Open Invention Network Announces Continued Expansion of its Open Source Patent Non …

exFAT, Hyperledger, Hadoop, Android AOSP 10 and Robot OS are among the new software packages now included under the protective umbrella of the Linux System definition.

Durham, NC (October 13, 2020)Open Invention Network (OIN), the largest patent non-aggression community in history, announced today that it has further reduced patent risk associated with core Linux and adjacent open source code through the measured expansion of the scope of its Linux System Definition. To keep pace with innovation and safeguard broad-based adoption of open source code, Open Invention Network periodically revises its Linux System coverage to include core code drawn from the growing number of important open source projects.

In the current Linux System definition update, OIN’s ever-expanding licensee community will benefit from patent risk mitigation associated with the use of core software packages drawn from Hyperledger, Apache Avro, Kafka, Spark, Hadoop, Automotive Grade Linux (AGL), Robot Operating System (ROS), KDE Frameworks, Android AOSP 10, Eclipse Paho and Mosquito, among others. Of particular note, OIN is incorporating the Linux implementations of exFAT into the scope of patent non-aggression by virtue of this update. In total, the expansion includes 520 new software components, bringing the total number of Linux System-protected packages to 3,393.

“Linux and open-source software proliferation accelerates the pace of innovation across industries as software becomes an increasingly important source of differentiation,” said Keith Bergelt, CEO of Open Invention Network. “This Linux System expansion enables OIN to keep pace with open source innovation, promoting patent non-aggression in the core. As open source grows, we will continue the measured expansion of the Linux System and, at the same time, recruit more companies into the OIN community to further mitigate patent risk associated with the use of core open-source code.”

About Open Invention Network

Open Invention Network (OIN) is the largest patent non-aggression community in history and supports freedom of action in Linux as a key element of open source software (OSS). Patent non-aggression in core technologies is a cultural norm within OSS, so that the litmus test for authentic behavior in the OSS community includes OIN membership. Funded by Google, IBM, NEC, Philips, Red Hat, Sony, SUSE and Toyota, OIN has more than 2,750 community members and owns more than 1,300 global patents and applications. The OIN patent license and member cross-licenses are available royalty-free to any party that joins the OIN community.

Related:

  • No Related Posts

How to Use VPX Check-In/Check-Out Licenses for Auto-Provisioning of VPX in NSX Environment

Step 1: Login to MAS and go to Networks > Licenses > select Upload licenses file from a local computer if you have license file or select Use license access code if you have access codes. Below steps are shown for “upload license files from a local computer”.

User-added image

Step 2: Click Browse button and upload the license file and click Finish button.

User-added image

Step 3: Verify the entry of the license file upload and “VPX licenses” appear under licenses

User-added image

Step 4: Click on the VPX licenses to see the available and used VPX licenses.

User-added image

Step 5: Go to Orchestration > SDN Orchestration > VMware NSX manager > Service Packages, click Add to create a service package and select the licenses from the drop-down.

User-added image

User-added image

When this service package is used in NSX to provision a VPX, VPX will know that the MAS is the license server and will check-out the license specified in the service package, when it gets de-provisioned it checks back the license to MAS.

Related:

Sumitomo Mitsui Financial Group Joins the Open Invention Network Community

DURHAM, N.C., June 23, 2020 (GLOBE NEWSWIRE) — Open Invention Network (OIN), the largest patent non-aggression community in history, announced today that Sumitomo Mitsui Financial Group, Inc. (SMFG) has joined as a community member. SMFG is one of the largest financial institutions headquartered in Japan, with an established presence across all consumer and corporate banking businesses. Focused on digital innovation through fintech and open innovation, SMFG harnesses open source technology to meet its clients’ financial needs. By joining OIN, SMFG is demonstrating its commitment to patent non-aggression in open source software (OSS), a key component in its banking platforms and applications.

