Настройки

Укажите год
-

Небесная энциклопедия

Космические корабли и станции, автоматические КА и методы их проектирования, бортовые комплексы управления, системы и средства жизнеобеспечения, особенности технологии производства ракетно-космических систем

Подробнее
-

Мониторинг СМИ

Мониторинг СМИ и социальных сетей. Сканирование интернета, новостных сайтов, специализированных контентных площадок на базе мессенджеров. Гибкие настройки фильтров и первоначальных источников.

Подробнее

Форма поиска

Поддерживает ввод нескольких поисковых фраз (по одной на строку). При поиске обеспечивает поддержку морфологии русского и английского языка
Ведите корректный номера.
Ведите корректный номера.
Ведите корректный номера.
Ведите корректный номера.
Укажите год
Укажите год

Применить Всего найдено 8752. Отображено 100.
19-01-2012 дата публикации

Secure Acknowledgment Device For One-Way Data Transfer System

Номер: US20120017079A1
Принадлежит: OWL Computing Technologies Inc

An apparatus for relaying a hashed message from a first node to a second node, comprising an inlet interface for receiving a message from the first node, a hash number calculator for hashing the message from the inlet interface, an outlet interface for sending the hashed message to the second node, a first one-way data link for unidirectional transfer from the inlet interface to the hash number calculator, and a second one-way data link for unidirectional transfer from the hash number calculator to the outlet interface, is provided. While the apparatus is capable of bidirectional communications with either or both of the first and second nodes through the respective interfaces, the unidirectionality of data flow through the apparatus is strictly enforced by the hardware of the apparatus. The apparatus provides a secure mechanism and communication channel for relaying hashed acknowledgment messages from a receive node to a send node to inform the status of data transfer from the send node to the receive node across a one-way data link. The apparatus may be further implemented with the capability of comparing hashed messages from the two nodes.

Подробнее
05-07-2012 дата публикации

Pluggable transceiver module with enhanced circuitry

Номер: US20120173935A1
Принадлежит: Brocade Communications Systems LLC

Pluggable transceiver modules with additional functions and circuitry contained within the module. In a first embodiment, additional circuitry is added to determine bit error rates at the point of the module itself. This allows a much better diagnostic evaluation of location of problem. In an alternate embodiment, various logic is placed in the module. In a first alternate embodiment encryption/decryption units are placed in the converter module so that encryption and decryption operations on the serial bitstream do not need to be performed in a switch. Existing switches can be used but the interconnecting links can still be encrypted. A second alternate embodiment includes compression/decompression units placed in the module to allow effective higher throughput on the selected links.

Подробнее
26-07-2012 дата публикации

Secure transaction facilitator

Номер: US20120191977A1
Принадлежит: MERQUERY FINANCIAL SYSTEMS LLC

A method, system, and devices are provided in which modified digital signatures are used to provide a dynamically generated number suitable for use in transactions requiring validation. The method uses symmetric key encryption to encode a message comprising authorization information and may use compression algorithms to provide a truncated message digest such that the dynamic number may be processed by existing credit card or other authorization systems. In part, this method is an improvement over other validation methods as decryption, which requires greater computing power, is not required. The method may be performed through the use of various devices. For example, credit cards may utilize the method to dispose the dynamic number in a magnetic strip or to transmit the dynamic number via radio transmitter. Smart cards, smart phones, or USB devices, optionally may be utilized to perform the inventive method.

Подробнее
04-10-2012 дата публикации

Appending data to existing data stored in a dispersed storage network

Номер: US20120254688A1
Автор: Jason K. Resch
Принадлежит: Cleversafe Inc

A method begins by a processing module receiving a request to store data in dispersed storage network (DSN) memory and determining whether the data is to be appended to existing data. When the data is to be appended, the method continues with the processing module encoding, using an append dispersed storage error coding function, the data to produce a set of encoded append data slices, generating a set of append commands, wherein an append command of the set of append commands includes an encoded append data slice of the set of encoded append data slices and identity of one of a set of dispersed storage (DS) units, and outputting at least a write threshold number of the set of append commands to at least a write threshold number of the set of DS units.

Подробнее
29-11-2012 дата публикации

System and methods for permitting open access to data objects and for securing data within the data objects

Номер: US20120300928A1
Принадлежит: Blue Spike Inc

A system and methods for permitting open access to data objects and for securing data within the data objects is disclosed. According to one embodiment of the present invention, a method for securing a data object is disclosed. According to one embodiment of the present invention, a method for securing a data object is disclosed. The method includes the steps of ( 1 ) providing a data object comprising digital data and file format information; ( 2 ) embedding independent data into a data object; and ( 3 ) scrambling the data object to degrade the data object to a predetermined signal quality level. The steps of embedding and scrambling may be performed until a predetermined condition is met. The method may also include the steps of descrambling the data object to upgrade the data object to a predetermined signal quality level, and decoding the embedded independent data.

Подробнее
13-12-2012 дата публикации

Encoding/decoding circuit

Номер: US20120314858A1
Принадлежит: Renesas Electronics Corp

An encoding/decoding operation portion includes an encoding/decoding operation circuit and an avoiding path for detouring the encoding decoding operation circuit and can select between encoding or decoding input data in the encoding/decoding operation circuit and detouring the encoding/decoding operation circuit to output the input data without change. Only one wire has to be provided from a selector to a key storage portion and an initialization-vector storage portion. With this construction, it is possible to realize an encoding/decoding circuit which can suppress an increase in the number of wires used to transmit a content of key data to the key storage portion and the initialization-vector storage portion and does not cause complication of circuit layout.

Подробнее
04-04-2013 дата публикации

Updating data stored in a dispersed storage network

Номер: US20130086447A1
Принадлежит: Cleversafe Inc

A method begins by a dispersed storage (DS) processing module receiving a modified data object, wherein the modified data object is a modified version of a data object and the data object is divided into a plurality of data segments and stored in the DSN. The method continues with the DS processing module mapping portions of the modified data object to the plurality of data segments that includes creating a middle data segment of a second plurality of data segments based on a corresponding middle data segment of the plurality of data segments when the a portion of the portions corresponds to middle data of the modified data object. The method continues with the DS processing module encoding the middle data segment using a dispersed storage error coding function to produce an encoded data segment and overwriting the corresponding middle data segment with the encoded data segment in the DSN.

Подробнее
13-06-2013 дата публикации

Securing Data in a Dispersed Storage Network Using Shared Secret Slices

Номер: US20130151470A1
Принадлежит: Cleversafe Inc

A method begins by dividing a data segment into data segment portions. The method continues by encoding the data segment portions to produce a plurality of sets of encoded data segment portions. A data segment portion is encoded by, first, selecting an encoding equation and an encoding constant(s). The encoding continues by setting a first variable to the data segment portion. The encoding continues by setting a second variable to one of a set of pillar numbers. The encoding continues by executing the encoding equation using the encoding constant, the first variable, and the second variable to produce one of the plurality of sets of encoded data segment portions. The method continues by arranging the plurality of sets of encoded data segment portions into a plurality of encoded data slices. The method continues by sending the plurality of encoded data slices to distributed storage units of a distributed storage network.

Подробнее
01-08-2013 дата публикации

System and methods for permitting open access to data objects and for securing data within the data objects

Номер: US20130195270A1
Принадлежит: Blue Spike Inc

A system and methods for permitting open access to data objects and for securing data within the data objects is disclosed. According to one embodiment of the present invention, a method for securing a data object is disclosed. According to one embodiment of the present invention, a method for securing a data object is disclosed. The method includes the steps of (1) providing a data object comprising digital data and file format information; (2) embedding independent data into a data object; and (3) scrambling the data object to degrade the data object to a predetermined signal quality level. The steps of embedding and scrambling may be performed until a predetermined condition is met. The method may also include the steps of descrambling the data object to upgrade the data object to a predetermined signal quality level, and decoding the embedded independent data.

Подробнее
01-08-2013 дата публикации

Apparatus, methods, and computer program products providing dynamic provable data possession

Номер: US20130198854A1
Принадлежит: BROWN UNIVERSITY

In one exemplary embodiment, a method includes: storing data for a file, organized as blocks, each having a portion of the file; and maintaining a skip list for the data. The skip list is an ordered tree structure having a root node, internal nodes and leaf nodes. Each leaf node corresponds to a block. Each node has a rank value corresponding to size of a subtree rooted at the node. The skip list employs a hashing scheme. The hash value of the root node and internal nodes is computed from a level of the node, the rank value and an interval between the node and another linked node to the right of or below the node. The hash value of the leaf nodes is computed from a level of the node, the rank value and an interval associated with the node.

Подробнее
22-08-2013 дата публикации

Homomorphic evaluation including key switching, modulus switching, and dynamic noise management

Номер: US20130216044A1
Принадлежит: International Business Machines Corp

Homomorphic evaluations of functions are performed. The functions include operation(s). Variants of key switching and modulus switching are described and are performed prior to or after the operation(s). A key switching transformation converts a ciphertext with respect to a first secret key and a first modulus to a ciphertext with respect to a second secret key and a second modulus. A key switching transformation converts a first version of a ciphertext with respect to a first secret key and with some number r bits of precision to a second version of the selected ciphertext with respect to a second keys and with some other number r′ bits of precision. The ciphertexts may be operated on as polynomials represented using evaluation representation, which has benefits for multiplication and automorphism. Further, ciphertexts are associated with an estimate of noise, which is used to determine when to perform modulus switching on the ciphertexts.

Подробнее
19-09-2013 дата публикации

Secure storage of secret data in a dispersed storage network

Номер: US20130246812A1
Принадлежит: Cleversafe Inc

A method for secure storage of secret data begins with an originating device transforming the secret data to produce a plurality of secret data shares and encrypting the plurality of secret data shares using unique encryption values of trusted agent modules of a dispersed storage network (DSN) to produce a plurality of encrypted secret data shares for storage in storage nodes of the DSN. Retrieval of the secret data begins with the originating device sending a secret data retrieval request to the trusted agent modules and recovering, by the trusted agent modules, the plurality of encrypted secret data shares from the storage nodes. The method continues with the trusted agent modules decrypting the plurality of encrypted secret data shares using a decryption function corresponding to the unique encryption values and sending the plurality of secret data shares to the originating device.

Подробнее
03-10-2013 дата публикации

Key agreement in wireless networks with active adversaries

Номер: US20130259235A1

A network and related methods for transmitting processes in a network secretly and securely is described. The network use keys, through path-key establishment and a key pool bootstrapping, to ensure that packets are transmitted and received properly and secretly in the presence of one or more adversarial nodes.

Подробнее
05-12-2013 дата публикации

Method for producing two-dimensional code and reader for reading the two-dimensional code

Номер: US20130322631A1
Автор: Masahiro Hara
Принадлежит: Denso Wave Inc

A method of producing a two-dimensional code having a code area in which data codes coded as codewords are mapped. First type of data codes is mapped in the code area. The first type of data codes are coded as the codewords and indicating data to be disclosed. An end identification code is added to an end of a code string composed of the first type of data codes, the end identification code showing the end. Second type of data codes are mapped after the end identification code in the code area, the second type of data codes being coded as the codewords and indicating data to be kept in secret. Filler codes showing no data after the second type of data codes are mapped to fill up the code area, when a total amount of the codewords in the code area is less than a capacity of the code area.

Подробнее
20-03-2014 дата публикации

Apparatus and method for protecting message data

Номер: US20140079213A1
Принадлежит: Qualcomm Inc

Disclosed is a method for protecting message data. In the method, the message data is padded with padding bits generated based on a deterministic function performed on the message data. The padded message data is compressed to generate compressed data. A length of the compressed data is dependent on the padding bits. The compressed data is encrypted to generate encrypted message data.

Подробнее
07-01-2021 дата публикации

IMMERSIVE INTERACTIVE SPORTS MANAGEMENT SYSTEM AND METHOD THEREOF

Номер: US20210001227A1
Принадлежит:

Described herein are computerized methods and systems for enabling remote participation in sporting event decision-making. A current game situation in a sporting event is received by a server from a remote device. The server retrieves plays applicable to the current game situation from a playbook. The server generates a playcall UI comprising the retrieved play categories and plays and transmits the playcall UI to fan computing devices. The server receives a vote for one of the plays from the fan computing devices. The server determines a selected play based on the received votes. The server transmits the selected play to player computing devices associated with players involved in the sporting event, wherein the players execute the selected play. The current game situation is updated at the remote device based upon an outcome of the selected play. 1. A system for enabling remote participation in sporting event decision-making , the system comprising a server computing device having a processor and memory , the processor configured to execute instructions stored in the memory to:receive one or more data elements relating to a current game situation in a sporting event from a remote computing device;retrieve a plurality of plays applicable to the current game situation from a playbook stored in a database, wherein each play in the playbook is assigned to one or more buckets that define a specific game situation and the server computing device identifies the plurality of plays for retrieval by comparing the current game situation to the specific game situation associated with one or more of the buckets, identifying at least one category of plays assigned to one of the buckets, and retrieving a plurality of plays associated with the identified category from the playbook;generate a playcall user interface comprising the plurality of retrieved plays and transmit the playcall user interface to a plurality of fan computing devices associated with fans of the sporting event ...

Подробнее
06-01-2022 дата публикации

PRIVACY PRESERVING ARCHITECTURE FOR PERMISSIONED BLOCKCHAINS

Номер: US20220004539A1
Принадлежит:

A processor may generate a request associated with a transaction. The processor may collect an anchor associated with the request. The processor may transition the transaction into a collection of two or more hashes. The processor may submit the transaction to an ordering service. 1. A method for processing a private transaction in a blockchain network , the method comprising:generating a request associated with a transaction;collecting an anchor associated with the request;transitioning the transaction into a collection of two or more hashes; andsubmitting the transaction to an ordering service.2. The method of claim 1 , wherein the request is a processable action that modifies a blockchain ledger.3. The method of claim 1 , further comprising:validating, by two or more shards in the blockchain network, the transaction, wherein the transaction is locally validated by the two or more shards.4. The method of claim 3 , wherein the two or more shards validate the transaction comprising:receiving by each of the two or more shards a respective, known preimage associated with the two or more hashes; andmatching, by each of the two or more shards, the respective, known preimage to the two or more hashes.5. The method of claim 4 , further comprising:performing, by the two or more shards, an atomic commit of the request.6. The method of claim 5 , wherein the atomic commit is performed without any respective claim 5 , known preimage being shared with any of the other two or more shards.7. A system for processing a private transaction in a blockchain network claim 5 , the system comprising:a memory; anda processor in communication with the memory, the processor being configured to perform operations comprising:generating a request associated with a transaction;collecting an anchor associated with the request;transitioning the transaction into a collection of two or more hashes; andsubmitting the transaction to an ordering service.8. The system of claim 7 , wherein the request ...

