transaction data. The present invention uses payment rails, sourcing for delivering sustainability information. The method also comprises sourcing and providing payment network entities and consumers the information on carbon intensity of a purchase. The present disclosure provides a solution for calculating the sustainability score of the registered Permanent Account Number (PAN) using transaction history, where transaction history is used to establish direct connectivity between merchants and issuers for the purpose of processing card transactions

    IOT DEVICES AS PAYMENT INSTRUMENT FOR ATM TRANSACTIONS

    Get PDF
    The present disclosure relates to a method and a system for performing Automated Teller Machine (ATM) transactions using a user payment instrument without a physical bank-issued card. According to the present disclosure, a user requests an ATM to perform a user transaction request such as withdrawal of funds from the user account or depositing funds to the user account. Based on the user transaction request, the ATM generates a Quick Response (QR) code with payment information. Thereafter, a user payment instrument may be used to scan the generated QR code, which opens an authentication application, after the user payment instrument is authenticated. Further, the user account details are loaded onto the user payment instrument to perform the financial transaction on the ATM without the physical bank-issued cards
    • …
    corecore