“The financial services and fintech industries are increasingly relying on open source technologies, including blockchain technologies such as Hyperledger. Global leaders that recognize the benefits of open source technologies are building robust feature-rich platforms to make them more effective for commercial and consumer clients,” said Keith Bergelt, CEO of Open Invention Network. “We are pleased that SMFG has joined our community and committed to patent non-aggression in Linux and adjacent open source technologies.”

SMFG stated, “As a global solutions provider that grows with customers and society through the highest level of trust, SMFG is committed to creating businesses that transcend the boundaries of finance and resolving issues. In order to further promote this effort and quickly deliver high added-value services to our customers and society, SMFG believes that the utilization of open source software will be essential. Also, in promoting OSS utilization, SMFG believes that measures to protect intellectual property rights are important. Through joining the OIN, SMFG hopes to deepen our understanding of the OSS community and contribute to the development of OSS.”

OIN’s community practices patent non-aggression in core Linux and adjacent open source technologies by cross-licensing Linux System patents to one another on a royalty-free basis. Patents owned by OIN are similarly licensed royalty-free to any organization that agrees not to assert its patents against the Linux System. The OIN license can be signed online at http://www.j-oin.net/.

About Hyperledger

Hyperledger is an open source collaborative effort created to advance cross-industry blockchain technologies. It is a global collaboration including leaders in finance, banking, healthcare, supply chains, manufacturing and technology. Hyperledger hosts many enterprise blockchain technology projects including distributed ledger frameworks, smart contract engines, client libraries, graphical interfaces, utility libraries and sample applications. All Hyperledger code is built publicly and available under the Apache license. The Linux Foundation hosts Hyperledger under the foundation. To learn more, visit https://www.hyperledger.org/.

About Sumitomo Mitsui Financial Group, Inc. (SMFG)

SMFG is one of the largest financial institutions headquartered in Japan, with an established presence across all consumer and corporate banking businesses. Through the subsidiaries and affiliates, SMFG offers a diverse range of financial services, including commercial banking, leasing, securities, credit card, consumer finance and other services. SMFG’s consolidated total assets were ¥ 212.4 trillion as of December 31, 2019.

About Sumitomo Mitsui Banking Corporation (SMBC)

SMBC is a commercial banking entity within SMBC Group and is one of the largest commercial banks globally on the basis of total assets. It provides an extensive range of corporate and consumer banking services in Japan and globally.

About Open Invention Network

Open Invention Network (OIN) is the largest patent non-aggression community in history and supports freedom of action in Linux as a key element of open source software (OSS). Patent non-aggression in core technologies is a cultural norm within OSS, so that the litmus test for authentic behavior in the OSS community includes OIN membership. Funded by Google, IBM, NEC, Philips, Sony, SUSE and Toyota, OIN has more than 3,200 community members and owns more than 1,300 global patents and applications. The OIN patent license and member cross-licenses are available royalty-free to any party that joins the OIN community.

For more information, visit http://www.openinventionnetwork.com.

Media-Only Contact:

Ed Schauweker

AVID Public Relations for Open Invention Network

ed@avidpr.com

+1 (703) 963-5238


Related:

Enthusiasts of Bolivia to promote the use of digital signatures to improve services | Breaking News

Key facts:

The regulations of the bolivian disallow the use of criptoactivos, but not the certification in blokchain.Analysts bolivian clarify the difference between an electronic signature and a digital.Digital signatures are a technology-based solution that seeks to provide security and trust to electronic documents, and the community of enthusiastic Bolivian Mind Blockchain (BMB) sees it as the future of digital identity. This is why the promote with the aim of improving the services of public and private agencies in that country.Gabriela Melendrez Alaro, founder of the collective BMB, explained to Breaking News that the digital signature can be used to authenticate a user in the Internet systems of many public institutions. By means of this instrument the documents acquire legal value and character of evidence, to allow you to create files with more security than a handwritten signature.In the opinion of the founder of BMB, through the use of digital signatures reduces the use and transport of paper, and promotes the quantity and quality of services oriented to customers of the state and private institutions.He also explained that the network that is used for the development of this virtual instrument in Bolivia, is the platform of Hyperledger Fabric. But, why use a platform blockchain? The founder of BMB argues that it is a distributed system distinguished notably by its ability of consensus among participants.It also points out that its technology of distributed database between computers allows that, once entered in her codes, they remain there forever. With this “guarantee a transaction, an agreement or an identity, that lets you encrypt the elements that have to do with privacy”.