Подробнее
06-01-2022 дата публикации

SMART CONTRACT REGULATION

Номер: US20220005027A1
Принадлежит:

A platform may receive a first smart contract. The first smart contract may be associated with an entity that stores a plurality of smart contracts in a distributed ledger. The platform may determine a state of the first smart contract and a state of a second smart contract and compare the state of the first smart contract and the state of the second smart contract. The platform may determine, based on the state of the first smart contract and the state of the second smart contract, that a conflict exists between the first smart contract and the second smart contract. The conflict may be determined based on at least one of the first smart contract or the second smart contract being in violation of a respective term of at least one of the first smart contract or the second smart contract. 1. A device , comprising:one or more memories; and [ 'wherein the first smart contract is associated with an entity that stores a plurality of smart contracts in a distributed ledger;', 'receive a first smart contract,'}, 'determine, based on executing a first code of the first smart contract, a first state of the first smart contract;', 'identify, based on the entity, a second smart contract;', 'determine, based on executing a second code of the second smart contract, a second state of the second smart contract;', 'determine, based on comparing the first state and the second state, whether a conflict exists between the first smart contract and the second smart contract; and', 'perform, based on whether the conflict exists between the first smart contract and the second smart contract, an action., 'one or more instructions that, when executed by the one or more processors, cause the one or more processors to, 'one or more processors, coupled to the one or more memories, configured to2. The device of claim 1 , wherein the first code corresponds to a first state machine defining a plurality of states of the first smart contract claim 1 , andwherein the second code corresponds to a ...

Подробнее
06-01-2022 дата публикации

BLOCKCHAIN-BASED SMART CONTRACT INSTANT LOTTERY TICKET

Номер: US20220005316A1
Принадлежит:

A ticket issuer server provides a digital instant lottery ticket, such as a smart contract instant lottery ticket (SILT) on a digital ledger, such as a blockchain infrastructure that supports execution of smart contracts. The ticket issuer server obtains an encryption key from a key issuer, encrypts a prize code with the encryption key to provide an encrypted prize code, creates an object, such as a smart contract representing the SILT, wherein the smart contract includes a ticket owner address attribute, a ticket issuer address attribute, a key issuer address attribute and the encrypted prize code, and stores the object on the digital ledger. 121-. (canceled)22. A key issuer server comprising a processor circuit and a memory coupled to the processor circuit , wherein the memory comprises computer program instructions that , when executed by the processor circuit , cause the key issuer server to perform operations comprising:receiving a request for an encryption key from a ticket issuer;generating a public key (PubKeyKI) and a private key (PrivKeyKI) associated with the public key PubKeyKI;transmitting public key PubKeyKI to the ticket issuer;receiving a request to confirm scratching of a digital instant lottery ticket associated with the public key PubKeyKI;receiving an encrypted prize code that was encrypted using the public key PubKeyKI;decrypting the encrypted prize code using the private key PrivKeyKI to obtain a decrypted prize code; andstoring the decrypted prize code in a smart contract associated with the digital instant lottery ticket on a computing system including a digital ledger.23. The key issuer server of claim 22 , wherein the digital ledger comprises a blockchain infrastructure that supports execution of smart contracts claim 22 , and wherein the digital instant lottery ticket comprises a smart contract instant lottery ticket (SILT).24. The key issuer server of claim 23 , wherein storing the decrypted prize code on the blockchain infrastructure ...

Подробнее
06-01-2022 дата публикации

DISTRIBUTED ANONYMIZED COMPLIANT ENCRYPTION MANAGEMENT SYSTEM

Номер: US20220006616A1
Автор: GAGLIARDONI Tommaso
Принадлежит: Nagravision S.A.

A method for data security implemented as an application on a device includes generating a request for one or more secret shares needed to reconstruct a key. The device stores a first secret share in its memory. The method also includes signing the request with a certificate that identifies the request as valid without identifying the device, and sending the request, signed with the certificate, to at least one other device. The method further includes receiving, from the at least one other device, the one or more secret shares, determining whether the one or more secret shares received from the at least one other device is sufficient to reconstruct the key, and reconstructing the key using the first secret share and the one or more secret shares upon determining that the one or more secret shares are sufficient to reconstruct the key. 1. A method performed by a server , comprising:validating, with circuitry, one or more devices based on identity information corresponding to the one or more devices;generating, with the circuitry, one or more pseudonyms for the one or more devices;generating, with the circuitry, one or more certificates for the one or more devices, the one or more certificates including the one or more pseudonyms of the one or more devices; anddistributing, with the circuitry, the one or more certificates to the one or more devices.2. The method according to claim 1 , further comprising:maintaining regional information corresponding to the one or more devices; andinserting the regional information into the one or more certificates before distributing the one or more certificates to the one or more devices.3. The method according to claim 2 , further comprising uploading the regional information to a distributed ledger accessible to the one or more devices.4. The method according to claim 1 , further comprising:maintaining a certificate revocation list indicating a revocation status of the one or more certificates distributed to the one or more ...

Подробнее
06-01-2022 дата публикации

BLOCK CHAIN PROOF FOR IDENTIFICATION

Номер: US20220006638A1
Автор: Tang Zilong
Принадлежит:

Implementations efficiently verify an identity claim for an entity. An example method includes receiving a query key and a property identifying an entity and identifying a possible match for the property from graph access records, the possible match being a node in an identity chain. The method also includes verifying a complete chain from the possible match to a genesis node in the chain. The query key is used to find a next node in the chain. Failure to identify the genesis node results in an unsuccessful verification. The method also includes generating a response that indicates a successful verification request responsive to locating the genesis node and generating a response that indicates an unsuccessful verification request otherwise. 1. A method comprising:receiving an identity factor for an entity and genesis data that includes data capturing a unique physical property of the entity;receiving a signature key from a keeper of the entity, the keeper having provided the identity factor;generating an identity chain for the entity, the identity chain having nodes that include a genesis node having content that includes the genesis data and includes a second node having content that includes the identity factor, wherein the signature key is used to compute hash results used to link the nodes in the identity chain; andstoring a graph access record for accessing the identity chain, the graph access record including a key property used to locate the identity chain in response to a verification request for the entity and including a hash result of the hash results used to initiate traversal of the identity chain.2. The method of claim 1 , wherein using the signature key to compute the hash results comprises:generating a first hash result using the content of a node in the identity chain and the signature key as input, andstoring the first hash result in the content of a next node of the identity chain.3. The method of claim 1 , wherein using the signature key to ...

Подробнее
06-01-2022 дата публикации

CONTRACT APPARATUS AND METHOD OF BLOCKCHAIN USING DIGITAL CONTENTS ORGINAL KEY

Номер: US20220006648A1
Принадлежит:

Disclosed are blockchain type contract terminal and method using a digital contents original confirmation key. There are provided: an input module that is inputted with a contract term regarding an object of contract; a position information collection module that collects, in real time, position information of the object at the time of contract; a contract creation module that creates a contract by using the contract term inputted by the input module and the position information at the time of contract collected in real time by the position information collection module; a digital contents original confirmation key interface module that provides the contract term inputted by the input module and the position information at the time of contract collected in real time by the position information collection module to a contents initializer and an international authentication adjustment server, and receives a digital contents original confirmation key from the contents initializer or the international authentication adjustment server; a digital contents original contract creation module that combines the digital contents original confirmation key received at the digital original confirmation key interface module with the contract created at the contract creation module to create a digital contents original contract; a blockchain creation module that encrypts the contract created by the digital contents original contract creation module to create a blockchain; and a blockchain distributed storage control module that transmits the blockchain created at the blockchain creation module to another terminal in a P2P manner for storing on a network in a distributed manner. 1. A blockchain type contract terminal using position information comprising: a position information collection module that collects, in real time, position information of the object at the time of contract;', 'a contract creation module that creates a contract by using the contract term inputted by the input ...

Подробнее
06-01-2022 дата публикации

SYSTEMS, METHODS, AND APPARATUSES FOR IMPLEMENTING A METADATA DRIVEN RULES ENGINE ON BLOCKCHAIN USING DISTRIBUTED LEDGER TECHNOLOGY (DLT)

Номер: US20220006705A1
Принадлежит:

Systems, methods, and apparatuses for implementing a metadata driven rules engine on blockchain using Distributed Ledger Technology (DLT) in conjunction with a cloud based computing environment are described herein. For example, according to one embodiment there is a system having at least a processor and a memory therein executing within a host organization, in which such a system includes means for operating a blockchain interface to a blockchain on behalf of a plurality of tenants of the host organization, wherein each one of the plurality of tenants operate as one of a plurality of participating nodes on the blockchain having access to the blockchain; displaying a Graphical User Interface (GUI Interface) to a user device communicably interfaced with the system over a network, wherein the GUI interface is to prompt for a metadata rule definition at the user device when displayed by the user device; receiving input at the system from the GUI interface displayed to the client device, the input defining the metadata rule definition, wherein the metadata rule definition includes one or more conditions or criteria to be matched to a transaction received at the blockchain; auto-generating code for a smart contract representing the metadata rule definition based on the input received from the GUI interface displayed to the client device; submitting the smart contract having the code representing the metadata rule definition to the blockchain for consensus by participating nodes of the blockchain; and adding the smart contract having the code representing the metadata rule definition onto the blockchain by writing the metadata rule definition into an asset of a new block on the blockchain pursuant to the smart contract attaining consensus from the participating nodes of the blockchain. Other related embodiments are disclosed. 1. A method performed by a system of a host organization , the system having a processor and a memory therein , wherein the method comprises: ...

Подробнее
07-01-2021 дата публикации

SYSTEM AND METHOD FOR MANAGING A PUBLIC SOFTWARE COMPONENT ECOSYSTEM USING A DISTRIBUTED LEDGER

Номер: US20210004224A1
Автор: Mills Duncan
Принадлежит: ORACLE INTERNATIONAL CORPORATION

Embodiments include systems and methods that facilitate implementation of software component ecosystems using a distributed ledger, e.g., as implemented in part as a distributed blockchain, that is maintained by ecosystem full nodes, called catalog instances. Various registration transactions, e.g., developer registrations, namespace registrations, usage registrations, and so on, may be added to the distributed blockchain by one or more catalog instances. Adding blocks to the blockchain may including using a tree hash of tending transactions to generate a block hash for the new block. The new block also includes or incorporates a hash of an immediately prior block. 1. One or more non-transitory tangible storage media including logic for execution by one or more processors and when executed , cause the one or more processors to perform operations for verifying a blockchain in a networked computing ecosystem , the operations comprising:designating at least one select catalog instance to perform transaction validation, wherein the at least one select catalog instance satisfies one or more selection rules including a level of trust;receiving into an unverified queue of the at least one select catalog instance, a developer registration transaction including identifying information of a developer of a software component for the blockchain, wherein the developer registration transaction is propagated by an originating catalog instance to unverified queues of the catalog instances of the networked computing ecosystem;validating, by the at least one select catalog instance, the developer registration transaction to verify that the developer is authorized to register the identifying information;generating a new hash by selectively incorporating a previous block hash and a hash for the developer registration transaction;committing the new hash to a new block of the blockchain; andremoving the developer registration transaction from the unverified queues.2. The storage media of ...

Подробнее
07-01-2021 дата публикации

METHOD AND SYSTEM FOR HANDLING BLOCKCHAIN NETWORK BASED FILE STORAGE SYSTEM

Номер: US20210004294A1
Принадлежит:

A method and system are provided for handling a blockchain network based file storage system including a plurality of electronic devices. The method of a first electronic device includes generating, by the first electronic device, a first intelligent reflection file system (IRFS) including a reflection of a file system related to the first electronic device and a local block chain related to the first electronic device; storing, by the first electronic device, a first image of a second IRFS related to a second electronic device among the plurality of electronic devices; storing, by the first electronic device, a second image of a third IRFS related to a third electronic device among the plurality of electronic devices; receiving, by the first electronic device, from the second electronic device, a request to store a first data; determining, by the first device, whether or not to validate the request; and in response to determining to validate the request, receiving, by first electronic device, the first data from the second electronic device, storing the first data in the first electronic device, and updating the first IRFS based on the stored first data. 1. A method of a first electronic device in a blockchain network based file storage system including a plurality of electronic devices , the method comprising:generating, by the first electronic device, a first intelligent reflection file system (IRFS) including a reflection of a file system related to the first electronic device and a local blockchain related to the first electronic device;storing, by the first electronic device, a first image of a second IRFS related to a second electronic device among the plurality of electronic devices;storing, by the first electronic device, a second image of a third IRFS related to a third electronic device among the plurality of electronic devices;receiving, by the first electronic device, from the second electronic device, a request to store a first data;determining, by the ...

