Log Forgery Blocker
Coordinated by
7bulls
Log Forgery Blocker – a brand new product on the market.
Description
Describe the innovation content of the result:
New product on the market – Log Forgery Blocker.
Who will be the customer?
The customers are companies which are using any ICT system, which need to achieve the highest level of non repudiability – like financial companies.
What benefit will it bring to the customers?
Log Forger Blocker will store hash codes of files using blockchain technology in a fully non repudiable way.
When is the expected date of achievement in the project (Mth/yr)?
At the end of the project.
When is the time to market (Mth/yr)?
At the end of the project.
What are the costs to be incurred after the project and before exploitation?
It is estimated at 10 – 20 kEUR.
What is the approximate price range of this result/price of licences?
Log Forgery Blocker will be open source, the revenue will be generated by professional services.
What are the market size in Millions € for this result and relevant trend?
Estimated market size – 10 mEUR yearly.
How will this result rank against competing products in terms of price/performance?
Log Forgery Blocker – there is no direct competition for the product.
Who are the competitors for this result?
Log Forgery Blocker – there is no direct competition for the product.
How fast and in what ways will the competition respond to this result?
We are estimating that creating similar solution will take at least one year.
Who are the partners involved in the result?
Log Forgery Blocker – no partnership foreseen.
Who are the industrial partners interested in the result (partners, sponsors, etc.)?
Financial companies which are using ICT systems and require non repudiability.
Have you protected or will you protect this result? How? When?
IP rights for source code are reserved.
Other results
Domain Specific Language
The domain specific language enables specification of digital twin behaviour in a manner that can enable a predicted evaluation of its trustworthy behaviour in a simulated environment
Fail-operation clock synchronization methodology
Synchronization loss can occur due to many reasons, either because of a device or link failure or due to a targeted attack on the reference node, which supplies the corrected time to the network’s nodes.
Time sensitive network simulation
Simulate the real time communication for the distributed based on the Time sensitive network simulation. Additionally, simulate the fail-operation clock synchronization methodology. This simulation will validate the communication stack.
Remote updating- upgrading of vehicle firmware
Securing remote and in-vehicle communications against cyber-attacks, possibly performed with quantum computers in the near future, is a major goal in the automotive sector.
Extension of the approach to the communications within the whole supply chain of the Microfactory
Once the secure communication with a vehicle has been demonstrated for remote FW update, it is straightforward to extend it to a general Service-Over-the-Air architecture and even further.
Ontology Manager Tool
Ontology Manager is a Framework responsible for managing the Core Ontology used in BIECO, called DAEMON. It aims to support organizing concepts and their relationships related to System of Systems (SoS), Internet of Things (IoT), and System Components management and Monitoring.