Blockchain and the security of the data

Around the security of the data is delivered Erick Poppe Yanez, electronic engineer, academic and specialist in hardware and software, networks and cryptography, a frequent special guest at events of Blockchain Lab promoted by BMB.Poppe believes that “the network of blockchain Hyperledger Fabric reduces scams by allowing participants to share the information consensus on the process. This avoids the single point of failure vulnerable to manipulation,” according to the opinion.It also stresses that this platform blockchain reduces the scams, by allowing participants to share the information agreed upon in the process. “So, avoids single point of failure vulnerable to manipulation,” he adds. Under its optics, this technology enhances both the security and privacy in the transmission of data, as in transactions with digital signatures via the Internet.For this reason, it seeks to take advantage of the features of this chain of blocks to reconfigure the way they are used in the rubrics of virtual identity.

One of the keys is that the book open and distributed technology blockchain would be able to detect and filter activities that potentially fraudulent or abusive on the part of some of those involved.Erick Poppe Yanez

Around the contribution of the network of Hyperledger Fabric to the verification of the identity, stressed that it contributes to the development of a system of public key infrastructure, which is included for the certification of the communication between participants at all levels.

Differentiate between digital and electronic signatures

The community BMB has been warning users about the need for you to know the difference between digital signatures and electronic. Through your account in Facebook warn that “all digital signatures are electronic but not all electronic signatures are digital”.In this sense, Melendrez Alaro and Diana Balderrama, another member of the community BMB, coincided in pointing out that despite the fact that these two terms are used commonly as synonyms, the reality is that they are different concepts.The electronic signature is only a signature equivalent to handwritten, that may well be a rubric, scanned into a data format. That is to say, is the proof that a real person has given his consent for a particular purpose. This has no legal validity.Melendrez Alaro explained that “the digital signature uses electronic signatures and the tecnifica to a level cryptographic”. But in addition to them adds a set of features that give it legal validity, and security. Therefore, they serve both to identify the person to certify the accuracy of the information. It adds a sort of lock that is given by the digital certificate, which is nothing more than an official certificate issued by an agency that validates the signature.

In sum, the main conceptual differences between an electronic signature and a digital are the uses and the nature of the same. While an electronic signature is related to the legal aspects of acceptance of certain conditions or the validation of an action (in different levels); a digital signature has the legal effects, because its function is to encrypt data to give greater security to a transaction, to authenticate and identify the person running the operation.Gabriela Melendrez, founder of the community BMB

Challenges of the blockchains private

In terms of the challenges facing the current platforms blockchains private, in order to make more effective the implementation of digital signatures, Erick Poppe noted that in Bolivia you must achieve a “normalization of entities in order to agree the standard encryption algorithms and standards of certificates X. 509″. In cryptography, X. 509 is a standard of the International Telecommunication Union (ITU-T) infrastructure of public keys.Warnings about which no one usually do about digital signatures, spoke to Judith Apaza, another participant of the events of BMB. The specialist in Political Management, Public Management and Electronic Government considers that something recurring that is not mentioned is that, beyond the technological, the digital signature is the way in which we exercise our identity in the digital world”.”It is very common for technicians to reduce their use in cryptography or mathematics, but the digital signature is also the way in which we can interact with others in the digital world,” he said.At the discretion of Apaza, a frequent occurrence is to display a scanned signature to represent the digital signature. “But currently, it is possible that a blank document is signed, and there are also ways in which we can all verify the existence of a digital signature”.