Подробнее
02-01-2020 дата публикации

CONSENSUS SYSTEM DOWNTIME RECOVERY

Номер: US20200004643A1
Автор: YANG Dayi
Принадлежит:

Methods, systems, and apparatus, including computer programs encoded on computer storage media, for consensus system downtime recovery. One of the methods includes: obtaining a pre-prepare message from the primary node; multicasting a prepare message indicating an acceptance of the pre-prepare message to at least some of the primary node and the other (N−2) backup nodes; obtaining (Q−1) or more prepare messages respectively from (Q−1) or more of the backup nodes; storing the pre-prepare message and the (Q−1) or more prepare messages; multicasting a commit message to at least some of the primary node and the other backup nodes, the commit message indicating that the one backup node agrees to the (Q−1) or more prepare messages; and obtaining, respectively from Q or more nodes among the primary node and the backup nodes, Q or more commit messages each indicating that the corresponding node agrees to (Q−1) or more prepare messages. 115.-. (canceled)16. A computer-implemented consensus method to be implemented on a blockchain maintained by a number (N) of nodes , wherein one of the nodes acts as a primary node and the other (N−1) nodes act as backup nodes , and the method is performed by one of the backup nodes , the method comprising:obtaining a pre-prepare message from the primary node;multicasting a prepare message to at least some of the primary node and the other (N−2) backup nodes, the prepare message indicating an acceptance of the pre-prepare message;obtaining (Q−1) or more prepare messages respectively from (Q−1) or more of the backup nodes, wherein Q (quorum) is (N+F+1)/2 rounded up to the nearest integer, and F is (N−1)/3 rounded down to the nearest integer;storing the pre-prepare message and the (Q−1) or more prepare messages;multicasting a commit message to at least some of the primary node and the other backup nodes, the commit message indicating that the one backup node agrees to the (Q−1) or more prepare messages; andobtaining, respectively from Q or more ...

Подробнее
07-01-2021 дата публикации

METHODS AND SYSTEMS FOR CONTROLLING ACCESS TO, AND INTEGRITY OF, RESOURCES ON A BLOCKCHAIN

Номер: US20210004366A1
Принадлежит:

A method and devices for verifying a digital resource by a plurality of node devices in a blockchain network. The plurality of nodes have respective private key shares, where a collective private key of a collective private-public key pair is based on a set of the respective private key shares, and where each node has a nodal private-public key pair. The digital resource may be encrypted using a digital resource crypto public key, the digital resource crypto public key including combination of a nodal public key and a collective public key. The digital resource may be submitted to a repository system by broadcasting a commitment transaction and a subsequent reveal or rescind transaction of a commitment channel, the commitment channel formed between a respective node and a principal node. Decrypting the encrypted digital resource is based on retrieving private key share contributions from the plurality of nodes participating in verifying the digital resource. 1. A computer-implemented method of verifying a digital resource by a plurality of nodes and a principal node in a blockchain network , the plurality of nodes having respective private key shares , where a collective private key of a collective private-public key pair is based on a set of the respective private key shares , and where a first node has a first nodal private-public key pair , the method comprising:generating, by the first node, a digital resource crypto public key by combining a first nodal public key of the first nodal private-public key pair and a collective public key of the collective private-public key pair;encrypting the digital resource using the digital resource crypto public key; generating, by the first node, a commitment transaction having a commitment transaction output locked by a private key share of the first node such that a valid subsequent transaction having the commitment transaction output as an input is to include the private key share of the first node, and', 'receiving, by ...

Подробнее
13-01-2022 дата публикации

MECHANISM FOR SECURE AND RESILIENT CONFIGURATION UPGRADES

Номер: US20220012042A1
Принадлежит:

Various systems and methods for providing secure and resilient configuration upgrades are described herein. A system, includes a processor; and memory to store instructions, which when executed by the processor, cause the system to: receive at a resilient security island (RSI) partition of a first network node, an update from a source, the first network node hosting the RSI partition and a host partition, the RSI comprising reserved hardware resources of the first network node; verify, by the RSI, provenance of the update; apply, by the RSI, the update to modify a configuration of the RSI or the host partition; test, by the RSI, the modified configuration of the RSI or the host partition; and provide a cryptographic proof that the test was completed and an update status to an update coordinator. 1. A system , comprising:a processor; and receive at a resilient security island (RSI) partition of a first network node, an update from a source, the first network node hosting the RSI partition and a host partition, the RSI comprising reserved hardware resources of the first network node;', 'verify, by the RSI, provenance of the update;', 'apply, by the RSI, the update to modify a configuration of the RSI or the host partition;', 'test, by the RSI, the modified configuration of the RSI or the host partition; and', 'provide a cryptographic proof that the test was completed and an update status to an update coordinator., 'memory to store instructions, which when executed by the processor, cause the system to2. The system of claim 1 , wherein the source is a local device.3. The system of claim 2 , wherein the instructions cause the system to: after receiving the update from the source claim 2 , verifying device credentials of the local device and chain of custody of the update.4. The system of claim 1 , wherein the source is a peer RSI partition at a second network node.5. The system of claim 4 , wherein the instructions to receive the update from the source comprise ...

Подробнее
02-01-2020 дата публикации

BLOCKCHAIN-BASED SMART CONTRACT INVOCATION METHOD AND APPARATUS, AND ELECTRONIC DEVICE

Номер: US20200004788A1
Автор: Qiu Honglin
Принадлежит: ALIBABA GROUP HOLDING LIMITED

Techniques for invocating a smart contract are described. One example method includes receiving a target transaction that is used to initiate an invocation of a smart contract, wherein the target transaction comprises invocation data, and wherein the invocation data comprises a data digest associated with target data stored in a third-party storage system interconnected with a blockchain; querying the target data from the third-party storage system; receiving a query result returned by the third-party storage system, wherein the query result comprises encrypted target data; obtaining a key to decrypt the encrypted target data to generate decrypted target data; performing a content verification on the decrypted target data; determining that the content verification succeeds; invoking the smart contract to perform a smart contract computation on the invocation data; and storing a computation result in a distributed database associated with the blockchain after the smart contract computation is completed. 1. A computer-implemented method for invocating , a smart contract; comprising:receiving a target transaction that is used to initiate an invocation of a smart contract, wherein the target transaction comprises invocation data, and wherein the invocation data comprises a data digest associated with target data stored in a third-party storage system interconnected with a blockchain;querying the target data associated with the data digest from the third-party storage system;receiving a query result returned by the third-party storage system, wherein the query result comprises encrypted target data;obtaining a key to decrypt the encrypted target data to generate decrypted target data;performing a content verification on the decrypted target data;determining that the content verification on the decrypted target data succeeds;in response to determining that the content verification on the decrypted target data succeeds, invoking the smart contract to perform a smart ...

Подробнее
02-01-2020 дата публикации

DELEGATING CREDENTIALS WITH A BLOCKCHAIN MEMBER SERVICE

Номер: US20200004846A1
Принадлежит:

An example operation may include one or more of receiving a signed transaction from a blockchain member device, responsive to receiving the signed transaction, identifying a credential assigned to the blockchain member device, and the credential certifies a public key is assigned to the blockchain member device and was used to sign the signed transaction, determining whether to commit the signed transaction to a blockchain based on the credential, and responsive to determining to commit the signed transaction based on the credential, storing the signed transaction anonymously in the blockchain. 1. A method , comprising:receiving a signed transaction from a blockchain member device;responsive to receiving the signed transaction, identifying a credential assigned to the blockchain member device, wherein the credential certifies a public key is assigned to the blockchain member device and was used to sign the signed transaction;determining whether to commit the signed transaction to a blockchain based on the credential; andresponsive to determining to commit the signed transaction based on the credential, storing the signed transaction anonymously in the blockchain.2. The method of claim 1 , further comprising:identifying one or more attributes associated with the signed transaction, wherein the one or more attributes associated with the signed transaction are selected by the blockchain member device.3. The method of claim 2 , wherein the one or more attributes indicate a root certificate authority that issued a root credential to an intermediate certificate authority that issued the credential to the user device.4. The method of claim 1 , further comprising:assigning the credential to the blockchain member device by one of a plurality of intermediate certificate authorities.5. The method of claim 1 , further comprising:receiving an authentication request at a root certificate authority from an intermediate certificate authority; andresponsive to receiving the ...

Подробнее
04-01-2018 дата публикации

SECURE BOOT WITH RESISTANCE TO DIFFERENTIAL POWER ANALYSIS AND OTHER EXTERNAL MONITORING ATTACKS

Номер: US20180004957A1
Принадлежит:

A method for device authentication comprises receiving, by processing hardware of a first device, a message from a second device to authenticate the first device. The processing hardware retrieves a secret value from secure storage hardware operatively coupled to the processing hardware. The processing hardware derives a validator from the secret value using a path through a key tree, wherein the path is based on the message, wherein deriving the validator using the path through the key tree comprises computing a plurality of successive intermediate keys starting with a value based on the secret value and leading to the validator, wherein each successive intermediate key is derived based on at least a portion of the message and a prior key. The first device then sends the validator to the second device. 1. A method for device authentication comprising:receiving, by processing hardware of a first device, a message from a second device to authenticate the first device;retrieving, by the processing hardware, a secret value from secure storage hardware operatively coupled to the processing hardware;deriving, by the processing hardware, a validator from the secret value using a path through a key tree, wherein the path is based on the message, wherein deriving the validator using the path through the key tree comprises computing a plurality of successive intermediate keys starting with a value based on the secret value and leading to the validator, wherein each successive intermediate key is derived based on at least a portion of the message and a prior key; andsending the validator to the second device.2. A method as in claim 1 , wherein the validator is exchanged between the first device and the second device as part of a challenge-response protocol.3. A method as in claim 2 , wherein the first device comprises a printer cartridge and the second device comprises a printer.4. A method as in claim 1 , wherein the path through the key tree identifies a plurality of ...

Подробнее
13-01-2022 дата публикации

MULTI-FACTOR AUTHENTICATION AT POINT OF SALE FOR MULTI-INGREDIENT PRODUCT TRACKING, TRACING, AND AUTHENTICATION

Номер: US20220012681A1
Принадлежит:

Some aspects of the present application relate to systems and methods for leveraging blockchain technology to enable multi-ingredient product tracking, tracing, and authentication. In some aspects, the systems and methods may be used for supply chain management of a multi-ingredient product, including products that are formed using one or more raw ingredients which have undergone change. In some aspects, the systems and methods provide actors present in the supply chain the ability to provide information and data pertaining to their role (e.g., the processes they follow, the material they buy, etc.) in the supply chain and store that information and data into one or more blocks of a blockchain. 1. A method for creating genealogy data structures for tracing a final product back to its source ingredients , the method comprising ,receiving first data associated with a first actor in a supply chain, wherein the first data includes information indicating a first ingredient of the ingredients and one or more processes executed by the first actor with respect to the first ingredient;recording at least a portion of the first data to a block of a blockchain; and identifying a genealogy data structure corresponding to the final product, the genealogy data structure comprising one or more blocks of the blockchain storing data corresponding to the final product, the data corresponding to the final product including at least the portion of the first data; and', 'transmitting second data recorded to the one or more blocks of the blockchain corresponding to the genealogy data structure., 'in response to a request to access genealogy data corresponding to the final product2. The method of claim 1 , wherein recording at least the portion of the first data includes creating a new block on the blockchain.3. The method of claim 2 , further comprising:compiling information recorded to one or more previously created blocks of the blockchain associated with the final product;aggregating ...

Подробнее
13-01-2022 дата публикации

ELECTRICITY MARKET TRADING AND EVALUATION METHOD BASED ON WEAK CENTRALIZED CONSORTIUM BLOCKCHAIN

Номер: US20220012806A1
Принадлежит:

The present disclosure relates to energy trading blockchain technology, and specifically to an electricity market trading and evaluation method based on a weak centralized consortium blockchain. Through the consortium blockchain, a peer-to-peer (P2P) network, and a delegated byzantine fault tolerance consensus mechanism, electricity market operating organizations and electricity market trading entities are classified into a full-node network and a light-node network respectively; central control authority of the market operating organization is partially liberated by introducing the consortium blockchain technology and using a weak centralization characteristic thereof; the underlying P2P network of the architecture satisfies the exchange of resources and services between various market entities, and adapts to the distribution characteristics of the electricity trading market; based on the byzantine fault tolerance consensus communication technology, invulnerability and survivability indicators are established, and the reliability of the weak centralized blockchain technology in the electricity trading market is measured quantitatively. 1. An electricity market trading method based on a weak centralized consortium blockchain , wherein through the consortium blockchain , a peer-to-peer (P2P) network , and a delegated byzantine fault tolerance consensus mechanism , electricity market operating organizations and electricity market trading entities are classified into a full-node network and a light-node network respectively; the electricity market operating organizations are equivalent to full nodes , wherein the full nodes store all structured contract basic data and trading data starting from a genesis block , and protect user privacy and confidential information of trading through hash mapping;the electricity market trading entities act as light nodes in a consortium blockchain energy trading network, and participate in an electricity trading process through a ...

Подробнее
13-01-2022 дата публикации

BLOCKCHAIN SYSTEMS AND METHODS FOR PROVIDING INSURANCE COVERAGE TO AFFINITY GROUPS

Номер: US20220012811A1
Принадлежит:

Techniques for obtaining and/or maintaining insurance coverage include receiving insurance policy preferences for a customer, storing the insurance policy preferences in a customer profile database, and using the insurance policy preferences to automatically obtain a first insurance policy from a first insurance provider, where the first insurance policy has (i) first policy features, and (ii) a first premium corresponding to a first policy term. Automatically obtaining the first insurance policy includes receiving, from each of a plurality of insurance provider computer systems associated with the plurality of respective insurance providers, a quote indicating one or more policy features corresponding to a policy term, selecting one of the quotes from the plurality of respective insurance providers based on the one or more policy features for the quote and the insurance policy preferences for the customer, and notifying the customer of the first insurance provider and the first premium. 1. A computer-implemented method comprising:receiving, at one or more hardware servers of an intermediary entity, insurance policy preferences for a customer;storing the insurance policy preferences in a customer profile database; receiving, at the one or more hardware servers of the intermediary entity and from each of a plurality of insurance provider computer systems associated with the plurality of respective insurance providers, a quote indicating one or more policy features corresponding to a policy term; and', 'selecting, by the one or more hardware servers of the intermediary entity, one of the quotes from the plurality of respective insurance providers based on the one or more policy features for the quote and the insurance policy preferences for the customer; and, 'using, by the one or more hardware servers of the intermediary entity, the insurance policy preferences stored in the customer profile database to automatically obtain for the customer a first insurance policy ...

Подробнее
13-01-2022 дата публикации

BLOCKCHAIN SYSTEMS AND METHODS FOR PROVIDING INSURANCE COVERAGE TO AFFINITY GROUPS

Номер: US20220012812A1
Принадлежит:

Techniques for obtaining and/or maintaining insurance coverage include receiving customer information for customers including insurance policy preferences or characteristics for each customer. These techniques further include grouping the customers into affinity groups by generating a set of preferences or characteristics for each affinity group, comparing the insurance policy preferences or characteristics for each customer to the set of preferences or characteristics for each affinity group, and assigning a customer to an affinity group in response to determining that at least a threshold number of insurance policy preferences or characteristics for the customer matches the set of preferences or characteristics for the affinity group. For at least one affinity group, an insurance provider is selected for providing an insurance policy to each of the customers in the affinity group, and each of the customers in the affinity group is notified of the selected insurance provider and the premium. 1. A computer-implemented method comprising:receiving, at one or more hardware servers of an intermediary entity, customer information for a plurality of customers, the customer information including insurance policy preferences or characteristics for each customer; generating a set of preferences or characteristics for each affinity group;', 'comparing the insurance policy preferences or characteristics for each customer to the set of preferences or characteristics for each affinity group; and', 'assigning one of the plurality of customers to one of the affinity groups in response to determining that at least a threshold number of insurance policy preferences or characteristics for the customer matches the set of preferences or characteristics for the affinity group;, 'grouping, by the one or more hardware servers of an intermediary entity, the plurality of customers into one or more affinity groups by 'notifying, via a communication interface of the one or more hardware ...

Подробнее
13-01-2022 дата публикации

PERSONAL IP PROTECTION SYSTEM AND METHOD

Номер: US20220012833A1
Автор: PARK JaeYong
Принадлежит: EZ-Trust Co., Ltd.

Disclosed are a personal intellectual property (IP) protection system and method. That is, according to the present invention, when writing a contract between individuals online, by providing a smart contract function based on a blockchain, transactions between individuals are safely conducted while protecting personal information. 1. A personal intellectual property (IP) protection system comprising:a terminal configured to transmit, when the terminal performs an electronic contract function with another terminal for IP to which a user of the terminal has a right, an electronic contract generated in relation to electronic contract, IP information related to the generated electronic contract, and identification information of the terminal;a server configured to encrypt the electronic contract using a preset personal key and transmit the encrypted electronic contract, the IP information related to the electronic contract, and the identification information of the terminal to a blockchain server; andthe blockchain server configured to register the encrypted electronic contract, the IP information related to the electronic contract, and the identification information of the terminal, which are transmitted from the server, in a blockchain in the blockchain server,wherein the server generates a random number code having a preset number of bits, apply the generated random number code to a preset hash function to generate a hash value, extracts a preset bit section from the generated hash value, apply the extracted bit section to another preset hash function to generate a personal key and an encryption key including a public key, and encrypts the electronic contract using the generated personal key, andthe terminal is configured to publish a work produced by the user of the terminal and posts a license agreement for the published work through the server so that another user of the another terminal checks the license agreement for the work produced by the user, and the ...

Подробнее
02-01-2020 дата публикации

COMPUTING SYSTEMS AND METHODS

Номер: US20200004951A1
Принадлежит: GOPC PTY LTD

In one preferred form of the present invention shown in in FIG. there is provided a computer implemented method The method comprises: (A) providing at least one mobile electronics device, each device having a data store comprising a first area and a second area; the second area being distinct from the first area to assist with securing the first area; the first area being a system area and the second area for storing personal information; and (B) in connection with each mobile electronic device: associating personal information with computer identifying information to provide special personal information; storing the special personal information in the second area; and retrieving the personal information by: (i) reading the special personal information from the second area; and (ii) applying the computer identifying information to the special personal information. 1. A computer implemented method comprising: (A) providing at least one mobile electronics device , each device having a data store comprising a first area and a second area; the second area being distinct from the first area to assist with securing the first area; the first area being a system area and the second area for storing personal information; and (B) in connection with each mobile electronic device: associating personal information with computer identifying information to provide special personal information; storing the special personal information in the second area; and retrieving the personal information by: (i) reading the special personal information from the second area; and (ii) applying the computer identifying information to the special personal information.2. A computer implemented method as claimed in wherein the first area comprises a locked down system area; the second area comprises an authentication area and the personal information comprises authentication data.3. A computer implemented method as claimed in or wherein in connection with each mobile electronic device: the first ...

Подробнее
02-01-2020 дата публикации

METHOD AND APPARATUS FOR OBTAINING INPUT OF SECURE MULTIPARTY COMPUTATION PROTOCOL

Номер: US20200004973A1
Автор: Li Lichun, LIU ZHENG, YIN Shan
Принадлежит:

Privacy protection methods, systems, and apparatus, including computer programs encoded on computer storage media, are provided. One of the methods is performed by a second computing device and includes: receiving a data request for object data from a first computing device, wherein the object data is associated with an object and is stored in the second computing device; performing encryption of the object data using a public key associated with the object based on the data request to generate a first ciphertext; obtaining verification data based on the first ciphertext for verifying whether a ciphertext to be verified corresponds to the object data; and sending the verification data to the first computing device for the first computing device to execute a cryptography protocol with a third computing device based on the verification data. 1. A method for privacy protection , wherein the method is performed by a second computing device and comprises:receiving a data request for object data from a first computing device, wherein the object data is associated with an object and is stored in the second computing device;performing encryption of the object data using a public key associated with the object based on the data request to generate a first ciphertext;obtaining verification data based on the first ciphertext for verifying whether a ciphertext to be verified corresponds to the object data; andsending the verification data to the first computing device for the first computing device to execute a cryptography protocol with a third computing device based on the verification data.2. The method of claim 1 , wherein:the data request contains a random number for homomorphic encryption of the object data; andperforming encryption of the object data using the public key associated with the object based on the data request to generate the first ciphertext comprises performing homomorphic encryption of the object data using the public key received from the first computing ...

Подробнее
07-01-2021 дата публикации

METHOD AND SYSTEM PROVIDING INTEROPERABILITY BETWEEN BLOCKCHAIN ECOSYSTEMS

Номер: US20210004774A1
Автор: RAMGOPAL Vivekanand
Принадлежит: TATA CONSULTANCY SERVICES LIMITED

This disclosure relates generally to a system and method to interoperability between two or more independent ecosystems. Wherein the first ecosystem comprises a blockchain platform. The system identifies a smart contract of the blockchain platform, a set of protocols of the second ecosystem, and a format of a message of the second ecosystem. The identified smart contract, the identified set of protocols, the identified format of the message and a meta-data driven service orchestration for the transaction are analyzed by the system. Further, the system invokes at least one application programming interface (API) based on the analysis of the smart contract of the first ecosystem, the set of protocols and the format of the message of the second ecosystem, and the metadata driven service orchestration for the transaction. Finally, the system is enabled to transmit the at least one transaction between the first ecosystem and the second ecosystem. 1. A method to provide interoperability between two or more independent ecosystems , the method comprising one or more steps of:transmitting at least one transaction from a first ecosystem to a second ecosystem, wherein the first ecosystem comprises a blockchain platform;identifying a smart contract of the blockchain platform for interoperability with the second ecosystem;identifying a set of protocols of the second ecosystem to connect with the second ecosystem;identifying a format of a message of the second ecosystem to transmit to the second ecosystem;analyzing the identified smart contract, the identified set of protocols, the identified format and a meta data driven service orchestration for the transaction;invoking at least one application programming interface (API) based on the analysis of smart contract of the first ecosystem, the set of protocols and formats of the second ecosystem, and the metadata driven service orchestration for the transaction; andcompleting the at least one transaction between the first ecosystem ...

Подробнее
07-01-2021 дата публикации

TRANSACTION SYSTEM AND TRANSACTION METHOD

Номер: US20210004788A1
Автор: Kim Min Soo
Принадлежит:

A transaction system comprises: a terminal device for transmitting, to a server, a remittance request signal for remitting cryptocurrency stored in an electronic wallet; and a transaction server for receiving the remittance request signal from the terminal device, requesting verification of transaction from a blockchain network in order to determine whether the remittance request signal is valid, and remitting the cryptocurrency to an electronic wallet of another terminal device when the remittance request signal is valid as a result of the verification of transaction. 1. A transaction system comprising:a terminal device transmitting, to a server, a remittance request signal for remitting cryptocurrency kept in an electronic wallet; anda transaction server receiving the remittance request signal from the terminal device, requesting transaction verification to a blockchain network in order to determine whether the remittance request signal is available, and remitting the cryptocurrency to an electronic wallet of another terminal device when the remittance request signal is available according to a transaction verification result.2. The transaction system of claim 1 , further comprising:another terminal device receiving the cryptocurrency,wherein each of the terminal device and the another terminal device stores the electronic wallet and the transaction server remits the cryptocurrency from the electronic wallet of the terminal device to the electronic wallet of the another terminal device when the remittance request signal is available.3. The transaction system of claim 2 , wherein the electronic wallet of the terminal device stores information on a balance of the cryptocurrency held by a user of the terminal device and the electronic wallet of the another terminal device stores information on the balance of the cryptocurrency held by the user of the another terminal device.4. The transaction system of claim 2 , wherein the transaction server stores each of the same ...

Подробнее
07-01-2021 дата публикации

DISTRIBUTED SMART WALLET COMMUNICATIONS PLATFORM

Номер: US20210004792A1
Принадлежит:

A system and method for digital smart wallet communications that operates by managing separately-owned, private blockchains to reduce processing times, eliminate proof of work burdens, and retain blockchain immutable security while allowing protection of confidential information contained on each blockchain. The system and method may further comprise auditability of blockchains, and may be operated on an integrated communications platform that allows seamless interoperability of communication devices across multiple modes of communication, and automates digital smart wallet transactions. 1. A system for digital smart wallet transactions , comprising: receive a transaction request from a transaction router;', 'complete a transaction corresponding to the transaction request with a second immutable ledger manager;', 'record the transaction on the first immutable ledger; and', 'send a notification of recordation of the transaction on the first immutable ledger to the transaction router;, 'a first immutable ledger manager, comprising a first immutable ledger and a first plurality of programming instructions stored in a memory of, and operating on a processor of, a first computing device, wherein the plurality of programming instructions, when operating on the processor, cause the first computing device to receive the transaction request from the transaction router;', 'complete the transaction corresponding to the transaction request with the first immutable ledger manager;', 'record the transaction on the second immutable ledger; and', 'send a notification of recordation of the transaction on the second immutable ledger to the transaction router; and, 'the second immutable ledger manager, comprising a second immutable ledger and a second plurality of programming instructions stored in a memory of, and operating on a processor of, a second computing device, wherein the plurality of programming instructions, when operating on the processor, cause the second computing ...

Подробнее
07-01-2021 дата публикации

METHOD AND SYSTEM FOR AUTHORIZATION USING A PUBLIC LEDGER AND ENCRYPTION KEYS

Номер: US20210004799A1
Принадлежит: MasterCard International Incorporated

A method for conveying a data message using a public ledger includes: generating, by a generation module of a processing server, a data message, wherein the data message comprises one or more data values; electronically transmitting, by a transmitting device of the processing server, a data signal superimposed with the generated data message to a first computing system; receiving, by a receiving device of the processing server, a data signal superimposed with an encrypted message from the first computing system, wherein the encrypted message is generated via application of one or more encryption algorithms to the generated data message using at least one encryption key; appending, by the generation module of the processing server, an identification value to the encrypted message; and submitting, by the transmitting device of the processing server, the appended encrypted message to a public ledger associated with a second computing system. 1. A method for securely conveying a transaction message , comprising:applying, by a first computing system, one or more encryption algorithms to a data message using at least one encryption key to generate an encrypted message;transmitting, by the first computing system, the at least one encryption key to a third computing system different from a processing server, wherein the third computing system acts as a node in a blockchain network;receiving, by a receiving device of the processing server from the first computing system, a data signal superimposed with the encrypted message, wherein the processing server does not receive the at least one encryption key;appending, by the processing server, an identification value to the encrypted message;submitting, by the transmitting device of the processing server, the appended encrypted message to a second computing system, wherein the second computing system is a node in the blockchain network;adding, by the second computing system acting as a node in the blockchain network, the ...

Подробнее
02-01-2020 дата публикации

BLOCKCHAIN TRACKING OF ORGANIZATIONAL TIME FOR COST ANALYSIS AND SCHEDULING

Номер: US20200005207A1
Принадлежит:

In non-limiting examples of the present disclosure, systems, methods and devices for indicating time-cost allocation for an organization for a specified time period are presented. A virtual time coin system may be utilized to track temporal transactions made by organizational entities (e.g., organizational groups, organizational employees). A time coin application may track temporal transactions (e.g., meeting invites, meeting cancelations, meeting expansions) made by organizational entities, and those transactions may be stored on blocks of a temporal blockchain that is duplicated across a plurality of nodes in a distributed ledger. Each temporal transaction may be associated with a withdrawal or deposit of time coins from a time coin repository corresponding to the organizational entity or entities that were party to a transaction. The time coin application may analyze bocks in temporal blockchains and cause the results of that analysis to be graphically displayed. 1. A system for indicating time-cost allocation for an organization for a specified time period , comprising:a memory for storing executable program code; and receiving a request to display a graphical representation of a ratio of time coins to be withdrawn from a time repository for the organization for each of a plurality of tasks during the specified time period compared with a number of total time coins remaining in the time repository for the organization during the specified time period;', 'analyzing a plurality of blocks in a blockchain ledger, wherein each of the plurality of blocks indicates one of: at least one time coin that is to be withdrawn from the time repository for the organization and applied to one of the plurality of tasks; and at least one time coin that is to be deposited back into the time repository for the organization; and', 'displaying, based on the analysis, the graphical representation., 'one or more processors, functionally coupled to the memory, the one or more processors ...