What is illegal or not?

It is known that in Bolivia the use of the cryptocurrencies is illegal. However, the same is not the case in the use of the platform blockchain of Hyperledger Fabric to certify documents, clarified Melendrez Alaro and Poppe.”Definitely not. Although the regulations of bolivia do not authorize the use of criptovalores, the use of certified documents, using chains of blocks is permitted through the supreme decree 3525, produced by the Agency of Electronic Government and Information and Communication Technologies (Agetic),” said Poppe.For Melendrez Alaro the digital signature, and open data should facilitate the transition towards an open government. In fact, the implementation of the advanced electronic signature and digital certificates play an essential role in the development of the digital administration. Are the tools for citizens to identify themselves digitally to the public entities and interact with them, with the same validity that it would have a procedure done personally in any window.However, he emphasized that for which the user is already identified to be able to access the full services of the government, it takes knowledge and information to avoid the bureaucracy that means making a procedure, for example. “The goal of open data is to improve the information published, transparentarla, so as to eliminate the barriers of consumption of the end users,” he concluded.

Related:

Action Response Rule-Prevent and allow

I need a solution

Hello. I’m new to DLP but so far i have done by my self the deploy of all the application.

I want to know if there is any response rule to activate when a user try to send a doc into USB and he/she trigger the PCI-DSS policy for example.

We as admin are notified and if we think that the word doc is ok to be copied to allow that ?

For example with Trend Micro we block mail trying to go out of the company based on some rules. If the think that is false positive we can allow that.

Thank You

0

Related:

RSA Archer PCI Management

EMC logo


What are the basics of PCI-DSS Compliance?

The Payment Card Industry Data Security Standard (PCI-DSS) defines a consolidated set of security best practices endorsed by major card brands, which are designed to reduce fraud risk associated with credit card processing. Organizations that fail to comply may lose their ability to accept credit card payments, which could greatly impact their ability to conduct business. However, with the continually increasing velocity and sophistication of new threats, maintaining an effective PCI- DSS compliance program has become an increasingly costly business requirement as well – and those costs can be substantial.

 

The PCI-DSS is considered one of the more prescriptive and technical compliance mandates that companies must typically deal with. This can be both good and bad. In contrast, many higher level government mandates like federal regulations are often written in broader terms that can be difficult to interpret into actionable specifics like precise internal control definitions. The more a company has to guess at what’s expected, the greater the chance of guessing wrong and either undercompensating (raising the inherent risk of running afoul of the regulation); or overcompensating, which can increase the internal costs and burden of compliance unnecessarily.

 

The benefit of PCI’s more prescriptive language is better clarity in terms of understanding what’s expected, how it will be audited, and specific reporting requirements. However, the other side of the coin with PCI is the extensive technical breadth and depth of its coverage. Encryption, network segmentation, multi-factor authentication, and external vulnerability scanning are a few areas where companies often struggle, either because of technical limitations or significant additional technology investments needed.

 

Why is a program approach to PCI Compliance so important?

Companies able to gain efficiencies by optimizing their operational compliance efforts will be more successful at reducing compliance costs and gaps. Consolidating organizational compliance initiatives into a single comprehensive view is the most effective way to identify and eliminate duplicate efforts and reduce overall compliance risk. The technical nature of PCI can often force companies to undertake process improvements, technical infrastructure overhauls, and even facility construction projects simultaneously. A streamlined program approach helps to keep things organized and drive consistent, successful outcomes.

 

RSA Archer PCI Management

RSA Archer Controls Assurance Program and RSA Archer Controls Monitoring Program provide a solid foundation for managing any organizational compliance initiative. However, PCI’s unique characteristics and pervasive global reach offer an opportunity to take things several steps further. RSA Archer PCI Management is designed to do just that, by enabling organizations to streamline the compliance process, simplify stakeholder participation, and reduce overall compliance effort and cost.

 

RSA Archer PCI Management guides merchants through identifying and defining cardholder data flows and environments, engaging the proper stakeholders, completing self-assessment questionnaires (SAQs), testing and gathering evidence for all required controls, and managing the gap remediation process.

 

Key features include:

  • Easy-to-use project workflows to manage CDE (cardholder data environment) scoping and multiple, ongoing compliance assessment projects.
  • Structured content libraries linking each discreet control requirement in the PCI-DSS to an extensive control testing repository ensuring full coverage across internal and external assessment activities.
  • Persona-driven dashboards and questionnaires that simplify the attestation and evidence gathering process and provide clear insight into compliance activity status.
  • Aggregated issues management functionality for tracking findings and gaps and managing the remediation process.
  • One-click reporting templates to assemble all required deliverables into a properly formatted Report on Compliance (ROC) for easy review and submission.

 

Customers can also enjoy seamless integration with other RSA Archer use cases designed to tackle all aspects of Integrated Risk Management in their unique environments. Organizational leaders with optimized programs in place have a distinct advantage for exploring the opportunity landscape, by enabling them to identify with confidence the business risks that are worth taking.

 

For more information, please visit RSA.com and review the Datasheet.


Update your feed preferences


   

   


   


   

submit to reddit
   

Related:

Blockchain development made easy: Getting started with Hyperledger Sawtooth

JAXenter: Hyperledger Sawtooth is extremely modular; what is the purpose of that? What’s the endgame?

Kelly Olson: The blockchain industry is still nascent and new innovations are happening every day. Many blockchain stacks are created as monolithic structures which make it difficult to adopt these new technologies. Sawtooth supports two key areas of modularity:

  1. consensus algorithms and
  2. smart contracts.

Consensus algorithms are a continued area of research and each algorithm has unique characteristics with regard to latency, throughput, and security. Sawtooth’s consensus engine design enables new algorithms to be used as they are released. Currently Sawtooth supports five consensus algorithms:

  1. developer mode
  2. PoET-CFT
  3. PoET-SGX
  4. raft and
  5. PBFT.

On the smart contract front, Sawtooth enables developers to use existing programming languages and new smart contract specific languages. This means that developers can deploy their business logic using languages like Python, Java, and RUST, or new smart contract engines like the EVM or WebAssembly.

SEE ALSO: Making smart contracts safe with Hyperledger Sawtooth

What’s so special about Sawtooth? How can it make businesses safer?

Kelly Olson: Sawtooth builds on the security and battle-hardened nature of traditional blockchain architectures like Bitcoin or Ethereum. It extends upon these platforms by adding features required for enterprises, like permissioning capabilities, that enable companies to restrict access to the blockchain infrastructure.

What are the advantages of using Hyperledger Sawtooth?

Kelly Olson: Here are some of the unique features of Sawtooth.

What’s the difference between Hyperledger Sawtooth and Fabric?

Kelly Olson: Sawtooth is a traditional blockchain architecture that differs from Fabric’s endorser/orderer architecture.

What is the most suitable use case for Hyperledger Sawtooth?

Kelly Olson: Sawtooth is used for a variety of industries/use cases. These include supply chain, telecom, healthcare, and more. Here are some examples of applications being built on Sawtooth.

Sawtooth is a traditional blockchain architecture.

Is Hyperledger Sawtooth a good fit for IoT applications?

Kelly Olson: Blockchains, at the end of the day, are new types of databases that can get transactions/data from a variety of sources, including IoT devices. Sawtooth has a supply chain track and trace application that supports telemetry data from IoT sensors like temperature, humidity, and location.

What’s next for Hyperledger Sawtooth?

Kelly Olson: Sawtooth 1.1 will be out in the next month, and 1.2 towards the end of the year. I can’t release details yet but look out for more information on Hyperledger.org!