Подробнее
02-01-2020 дата публикации

SUPPLY MESH PLATFORM

Номер: US20200005224A1
Принадлежит:

A computer-implemented method for producing a supply mesh is disclosed. The method may include retrieving, from a distributed ledger, entity data. The entity data may include one or more features of a first set of one or more entities. The method may include retrieving, from the distributed ledger, relationship data. The relationship data may include a first set of one or more relationships between the first set of one or more entities. The method may include generating the supply mesh. Generating the supply mesh may include generating two or more value links based on the entity data. Generating the supply mesh may include generating one or more transitions based on the relationship data, each transition connecting two value links. 1. A computer-implemented method for producing a supply mesh , comprising:retrieving, from a distributed ledger, entity data comprising one or more features of a first set of one or more entities;retrieving, from the distributed ledger, relationship data comprising a first set of one or more relationships between the first set of one or more entities; and generating two or more value links based on the entity data, and', 'generating one or more transitions based on the relationship data, each transition connecting two value links., 'generating the supply mesh, comprising'}2. The computer-implemented method of claim 1 , wherein retrieving data from the distributed ledger comprises retrieving data referenced by the distributed ledger.3. The computer-implemented method of claim 1 , wherein generating the two or more value links comprises generating one or more value link features for each value link claim 1 , each value link feature comprising data based on the one or more features of the entity represented by the value link.4. The computer-implemented method of claim 1 , wherein generating the two or more value links comprises generating a value link based on a plurality of entities of the first set of one or more entities.5. The computer- ...

Подробнее
04-01-2018 дата публикации

ELECTRONIC TRANSACTION RISK ASSESSMENT BASED ON DIGITAL IDENTIFIER TRUST EVALUATION

Номер: US20180005235A1
Автор: THORNE JAY WILLIAM
Принадлежит:

For a comprehensive view of the parties involved in a transaction, a transaction risk assessment system can collect and persist digital credentials of entities' involved in a requested electronic transaction. With the entity credentials, the transaction risk assessment system performs an on-demand risk analysis of the requested electronic transaction based, at least in part, on previously collected historical transaction data of the entities involved in the electronic transaction. The risk assessment system searches the historical transaction data for information about the entities involved in the requested transaction and evaluates discovered information. The transaction risk assessment system can quantify trustworthiness of each entity involved in the requested transaction based on the evaluation of the discovered information. The transaction risk assessment system can then quantify risk of executing the transaction at least using the quantified trustworthiness of the involved entities. 1. A method comprising: [ determining, from historical transaction data, one or more historical transactions that indicate the entity;', 'determining a trust value for the entity based, at least in part, on data for the historical transactions that indicate the entity;, 'after successful authentication of the entity with identity information of the requested electronic transaction,'}, 'assigning the trust value to the entity;, 'for each of a plurality of entities identified as participating in a requested electronic transaction,'}determining a risk value for the requested electronic transaction based, at least in part, on the trust values assigned to the plurality of entities; andcommunicating the risk value for the requested electronic transaction for determination of whether to execute the requested electronic transaction.2. The method of further comprising determining a set of one or more rules claim 1 , wherein determining the risk value is also based claim 1 , at least in part ...

Подробнее
02-01-2020 дата публикации

BLOCKCHAIN-IMPLEMENTED METHOD FOR CONTROL AND DISTRIBUTION OF DIGITAL CONTENT

Номер: US20200005254A1
Принадлежит:

The disclosure relates to a blockchain-implemented system and method of controlling the transmission and/or distribution of digital content. In an illustrative embodiment, the blockchain is the Bitcoin blockchain. The first user () is associated with a deposit quantity of cryptocurrency at a common address (), wherein to spend from the common address requires signatures of both a first private key of the first user () and a second private key of the second user (). The system () comprises a first node () and a second node (). The first node () is associated with a first user () comprising a first processing device configured to: (A) send, over a communications network (), a request to the second node () to provide an episode of digital content from a series of digital content; (B) determine a payment transaction () to transfer from a common address () a payment quantity of cryptocurrency to the second user (), wherein the payment quantity of cryptocurrency is based on a quantity of episodes of digital content in the series of digital content requested by the first user (); and (C) sign, with the first private key (V), the payment transaction () and subsequently send the payment transaction () to the second node (). The second node () is associated with the second user () comprising a second processing device configured to: (I) receive, over the communications network (), the request from the first node () to provide the episode of digital content and the payment transaction (), signed with the first private key; (II) verify the payment transaction, comprising verifying that the payment transaction includes the payment quantity of cryptocurrency to the second user (), and based on the result of verifying the second processing device is further configured to: (III) provide access, over the communications network (), to the episode of digital content (i) to be available to the first node (); and (IV) co-sign, with the second private key of the second user (), the ...

Подробнее
02-01-2020 дата публикации

Systems and Methods for Implementing Blockchain-Based Content Engagement Platforms Utilizing Media Wallets

Номер: US20200005284A1
Автор: Vijayan Madhu
Принадлежит:

Systems and methods are described for implementing blockchain-based content engagement platforms. In several embodiments, the content engagement platform includes a registry service which enables verified content creators to mint Non-Fungible Tokens (NFTs). In many embodiments, media wallet applications enable users to securely store NFTs and/or other tokens on their devices. In a number of embodiments, the media wallet applications collect data concerning media consumed by users and aggregate the media consumption data in a permissioned analytics blockchain. The manner in which the media consumption data is stored can enable users to control permission to access their personal data. In one embodiment, a media wallet is provided that can securely store NFTs, display a user interface through which user instructions concerning data access permissions are received, and cause media consumption data to be written to at least one immutable ledger in conjunction with a set of data access permissions. 1. A user device , comprising:a processor;a network interface;memory containing a media wallet application; securely store non-fungible tokens (NFTs), where each NFT is associated with a programmatically defined smart contract written to at least one immutable ledger;', 'display a user interface through which user instructions concerning data access permissions are received; and', 'cause media consumption data to be written to the at least one immutable ledger in conjunction with a set of data access permissions determined in accordance with user instructions concerning data access permission received via the user interface., 'wherein the processor is capable of being configured by the media wallet application to2. The user device of claim 1 , wherein the at least one immutable ledger comprises:an NFT blockchain to which the smart contracts for each NFT are written; anda permissioned analytics blockchain to which media consumption data is written.3. The user device of claim 1 ...

Подробнее
07-01-2021 дата публикации

MODIFYING A PORTFOLIO OF BLOCKCHAIN-ENCODED RIVED LONGEVITY-CONTINGENT INSTRUMENTS

Номер: US20210004906A1
Автор: Grube Gary W.
Принадлежит: 2BC Innovations, LLC

A method executed by a computing device includes obtaining a blockchain-encoded record representing an available longevity-contingent instrument and verifying authenticity of the blockchain-encoded record to produce an authenticity indicator. When the authenticity indicator is favorable, the method further includes determining to include the available longevity-contingent instrument in the set of longevity-contingent instruments to produce an updated set of longevity-contingent instruments. The method further includes updating the blockchain-encoded record to include selection information. The method further includes riving the available longevity-contingent instrument to reassign a face value benefit from an ownership entity to a benefit entity and to reassign a premium payment stream from the ownership entity to a sponsor entity, where a beneficial valuation elevation is created. 1. A method comprises:obtaining, by a computing device, a blockchain-encoded record representing a second longevity-contingent instrument, wherein the second longevity-contingent instrument assigns a second face value benefit of the second longevity-contingent instrument and a second premium payment stream of the second longevity-contingent instrument to a second ownership entity, wherein a first longevity-contingent instrument of a set of longevity-contingent instruments is rived in accordance with a rive approach to reassign a first face value benefit of the first longevity-contingent instrument from a first ownership entity to a benefit entity to produce a first sub-asset of a plurality of sub-assets of the set of longevity-contingent instruments, wherein the first longevity-contingent instrument is further rived in accordance with the rive approach to reassign a first premium payment stream of the first longevity-contingent instrument from the first ownership entity to a sponsor entity to produce a first sub-liability of a plurality of sub-liabilities of the set of longevity- ...

Подробнее
02-01-2020 дата публикации

System and Method for Processing Payments in Fiat Currency Using Blockchain and Tethered Tokens

Номер: US20200005290A1
Принадлежит: Individual

A method of processing a payment including receiving a payment lookup request, identifying a user network account on a blockchain network, sending a payment authorization request to and receiving authorization from a user, transferring ownership of an in-network token responsive to the authorization, sending a debit request to a user financial account, receiving a debit response from the user financial account, sending a credit request to a receiver financial account, and receiving a credit response from the receiver financial account.

Подробнее
02-01-2020 дата публикации

AUTHORIZING MULTIPARTY BLOCKCHAIN TRANSACTIONS VIA ONE-TIME PASSWORDS

Номер: US20200005296A1
Автор: Green Matthew
Принадлежит:

An example operation may include one or more of creating a proposed transaction including one or more assets, transmitting the proposed transaction to a user device for authorization, receiving authorization from the user device via an asynchronous one-time password to authorize the proposed transaction, and creating a blockchain transaction including the asynchronous one-time password and content of the proposed transaction responsive to receiving the authorization. 1. A method , comprising:creating a proposed transaction comprising one or more assets;transmitting the proposed transaction to a user device for authorization;receiving authorization from the user device via an asynchronous one-time password to authorize the proposed transaction; andcreating a blockchain transaction comprising the asynchronous one-time password and content of the proposed transaction responsive to receiving the authorization.2. The method of claim 1 , further comprising:creating a verifiable hash identifier to include in the blockchain transaction.3. The method of claim 1 , wherein the blockchain transaction comprises a list of the one or more assets created by an Internet of things (IoT) compatible device.4. The method of claim 1 , further comprising:receiving a wireless communication message comprising the authorization from the user device.5. The method of claim 4 , wherein the wireless communication message comprises one or more of a near field communication (NFC) message claim 4 , a radio frequency identification (RFID) message claim 4 , and a Bluetooth message.6. The method of claim 3 , further comprising:digitally signing the blockchain transaction with a public key maintained by the IoT compatible device.7. The method of claim 1 , wherein the blockchain transaction further comprises a timestamp claim 1 , a hash ID claim 1 , an origin address claim 1 , a destination address claim 1 , and the one or more assets.8. A system claim 1 , comprising:a user device; and transmit the ...

Подробнее
02-01-2020 дата публикации

RENTAL ASSET PROCESSING FOR BLOCKCHAIN

Номер: US20200005388A1
Принадлежит:

An example operation may include one or more of determining, by a first blockchain node, a need for a rental asset unable to be provided by the first blockchain node, requesting use of the rental asset from a second blockchain node controlling the rental asset, reserving, by the second blockchain node, the rental asset, utilizing the rental asset, designating the rental asset as in-use, and in response to the rental asset no longer being in-use. returning control of the rental asset to the second blockchain node. 1. A method , comprising:determining, by a first blockchain node, a need for a rental asset unable to be provided by the first blockchain node;requesting use of the rental asset from a second blockchain node controlling the rental asset;reserving, by the second blockchain node, the rental asset;utilizing the rental asset;designating the rental asset as in-use; and 'returning control of the rental asset to the second blockchain node.', 'in response to the rental asset no longer being in-use2. The method of claim 1 , wherein a private blockchain network comprises the first and second blockchain nodes claim 1 , wherein determining the need for the rental asset unable to be provided by the first blockchain node comprising:receiving a request for the rental asset from a consumer outside the private blockchain network;determining the rental asset is unavailable from the first blockchain node; andidentifying the second blockchain node as controlling the rental asset.3. The method of claim 1 , wherein one or more of requesting use of the rental asset from a second blockchain node claim 1 , reserving the rental asset claim 1 , and designating the rental asset as in-use are blockchain transactions.4. The method of claim 3 , wherein each of the blockchain transactions are stored to a shared ledger by each of the first and second blockchain nodes claim 3 , wherein a record of private transactions between the first and second blockchain nodes is stored as hashes on the ...

Подробнее
07-01-2021 дата публикации

BLOCKCHAIN-BASED SYSTEM AND METHOD FOR SECURING TRANSACTIONS AND CONTROLLING ACCESS TO WORKSITES

Номер: US20210005039A1
Принадлежит:

According to various embodiments, a system for controlling the presence of one or more individuals at a worksite is disclosed. The system includes a kiosk device and a database. The kiosk device includes a scanning device configured to receive an optical code representing an individual. The kiosk device further includes a processing system configured to determine whether the identified individual can enter the worksite by comparing professional documentation of the identified individual with safety requirements of the worksite. The database includes professional documentation of potential worksite individuals that the processing system can access to determine whether the identified individual can enter the worksite. 1. A kiosk device for controlling the presence of one or more individuals at a worksite , the device comprising:an identifying mechanism configured to receive identifying information representing an individual; anda processing system configured to determine whether the identified individual can enter the worksite by accessing a database to compare professional documentation of the identified individual with safety requirements of the worksite.2. The kiosk device of claim 1 , further comprising an enclosure to house the identifying mechanism and processing system.3. The kiosk device of claim 1 , wherein the processing system is further configured to create a relationship between an identified individual and at least one of a particular trade tool claim 1 , item of hardware claim 1 , and machinery.4. The kiosk device of claim 1 , wherein the processing system is configured to connect to a network to access the database.5. The kiosk device of claim 1 , wherein the identifying mechanism comprises a scanning device configured to receive an optical code representing the individual.6. The kiosk device of claim 1 , wherein the identifying mechanism comprises at least one of a camera for face recognition claim 1 , a fingerprint reader claim 1 , an iris reader ...

Подробнее
07-01-2021 дата публикации

ELECTRONIC VOTING SYSTEM AND CONTROL METHOD

Номер: US20210005040A1

A method for controlling one of voting servers in an electronic voting system is provided. The method includes receiving, from a terminal, transaction data including voting data, and determining, by a processor, a block to include the transaction data from among multiple blocks. The method further includes generating, using the processor, the block including the transaction data, and connecting the block to a blockchain, the blockchain being stored in a memory. 1. A method for controlling one of a plurality of voting servers in an electronic voting system , the method comprising:receiving, from a terminal, transaction data including voting data;determining, by a processor, a block to include the transaction data from among a plurality of blocks;generating, using the processor, the block including the transaction data; andconnecting the block to a blockchain, the blockchain being stored in a memory.2. The method according to claim 1 ,wherein in the determining, a block ID of the block to include the transaction data is determined.3. The method according to claim 2 ,wherein the block ID is determined randomly.4. The method according to claim 2 ,wherein the block ID is determined on based on information received from one or more terminals.5. The method according to claim 2 ,wherein the method further comprises, transmitting the determined block ID to the plurality of voting servers.6. The method according to claim 1 ,wherein the voting data including a vote-cast identifier associated with a vote cast by a voter and voting information indicating the vote, a voter identifier associated with the voter being different from the vote-cast identifier7. The method according to claim 1 ,wherein the method further comprises,implementing a consensus algorithm when the block is determined, andgenerating the block after implementing the consensus algorithm.8. A computer comprising:a processor; and{'claim-ref': {'@idref': 'CLM-00001', 'claim 1'}, 'a memory that stores a program for ...

Подробнее
07-01-2021 дата публикации

ELECTRONIC VOTING SYSTEM AND CONTROL METHOD

Номер: US20210005041A1

A method for controlling one of a plurality of voting servers in an electronic voting system is provided. The method includes receiving, from a terminal, transaction data including voting data, and generating, using a processor, a block including the transaction data and dummy transaction data. The dummy transaction data including dummy voting data that is not associated with the voting data. The method further connects the generated block to a blockchain, the blockchain being stored in a memory. 1. A method for controlling one of a plurality of voting servers in an electronic voting system , the method comprising:receiving, from a terminal, transaction data including voting data;generating, using a processor, a block including the transaction data and dummy transaction data, the dummy transaction data including dummy voting data that is not associated with the voting data; andconnecting the generated block to a blockchain, the blockchain being stored in a memory.2. The method according to claim 1 ,wherein the dummy voting data randomly indicate a plurality of candidates.3. The method according to claim 1 ,wherein the dummy voting data being different from votes included in the voting data received from the terminal.4. The method according to claim 1 ,wherein the method further comprises,generating the dummy transaction data, andtransmitting the generated dummy transaction data to the plurality of voting servers.5. The method according to claim 1 ,wherein the method further comprises,outputting a number of pieces of the dummy transaction data included in the blockchain, andcalculating an actual number of votes obtained by each candidate by subtracting the number of pieces of the dummy transaction data output from a number of votes obtained by the each candidate.6. The method according to claim 1 ,wherein the dummy transaction data is generated when the voting data is received from the terminal7. The method according to claim 1 ,wherein the method further comprises, ...

Подробнее
03-01-2019 дата публикации

METHODS AND APPARATUS FOR EFFICIENT COMPUTATION OF ONE-WAY CHAINS IN CRYPTOGRAPHIC APPLICATIONS

Номер: US20190005250A1
Принадлежит:

Techniques are disclosed for efficient computation of consecutive values of one-way chains and other one-way graphs in cryptographic applications. The one-way chain or graph may be a chain of length shaving positions i=1, 2, . . . s each having a corresponding value vassociated therewith, wherein the value vis given by v=h(v), for a given hash function or other one-way function h. An initial distribution of helper values may be stored for the one-way chain of length s, e.g., at positions given by i=2for 0≤j≤logs. A given one of the output values vat a current position in the one-way chain may be computed utilizing a first helper value previously stored for another position in the one-way chain between the current position and an endpoint of the chain. After computation of the given output value, the positions of the helper values are adjusted so as to facilitate computation of subsequent output values. Advantageously, a storage-computation product associated with generation of the output values of the one-way chain has a complexity O((log s)). 1. A method implemented by a processor , the processor being coupled to a memory , the memory having a designated amount of storage available for storing values of a one-way chain , the designated amount of available storage being less than that required to store simultaneously all of the values of the one-way chain , the method comprising the steps of:storing in the memory a subset of the values of the one-way chain as helper values for facilitating computation of other values of the one-way chain not in the subset;utilizing one of the values in the subset of values to compute one of the other values of the one-way chain not in the subset;generating a cryptographic output determined by the computed value not in the subset; andupdating the stored subset of values of the one-way chain so as to replace at least one of the helper values with a new helper value not previously part of the subset.2. The method of wherein a storage- ...

Подробнее
13-01-2022 дата публикации

Right Holder Terminal, Permission Information Management Method, and Permission Information Management Program

Номер: US20220014360A1
Принадлежит:

A user terminal generates a first key pair and a second key pair, transmits a permission request including a public encryption key of the second key pair after electronically signing the permission request with a secret encryption key, and acquires, from permission information transmitted from a right-holder terminal, a content decryption key by using a secret decryption key of the second key pair and uses the content. The right-holder terminal stores a third key pair and the content decryption key, verifies the permission request received, and encrypts the content decryption key by using the public encryption key of the second key pair included in the permission request and transmits the permission information including the encrypted content decryption key after electronically signing the permission information with a secret encryption key of the third key pair. The permission request and the permission information are transmitted and received via a blockchain. 1. A right-holder terminal of a right holder of a content , comprising:a key management unit that stores therein a key pair for an electronic signature including a secret encryption key and a public decryption key and the content decryption key for decryption of the content;a permission verification unit that verifies whether a permission request received from a user terminal of a user of the content satisfies a permission condition for the content; anda permission issuance unit that, when the permission request satisfies the permission condition, encrypts the content decryption key by using a public encryption key included in the permission request, and transmits permission information including the encrypted content decryption key to the user terminal after electronically signing the permission information with the secret encryption key of the key pair, whereinthe permission request and the permission information are transmitted and received via a blockchain.2. A permission information management method ...

Подробнее
13-01-2022 дата публикации

Blockchain-based anonymous transfers zero-knowledge proofs

Номер: US20220014502A1
Принадлежит: Toposware Inc

Disclosed is a mechanism for performing an anonymous transfer using a blockchain. A sender's device generates a commitment based on a serial number of a zero-knowledge token and a value of the zero-knowledge token. Moreover, the sender's device generates a range proof and a balance proof for the commitment. The range proof verifies that the value of the zero-knowledge token is within a preset range. The balance proof verifies that the value of a set of input tokens is greater than or equal to the value of the zero-knowledge token. The sender's device sends a conversion request to the blockchain network. The conversion request consumes the set of input tokens and generates the zero-knowledge token. The conversion request includes the generated commitment, the generated range proof, and the generated balance proof.

Подробнее
07-01-2021 дата публикации

SYSTEM AND METHOD FOR IMPROVING TREATMENT OF A CHRONIC DISEASE OF A PATIENT

Номер: US20210005299A1
Принадлежит:

An HIE system and a method for improving treatment of a chronic disease of a patient are described. The method comprises providing a user device for allowing a patient to connect to a health care network implemented over blockchain and to manage access of patient data stored over the blockchain. The method further comprises providing a physician network device for allowing a physician to connect to the health care network. A request may be received from the physician for accessing the patient data and a first parameter related to the patient. The first parameter may be correlated with patients' data to identify correlated data points relevant for the patient. The correlated data points may be sent to the physician, for being used towards the treatment of the chronic disease. 1. A computer-implemented method for improving treatment of a chronic disease of a patient , comprising:a. receiving in a health care network, from a physician using a physician network device, a request for accessing at least a portion of a patient data and parameters including a first parameter and a second parameter related to the patient, wherein the patient data is stored over a blockchain;b. allowing the patient to manage access to the patient data in the blockchain via a user device communicatively coupled with the health care network;c. correlating, using a correlation engine, the first parameter with patients' data to identify at least two correlated data points relevant for the patient; andd. sending, to the physician, the correlated data points for being used towards treatment of the chronic disease of the patient.2. The computer-implemented method of claim 1 , further comprising storing the correlated data points relevant for the patient in a treatment database.3. The computer-implemented method of claim 1 , wherein the physician is an individual belonging to one of a hospital claim 1 , an insurance company claim 1 , a contract research organization claim 1 , or a pharmaceutical ...

Подробнее
03-01-2019 дата публикации

ACCREDITED CERTIFICATE ISSUANCE SYSTEM BASED ON BLOCK CHAIN AND ACCREDITED CERTIFICATE ISSUANCE METHOD BASED ON BLOCK CHAIN USING SAME, AND ACCREDITED CERTIFICATE AUTHENTICATION SYSTEM BASED ON BLOCK CHAIN AND ACCREDITED CERTIFICATE AUTHENTICATION METHOD BASED ON BLOCK CHAIN USING SAME

Номер: US20190005470A1
Принадлежит:

The present invention relates to an accredited certificate issuance system based on a block chain and an accredited certificate issuance method based on block chain using the same, and an accredited certificate authentication system based on a block chain and an accredited certificate authentication method based on a block chain using the same, which disenable a leak of a personal key for accredited certification by autonomously generating, storing and managing the personal key for accredited certification by means of a random number generator mounted in a terminal in which it is impossible to install a function or an additional program for physically accessing and reading the inside of a system; enable a public key for accredited certification, which requires maintenance, to be stored and managed in a block chain of electronic wallets mounted in block chain retention servers via a peer-to-peer (P2P) network-based distribution database, not in a server operated by an accredited certificate authority (CA), and thus incur almost no costs for maintenance by, if hacking occurs, preventing occurrence of costs for establishing an accredited certificate issuance system having an advanced security system interworking therewith so as to maximally prevent hacking, and costs for operating and maintaining the established accredited certificate issuance system; and can perform an accredited certification process even if ActiveX is not established. 1. A system for issuing a public certificate based on a blockchain , comprising:an information security device instructing its encryption engine to create a public key for the public certificate based on a private key for the public certificate stored and managed in a memory and transmit the created public key in response to a request for transmission of the public key, wherein the private key is acquired based on a random value generated from a random number generator and stored in the memory and then provided to a user;a user device ...

Подробнее
03-01-2019 дата публикации

System and Method of Peer-to-Peer Electronic Exchange of Intellectual Property

Номер: US20190005595A1
Принадлежит: Individual

A system includes a cryptographic blockchain network (CBN) including a set of processing nodes. The processing nodes each include one or more processors configured to: receive identification information from one or more sellers associated with intellectual property (IP), receive identification information associated with the one or more sellers, verify the identification information associated with the IP and the identification information associated with the one or more sellers by referencing an intellectual property database, and convert the IP into a Smart IP Contract, wherein the Smart IP Contract performs one or more functions to carry out a sale of the IP on the CBN.

Подробнее
04-01-2018 дата публикации

Cryptographic key production from a physical unclonable function

Номер: US20180006813A1
Принадлежит: Intrinsic ID BV, INTRINSIC-ID BV

Some embodiments are directed to an electronic cryptographic device configured to determine a cryptographic key. The cryptographic device has a physically unclonable function, a debiasing unit, and a key reconstruction unit. The PUF is configured to produce a first noisy bit string during an enrollment phase and a second noisy bit string during a reconstruction phase. The debiasing unit ( 120 ) is configured to determine debiasing data from the first noisy bit string during the enrollment phase. The debiasing data marks bits in the first noisy bit string as retained or discarded. The key reconstruction unit is configured to determine the cryptographic key from bits in the second noisy bit string marked as retained by the debiasing data, the cryptographic key being independent from bits in the second noisy bit string marked as discarded by the debiasing data.

Подробнее
07-01-2021 дата публикации

METHOD AND APPARATUS FOR CONTROLLING DATA ACCESS RIGHT

Номер: US20210006400A1
Принадлежит:

A method and an apparatus for controlling a data access right are disclosed. The method includes: receiving, by a first proxy node, a first request message from a request node, where the first request message includes an identity of the request node and an identifier of to-be-accessed data; determining a first encrypted ciphertext on a blockchain based on the identifier; determining, based on the identity, whether the request node has a right to read the first encrypted ciphertext; and if yes, initiating a right verification request for the request node to at least one second proxy node, and determining, based on a feedback result of the at least one second proxy node, provisioning of the first encrypted ciphertext. A proxy node is added to the blockchain network, so that a data source can freely grant or revoke the right of the request node without modifying a ciphertext, ensuring information security. 1. A method for controlling a data access right , wherein the method comprises:receiving, by a first proxy node, a first request message from a request node, wherein the first request message comprises an identity of the request node and an identifier of to-be-accessed data;determining, by the first proxy node, a first encrypted ciphertext on a blockchain based on the identifier of the to-be-accessed data, and determining, based on the identity of the request node, whether the request node has a right to read the first encrypted ciphertext; andif the request node has the right to read the first encrypted ciphertext, initiating a right verification request for the request node to at least one second proxy node, and determining, based on a feedback result of the at least one second proxy node, provisioning of the first encrypted ciphertext.2. The method according to claim 1 , wherein the determining claim 1 , based on the identity of the request node claim 1 , whether the request node has a right to read the first encrypted ciphertext comprises:reading, on the ...

Подробнее
07-01-2021 дата публикации

BLOCK CHAIN-BASED NODE DEVICE, METHOD FOR OPERATING NODE DEVICE, AND DATA PROCESSING SYSTEM

Номер: US20210006408A1
Автор: Park Sung Bae
Принадлежит:

The present invention relates to a block chain-based method of generating data block shared between a plurality of nodes. According to an example, the method for generating the data block may comprise a step for obtaining at least one binding data having public or private characteristics; a step for determining a binding key having a decoding permission level for each binding data; a step for encoding the binding data using the binding key; and a step for generating a data block including the encoded binding data, and at least a portion of the binding key. 1. A method for generating a data block which configures a block chain and is shared between a plurality of nodes comprises:a step for obtaining at least one binding data having public or private characteristics;a step for determining a binding key having a decoding permission level for each binding data;a step for encoding the binding data using the binding key; anda step for generating a data block including the encoded binding data, and at least a portion of the binding key.2. The method for generating a data block of the claim 1 , wherein the data block comprises:a header region including index information indicating the type of the at least one binding data;a public region into which a hash value of the at least one binding data stored in the data block is stored;a binding region in which the encoded binding data and at least a portion of the binding key are stored; anda private region in which encoded private data is stored.3. The method for generating a data block of the claim 2 , wherein the header region further comprises:at least more than one among a hash value of the encoded private region;at least a portion of a first public key that restricts access of an unauthorized node for the data block; anda count number of an integrity verification of the data block.4. The method for generating a data block of the claim 2 , wherein the public region comprises a public data including a type information ...