Thank you!

asap

asap

Related:

Linux Announces New Course and Certs for Hyperledger Fabric and Sawtooth

By Henry KronkSeptember 10, 2018

140 0

fabric, hyperledger

On Thursday, the Linux Foundation announced yet another resource to help leaners grow more familiar with blockchain technology. The new LFD271 – Hyperledger Fabric Fundamentals is currently open for enrollment. The course is intended to onboard learners into the world of the blockchain and introduce people to current uses and practices.

Later this year, successful students will be able to take the Certified Hyperledger Fabric Administrator and Certified Hyperledger Sawtooth Administrator exams to prove their merit.

The course comes on the back of two others from the Linux Foundation looking to spread knowledge about the decentralized world. Blockchain for Business, a professional certificate program, was launched in collaboration with edX earlier this year along with the free introductory program Blockchain: Understanding Its Uses and Implications.

“Blockchain technology adoption is increasing at a rapid pace – with TechCrunch reporting blockchain jobs as the second-fastest growing in today’s labor market – leading to a shortage of professionals who are qualified to implement and manage it on an enterprise scale,” said Linux Foundation General Manager, Training & Certification Clyde Seepersad, in a statement. “After seeing more than 100,000 students take our free introductory Hyperledger course, we knew it was time for more advanced training options, and certification exams to demonstrate the extent of professionals’ knowledge.”

Behlendorf, Lubin and Rosenbush, a bunch of blockchain people, at Collision 2018
Brian Behlendorf, Executive Director of Hyperledger at Collision 2018 with Ethereum co-founder Joseph Lubin and journalist Steven Rosenbush. Collision Conf, Flickr.

Hyperledger Fabric was developed by the Linux Foundation as a framework to develop and implement blockchain technology. As described on the site, “Intended as a foundation for developing applications or solutions with a modular architecture, Hyperledger Fabric allows components, such as consensus and membership services, to be plug-and-play. Hyperledger Fabric leverages container technology to host smart contracts called “chaincode” that comprise the application logic of the system. Hyperledger Fabric was initially contributed by Digital Asset and IBM, as a result of the first hackathon.”

LFD271 runs just two days and is intended as a professional course. It jumps off from introductory work on the fundamentals of blockchain, hyperledger, and decentralized technologies and goes over some of the core architecture and components used for dApp development.

It introduces learners to Hyperledger Fabric, Hyperledger Fabric SDK, and Hyperledger Fabric Certificate Authority. The course is comprised of self-paced reading material that gives way to lab exercises intended to show students the various processes involved in creating a dApp.

Jonathan Levi, an accomplished computer scientists, cryptographer, and founder of HACERA, teaches the course. Levi was one of the early contributors to the framework and played an instrumental role in its Membership Services (the permissioning layer of the framework). He also worked with Professor Dan Boneh to build the first Ethereum class at Stanford University.

Upon completion of the course, two professional certifications will be made available later this year. The Certified Hyperledger Fabric Administrator Exam will ensure that learners have all the requisite skill to develop and deploy an HF network for commercial use. Learners will be tested on:

  • Application Lifecycle Management
  • Installing and Configuring the Network
  • Diagnostics and Troubleshooting
  • Membership Service Provision
  • Network Maintenance and Operations

The same goes for the Certified Hyperledger Sawtooth Administrator, but regarding a Sawtooth network instead. Areas of testing will include:

  • Installation
  • Configuration
  • Permissioning, Identity Management & Security
  • Lifecycle
  • Troubleshooting

The new course LFD271 is by no means a prerequisite for taking these exams, although it does promise to prepare learners for it.

Interested developers should keep a lookout for a beta tester program offered by the Linux Foundation in the run up to the exam release. As stated on their blog post, “If someone completes the beta exam with a passing grade, they will become one of the first Certified Hyperledger Fabric or Sawtooth Administrators upon launch of the program.”

Featured Image: Jason Leung, Unsplash.