Подробнее
07-01-2021 дата публикации

METHOD FOR PROVIDING VIRTUAL ASSET SERVICE BASED ON DECENTRALIZED IDENTIFIER AND VIRTUAL ASSET SERVICE PROVIDING SERVER USING THEM

Номер: US20210006410A1
Автор: Song Joo Han, Uhr Joon Sun
Принадлежит:

A method for providing a virtual asset service based on a DID (decentralized identifier) is provided. The method includes steps of: a service providing server (a) if VADs (virtual asset addresses) are registered as a whitelist and if virtual asset transmission is requested, (a1) transmitting the virtual asset from a sender's VAD to a first VAD, (a2) if the first VAD is not registered, allowing a sender's device to request for registration of receiver's KYC, transmit or register a receiver's signature to the service providing server or in a data hub, and (3) transmit a receiver's DID to the service providing server; and (b) (i) acquiring a receiver's public key and a second VAD, or acquiring the signature from the data hub (ii) verifying the signature and the first VAD, and (iii) if the first and the second VADs are identical, registering the first VAD and transmitting the virtual asset. 1. A method for providing a virtual asset service based on a DID (decentralized identifier) , comprising steps of:(a) on condition that virtual asset addresses of users have been registered and managed as a whitelist according to authentication results of KYC (know your customer) information corresponding to the users, if a request for transmission of a virtual asset is acquired from a sender's device owned by a sender who is determined as having an intention to transmit the virtual asset, wherein the request for the transmission of the virtual asset includes a first receiver's virtual asset address corresponding to a receiver who is to receive the virtual asset, and wherein a sender's virtual asset address has already been registered in the whitelist, a virtual asset service providing server performing or supporting another device to perform (a1) a process of determining whether the first receiver's virtual asset address is registered in the whitelist, (a2) if the first receiver's virtual asset address is determined as registered in the whitelist, a process of transmitting the ...

Подробнее
07-01-2021 дата публикации

COMMUNICATIONS SYSTEM AND DEVICES FOR ROUTING DATA

Номер: US20210006412A1
Автор: GAHLINGER Dan
Принадлежит:

A mobile electronic device includes a wireless communications interface to communicate data, memory, and a processor connected to the wireless communications interface and the memory. The processor identifies an address of a destination mobile electronic device to be transmitted a discrete quantum of data from the memory via the wireless communications interface. The address conforms to an address space defined for a plurality of devices including the mobile electronic device and the destination mobile electronic device. The address space includes a network address of a given device of the plurality of devices and a spatial address indicative of a geographic location of the given device. The processor further initiates transmission of the discrete quantum of data to the identified address. 1. A mobile electronic device comprising:a wireless communications interface to communicate data;memory; anda processor connected to the wireless communications interface and the memory, the processor to identify an address of a destination mobile electronic device to be transmitted a discrete quantum of data from the memory via the wireless communications interface, the address conforming to an address space defined for a plurality of devices including the mobile electronic device and the destination mobile electronic device, the address space including a network address of a given device of the plurality of devices and a spatial address indicative of a geographic location of the given device, the processor further to initiate transmission of the discrete quantum of data to the identified address.2. The mobile electronic device of claim 1 , further comprising a positioning subsystem to determine a geographic location of the mobile electronic device claim 1 , wherein the memory is to maintain an address of the mobile electronic device including a spatial address corresponding to the geographic location of the mobile electronic device as determined by the positioning subsystem.3. ...

Подробнее
07-01-2021 дата публикации

ALLOCATING VIRTUAL RESOURCE BASED ON BLOCK CHAIN

Номер: US20210006506A1
Автор: Zou Tao
Принадлежит: Advanced New Technologies Co., Ltd.

A method for allocating a virtual resource based on a blockchain, including: receiving a resource allocation transaction sent by a client, wherein the resource allocation transaction includes a user identifier of a target user; in response to the resource allocation transaction, invoking verification logic in a smart contract deployed in the blockchain to verify whether a service indicator of the target user within a preset service cycle satisfies a virtual resource allocation condition; and when the service indicator satisfies the virtual resource allocation condition, invoking virtual resource allocation logic in the smart contract to allocate a preset amount of virtual resources to the target user from a virtual resource pool and transfer the preset amount of virtual resources to a blockchain account corresponding to the user identifier, wherein virtual resources in the virtual resource pool are associated with service profits of a service operator corresponding to a service of the target user. 1. A computer-implemented method for allocating a virtual resource , the method comprising:receiving, by a node in a blockchain, resource allocation transaction data sent by a client, wherein the resource allocation transaction data comprises a user identifier of a target user;responsive to receiving the resource allocation transaction data, invoking verification logic in a smart contract deployed in the blockchain to verify that a service indicator of the target user within a preset service cycle satisfies a virtual resource allocation condition;when the service indicator fails to satisfy the virtual resource allocation condition, determining a preset amount of virtual resources are held in a blockchain account corresponding to the user identifier on the blockchain and transferring the preset amount of virtual resources held in the blockchain account into a virtual resource pool; orwhen the service indicator satisfies the virtual resource allocation condition, invoking ...

Подробнее
07-01-2021 дата публикации

AUTHENTICATION SYSTEM AND COMPUTER READABLE MEDIUM

Номер: US20210006555A1
Принадлежит: Mitsubishi Electric Corporation

In an authentication system () of a first organization that a first user belongs to, when the first user accesses a service of another organization from a user terminal of the first organization, an authentication device () receives a hello message from another organization system, encrypts the hello message using a client private key of the first user, and sends the encrypted hello message to said another organization system as a signature message. 1. An authentication system of a first organization that a first user belongs to , the authentication system comprising:first processing circuitryto issue a registration transaction for a client certificate of the first user before the first user accesses a service of another organization from a user terminal of a first organization; andsecond processing circuitryto receive a hello message from another organization system when the first user accesses the service of said another organization from the user terminal of the first organization, to encrypt the hello message using a client private key of the first user, and to send the encrypted hello message to said another organization system as a signature message,wherein said another organization system accepts the registration transaction for the client certificate of the first user, registers the client certificate of the first user in a client certificate blockchain, sends, when the first user accesses the service of said another organization from the user terminal of the first organization, the hello message to the authentication system, receives the signature message from the authentication system, verifies the signature message using the client certificate of the first user in the client certificate blockchain, and if the signature message is correct, decides that the first user is a legitimate user.2. The authentication system according to claim 1 ,wherein said another organization system acquires a client public key of the first user from the client certificate of ...

Подробнее
07-01-2021 дата публикации

PERMISSIONS USING BLOCKCHAIN

Номер: US20210006561A1
Принадлежит:

A network device receives a smart contract for permissions to access a service, wherein the smart contract is in an initial block for authorizations in a shared ledger. The network device receives, from an authorization server device, an update to the shared ledger, wherein the update is a proposed block in the shared ledger requiring validation. The network device stores, in a local memory, a copy of the shared ledger with the update, when the update is validated by the distributed consensus network. The network device receives, from a client device, an item request for an item associated with the service, wherein the item request includes a client identifier. The network device identifies if there is match of the client identifier and the item in the copy of the shared ledger and sends, to the client device, the item when there is match of the client identifier and the item. 1. A method , comprising:storing, by a network device in a distributed consensus network, a local copy of a shared ledger that has been validated by the distributed consensus network, wherein the local copy includes permissions for an item associated with a service, and wherein the permissions include a validity time period for access by the user device;receiving, by the network device and from a user device, an item request for the item, wherein the item request includes a user identifier and a content identifier pair;identifying, by the network device, if the user identifier and the content identifier pair matches the permissions in the local copy of the shared ledger; andsending, by the network device and to the user device, the item, when the user identifier and the content identifier pair matches the permissions in the local copy of the shared ledger.2. The method of claim 1 , further comprising:rejecting the item request when the item request is received outside the validity time period.3. The method of claim 1 , further comprising:receiving the shared ledger from an authorization server ...

Подробнее
07-01-2021 дата публикации

DECENTRALIZED AND DISTRIBUTED CONTINUOUS REPLICATION SYSTEM FOR MOVING DEVICES

Номер: US20210006620A1
Принадлежит:

A replication system for data of mobile devices is disclosed. The data of a mobile device is uploaded to stations in an area. Metadata associated with the objects is stored in a centralized or decentralized system. The metadata can be accessed to identify the stations storing the device's objects and the data of the mobile device can then be retrieved from the stations and reconstructed. 1. A method for reconstructing data of a mobile device , the method comprising:receiving, at a replication system, a request for the data of the mobile device, wherein the request includes a mobile device identifier;accessing metadata on the replication system and identifying one or more relevant data objects by utilizing the mobile device identifier to find metadata with the same mobile device identifier;identifying the location of the one or more relevant data objects on one or more stations;retrieving the relevant data objects from the one or more stations identified in the metadata; andreconstructing the data from the retrieved objects.2. A method for reconstruction data of a mobile device , the method comprising:receiving a request for the data of a mobile device;retrieving a first data object;accessing a first data object, wherein the first data object includes a pointer which identifies a location of a next data object;retrieving the next data object at the location identified by the first data object; andreconstructing the data from the retrieved data objects. Embodiments of the present invention relate to systems and methods for a replication system for network connectable devices. More particularly, embodiments of the invention relate to a distributed and decentralized replication system for IOT (Internet of Things) devices.The IOT is essentially a system of connected devices—devices that are connected to the Internet. Many of the devices purchased today, from cars to appliances to speakers, are connected to the Internet and are part of the IOT. Going forward, it is ...

Подробнее
03-01-2019 дата публикации

METHOD AND SYSTEM FOR PARTITIONED BLOCKCHAINS AND ENHANCED PRIVACY FOR PERMISSIONED BLOCKCHAINS

Номер: US20190007199A1
Автор: DAVIS Steven Charles
Принадлежит: MasterCard International Incorporated

A method for generation of blocks for a partitioned blockchain includes: storing blocks comprising a partitioned blockchain, wherein each block includes a header and transaction entries; receiving transaction data entries for each of a plurality of subnets; generating a hash value of the header included in the most recently added block; generating a new block header, the new block header including the generated hash value, a timestamp, and a sequence of pairs including a pair for each of the plurality of subnets, each pair including a subnet identifier associated with the respective subnet and a merkle root of each of the transaction data entries received for the respective subnet; generating a new block, the new block including the generated new block header and the transaction data entries for each of the plurality of subnets; and transmitting the new block to a plurality of nodes associated with the partitioned blockchain. 1. A method for generation of blocks for a partitioned blockchain , comprising:receiving, by a receiving device of the processing server, at least one transaction data entry for each of a plurality of subnets, wherein each of the at least one transaction data entries is formatted according to semantics associated with the respective subnet of the plurality of subnets;generating, by a generation module of the processor of the processing server, a new block header, wherein the new block header includes at least a sequence of pairs including a pair for each of the plurality of subnets, each pair including at least a subnet identifier associated with the respective subnet and a merkle root of each of the at least one transaction data entries received for the respective subnet;generating, by the generation module of the processor of the processing server, a new block, wherein the new block includes at least the generated new block header and the at least one transaction data entry for each of the plurality of subnets; andelectronically transmitting, ...

Подробнее
02-01-2020 дата публикации

ON-CHAIN GOVERNANCE OF BLOCKCHAIN

Номер: US20200007312A1
Принадлежит:

An example operation may include one or more of receiving a request to commit a blockchain request to a hash-linked chain of blocks stored on a distributed ledger, extracting governance policies which are encoded within a data block of the hash-linked chain of blocks on the distributed ledger, determining if the blockchain request satisfies the extracted governance policies of the hash-linked chain of blocks on the distributed ledger, and in response to the blockchain request satisfying the extracted governance policies, executing the blockchain request and storing the executed blockchain request within another data block of the hash-linked chain of data blocks on the distributed ledger. 1. A computing system comprising:a network interface configured to receive a request to commit a blockchain request to a hash-linked chain of blocks stored on a distributed ledger; anda processor configured to extract governance policies which are encoded within a data block of the hash-linked chain of blocks on the distributed ledger, determine if the blockchain request satisfies the extracted governance policies of the hash-linked chain of blocks on the distributed ledger, and, in response to successful satisfaction of the extracted governance policies, execute the blockchain request and store the executed blockchain request within another data block of the hash-linked chain of data blocks on the distributed ledger.2. The computing system of claim 1 , wherein the processor extracts the encoded governance policies from a genesis data block of the hash-linked chain of blocks.3. The computing system of claim 1 , wherein the processor is configured to determine whether a blockchain node that submitted the blockchain request is allowed to perform the blockchain request based on the extracted governance policies.4. The computing system of claim 1 , wherein the processor is further configured to receive an indication of a successful consensus for the blockchain request claim 1 , and ...

Подробнее
02-01-2020 дата публикации

ON-CHAIN GOVERNANCE OF BLOCKCHAIN

Номер: US20200007313A1
Принадлежит:

An example operation may include one or more of receiving a request to implement a modification to previously established governance policies of a blockchain, identifying one or more requirements for the modification based on the blockchain, determining whether the one or more identified requirements are satisfied based on signature data included within the request, and in response to the signature data satisfying the one or more requirements, transmitting the modification to an ordering node for inclusion within a data block of a hash-linked chain of blocks of the blockchain. 1. A computing system comprising:a network interface configured to receive a request to implement a modification to previously established governance policies of a blockchain; anda processor configured to identify one or more requirements for the modification based on the blockchain, determine whether the one or more identified requirements are satisfied based on signature data included within the request, and, in response to satisfaction of the one or more requirements by the signature data, control the network interface to transmit the modification to an ordering node for inclusion within a data block of a hash-linked chain of blocks of the blockchain.2. The computing system of claim 1 , wherein the one or more requirements are identified by the processor from a genesis block of the hash-linked chain of blocks on the blockchain.3. The computing system of claim 1 , wherein the one or more requirements comprise an identification of a group of blockchain peer nodes that must provide a signature before the requested modification can be implemented.4. The computing system of claim 1 , wherein the one or more requirements are identified by the processor based on a reference to a previously established governance policy which is stored within a data block of the blockchain.5. The computing system of claim 1 , wherein the processor is configured to identify a set of changes to the previously ...

Подробнее
02-01-2020 дата публикации

ON-CHAIN GOVERNANCE OF BLOCKCHAIN

Номер: US20200007314A1
Принадлежит:

An example operation may include one or more of receiving a request to modify a governance policy of a blockchain, identifying a principal identity that controls the governance policy, determining an allowable combination of signatures of the principal identity required for modifying the governance policy based on a graph data structure storing signature policies for endorsing modifications to governance policies, and modifying the governance policy of the blockchain based on the request in response to an allowable combination of signatures being received. 1. A computing system comprising:a network interface configured to receive a request to modify a governance policy of a blockchain; anda processor configured to identify a principal identity that controls the governance policy, determine an allowable combination of signatures of the principal identity required for modification of the governance policy based on a graph data structure that stores signature policies for endorsement of modifications to governance policies, and modify the governance policy of the blockchain based on the request in response to receipt of an allowable combination of signatures.2. The computing system of claim 1 , wherein the processor is further configured to read the graph data structure from a data block stored in a hash-linked chain of blocks on the blockchain.3. The computing system of claim 1 , wherein the graph data structure comprises a directed acyclic graph in which the group of principal identities of the blockchain are mapped to a group of nodes arranged in a tree structure.4. The computing system of claim 3 , wherein the tree structure comprises a hierarchical and recursive structure in which nodes closer to the root of the tree structure require greater signature agreement than nodes farther from the root of the tree structure.5. The computing system of claim 3 , wherein a parent node in the tree structure represents a signature policy that requires satisfaction of a ...

Подробнее
02-01-2020 дата публикации

ON-CHAIN GOVERNANCE OF BLOCKCHAIN

Номер: US20200007315A1
Принадлежит:

An example operation may include one or more of receiving a request for blockchain information from a user device, acquiring blockchain data from a plurality of blockchains which are actively operating and available for joining, determining an amount of trust for each blockchain among the plurality of blockchains based on acquired blockchain data of the respective blockchain, and outputting a list identifying the plurality of blockchains where each blockchain on the list comprises a trust indicator indicating a determined amount of trust for the respective blockchain. 1. A computing system comprising:a network interface configured to receive a request for blockchain information from a user device; anda processor configured to acquire blockchain data from a plurality of blockchains which are in active operation and available, determine an amount of trust for each blockchain among the plurality of blockchains based on acquired blockchain data of the respective blockchain, and output a list that identifies the plurality of blockchains where each blockchain on the list comprises a trust indicator that indicates a determined amount of trust for the respective blockchain.2. The computing system of claim 1 , wherein the processor is configured to arrange the plurality of blockchains on the list such that a blockchain with a greatest determined amount of trust is highest on the list.3. The computing system of claim 1 , wherein the acquired blockchain data comprises one or more of location diversity of nodes of the respective blockchain claim 1 , certificate identity information of nodes of the respective blockchain claim 1 , node deployment information claim 1 , chain code deployment information claim 1 , and an amount of member nodes of the respective blockchain.4. The computing system of claim 1 , wherein the acquired blockchain data comprises governance policy information encoded within a data block of the respective blockchain.5. The computing system of claim 1 , ...

Подробнее
02-01-2020 дата публикации

VERIFYING AN IDENTITY BASED ON MULTIPLE DISTRIBUTED DATA SOURCES USING A BLOCKCHAIN TO SAFEGUARD THE IDENTITY

Номер: US20200007316A1
Принадлежит:

An online identity can be verified based on data from multiple identity sources stored in a blockchain. For example, a request for a token is received from an entity for authenticating an online identity of the entity to an online service. The request can be stored in a blockchain that represents the online identity of the entity by adding a new block to the blockchain. The new block can include data indicating the request for the token. The token can be generated based on the one or more ordered blocks in the blockchain. The token can be transmitted to the entity. The token can be received from the online service. Confirmation of the online identity of the entity can be transmitted to the online service based on receiving the token from the online service. 1. A system comprising:a processing device;a communications network port configured for being controlled by the processing device; and receive, via the communications network port, a request for a token from an entity for authenticating an online identity of the entity to an online service;', 'store the request in a blockchain that represents the online identity of the entity by adding a new block to the blockchain, the blockchain being a database including one or more ordered blocks based on one or more identity sources that represent personally identifiable information of the entity, the new block including data indicating the request for the token;', 'generate the token based on the one or more ordered blocks in the blockchain;', 'transmit, via the communications network port, the token to the entity;', 'receive, via the communications network port, the token from the online service; and', 'transmit, via the communications network port and based on receiving the token from the online service, a confirmation of the online identity of the entity to the online service., 'a memory device on which instructions are stored that are executable by the processing device to2. The system of claim 1 , wherein the ...

Подробнее
02-01-2020 дата публикации

METHOD AND SYSTEM FOR HOSTING A NEW BLOCKCHAIN USING AN EXISTING BLOCKCHAIN NODE

Номер: US20200007317A1
Автор: THOMPSON Thomas
Принадлежит:

Methods, systems, and techniques for generating a new blockchain involve storing, in an existing blockchain, a genesis block of the new blockchain; and hosting the new blockchain using the genesis block of the new blockchain as a first block of the new blockchain. The storing may be done before the hosting, such as when the existing blockchain generates the genesis block of the new blockchain itself and subsequently causes the new blockchain to be hosted. Alternatively, the hosting may be done before the storing, such as when a node foreign to the existing blockchain generates the genesis block of the new blockchain and hosts the new blockchain, and the genesis block of the new blockchain is subsequently introduced to and stored in the existing blockchain. 1. A method for hosting a new blockchain on a node comprising part of an existing blockchain , the method comprising:(a) storing, in the existing blockchain, a genesis block of the new blockchain; and(b) hosting, on the node comprising part of the existing blockchain, the new blockchain using the genesis block of the new blockchain as a first block of the new blockchain.2. The method of claim 1 , wherein the genesis block of the new blockchain comprises a node identifier of the node comprising part of the existing blockchain.3. The method of claim 2 , wherein the node identifier comprises a public key of the node comprising part of the existing blockchain.4. The method of claim 1 , wherein storing the genesis block of the new blockchain in the existing blockchain comprises determining the genesis block of the new blockchain based on a genesis block of the existing blockchain.5. The method of claim 4 , wherein the existing blockchain comprises blocks chained to the genesis block of the existing blockchain claim 4 , and wherein determining the genesis block of the new blockchain is performed as a result of executing computer program code stored or referenced on the existing blockchain.6. The method of claim 5 , ...

Подробнее
02-01-2020 дата публикации

SYSTEMS, DEVICES, AND METHODS FOR SIGNAL LOCALIZATION AND VERIFICATION OF SENSOR DATA

Номер: US20200007331A1
Автор: WENTZ Christian
Принадлежит:

A method of authenticating sensor data includes receiving, by at least a temporal attester, sensor data, calculating, by the at least a temporal attester, a current time, generating, by the at least a temporal attester, a secure timestamp generated as a function of the current time, and transmitting, by the at least a temporal attester and to at least a verifier, a temporally attested sensor signal including the secure timestamp. 1. A system for signal localization and verification of sensor data , the system comprising:a temporal attestor, the temporal attestor configured to receive, sensor data, calculate a current time, generate a secure timestamp generated as a function of the current time transmit, to at least a verifier, a temporally attested sensor signal including the secure timestamp.2. The system of claim 1 , wherein sensor data further includes a localization signal.3. The system of claim 2 , wherein the localization signal further comprises a unique radiofrequency beacon.4. The system of claim 2 , wherein receiving the localization signal further comprises generating the localization signal.5. The system of claim 2 , wherein receiving the localization signal further comprises receiving the localization signal from a listener.6. The system of claim 1 , wherein the sensor data further comprises a sensing device attestation.7. The system of claim 1 , wherein calculating the current time further comprises calculating the current time using a local clock.8. The system of claim 7 , wherein calculating further comprises synchronizing the local clock to a reference clock.9. The system of claim 1 , wherein generating the secure timestamp further comprises digitally signing the secure timestamp.10. The system of claim 1 , wherein generating the secure timestamp further comprises recording the current time in a hash chain.11. A method of signal localization and verification of sensor data the method comprising:receiving, by at least a temporal attester sensor data; ...

Подробнее
02-01-2020 дата публикации

Secured System Operation

Номер: US20200007342A1
Принадлежит:

A method of operating a system, wherein the system comprises a plurality of components, the method comprising: maintaining a distributed ledger, wherein the distributed ledger comprises data records, wherein each data record stores information concerning one or more respective components of the plurality of components; at least one component of the plurality of components processing the information stored in one or more respective data records of the distributed ledger to determine whether the system meets one or more respective security criteria; and one or both of: (i) the at least one component performing a respective first action if the at least one component determines that the system meets the one or more respective security criteria; and (ii) the at least one component performing a respective second action if the at least one component determines that the system does not meet the one or more respective security criteria. 1. A method of operating a system , wherein the system comprises a plurality of components , the method comprising:maintaining a distributed ledger, wherein the distributed ledger comprises data records, wherein each data record stores information concerning one or more respective components of the plurality of components;at least one component of the plurality of components processing the information stored in one or more respective data records of the distributed ledger to determine whether the system meets one or more respective security criteria; and (i) the at least one component performing a respective first action if the at least one component determines that the system meets the one or more respective security criteria; and', '(ii) the at least one component performing a respective second action if the at least one component determines that the system does not meet the one or more respective security criteria., 'one or both of2. The method of claim 1 , comprising the at least one component determining whether or not to perform an ...

Подробнее
02-01-2020 дата публикации

APPARATUS AND METHOD FOR PROVIDING AUTHENTICATION, NON-REPUDIATION, GOVERNED ACCESS AND TWIN RESOLUTION FOR DATA UTILIZING A DATA CONTROL SIGNATURE

Номер: US20200007345A1
Принадлежит:

A non-transitory computer readable storage medium has instructions executed by a processor to receive an original collection of symbols. A single use coding function is applied to the original collection of symbols to form a new collection of symbols. Encryption keys associated with a user are formed. The new collection of symbols is encrypted to form a recoded encrypted symbol file stored at a network accessible memory location. A distributed ledger entry with a data control signature is formed using the single use coding function encrypted with a private key. The distributed ledger entry is written to a distributed ledger. The distributed ledger entry is accessed. The recoded encrypted symbol file is read from the network accessible memory location. The data control signature and a symmetric key are used to convert the recoded encrypted symbol file to the original collection of symbols. 1. A non-transitory computer readable storage medium with instructions executed by a processor to:receive an original collection of symbols;apply a single use coding function to the original collection of symbols to form a new collection of symbols;form encryption keys associated with a user;encrypt the new collection of symbols to form a recoded encrypted symbol file stored at a network accessible memory location;form a distributed ledger entry with a data control signature formed using the single use coding function encrypted with a private key; andwrite the distributed ledger entry to a distributed ledger.2. The non-transitory computer readable storage medium of further comprising instructions executed by the processor to:access the distributed ledger entry;read from the network accessible memory location the recoded encrypted symbol file; andutilize the data control signature and a symmetric key to convert the recoded encrypted symbol file to the original collection of symbols.3. The non-transitory computer readable storage medium of wherein the data control signature is ...

Подробнее
02-01-2020 дата публикации

METHOD AND MANAGEMENT SYSTEM OF DISTRIBUTED COMPUTATION

Номер: US20200007464A1
Принадлежит:

A method of distributed computing, wherein the management system includes a plurality of data temporary storage nodes. The user application connects to a neighboring data temporary storage node and uploads the project data need to be processed. The data temporary storage node publishes the tasks of the project in a blockchain network, examines the project and evaluates the processing work. After the user application approves the proposal of processing fees from the data temporary storage node, the data temporary storage node distributes the data of project tasks to the computing resources undertake the project tasks respectively. The computing resources in the blockchain network connect to the neighboring data temporary storage nodes and undertake project tasks respectively. When a computing resource completes the processing of a project task before the deadline of the project task, the neighboring data storage temporary node will transfer the processing fee and issue a work certification to the computing resource. In the overall system, the records of projects uploading, tasks assignments, results of task processing, fee transferring, and exceptions/errors are stored in blockchain, thus the data security is ensured and the costs and risks of joining parties are reduced. 1. A distributed computing method , comprising:a. a user application providing a dividable project data, wherein the project data comprises a project program and a project code, and the user application or at least one of a plurality of neighboring data temporary storage nodes segments the project data into a plurality of project tasks, wherein each of the project tasks has a task code and the project code;b. the user application uploading the dividable project data or the project tasks with a project execution file to the at least one neighboring data temporary storage node;c. receiving a project processing cost value from the at least one neighboring data temporary storage node by the user ...

Подробнее
03-01-2019 дата публикации

ENCRYPTION AND DECRYPTION TECHNIQUES USING SHUFFLE FUNCTION

Номер: US20190007390A1
Принадлежит:

Encryption and decryption techniques based on one or more transposition vectors. A secret key is used to generate vectors that describe permutation (or repositioning) of characters within a segment length equal to a length of the transposition vector. The transposition vector is then inherited by the encryption process, which shifts characters and encrypts those characters using a variety of encryption processes, all completely reversible. In one embodiment, one or more auxiliary keys, transmitted as clear text header values, are used as initial values to vary the transposition vectors generated from the secret key, e.g., from encryption-to-encryption. Any number of rounds of encryption can be applied, each having associated headers used to “detokenize” encryption data and perform rounds to decryption to recover the original data (or parent token information). Format preserving encryption (FPE) techniques are also provided with application to, e.g., payment processing. 1. (canceled)2. A computer-implemented method comprising:receiving a sequence of characters;performing one of encrypting of or decrypting of the sequence of characters, to generate an output; andperforming at least one hardware-based function from the group of storing the output in digital memory, using a transmitter to digitally transmit the output via a network to a destination, and using a display device to optically transmit a representation of the output to a destination; retrieving a key from digital memory,', 'using the key to hash an operand to generate a hash output, the hash output comprising a sequence of numerical values, and', 'assigning a sort order to the numerical values of the hash output, wherein a relationship between an initial position of each of the numerical values within the sequence of the hash output and a position within the sort order defines the transposition vector;, 'wherein said computer-implemented method further comprises using at least one processor to generate at ...

Подробнее
03-01-2019 дата публикации

User Behavior Profile in a Blockchain

Номер: US20190007424A1
Принадлежит:

A method, system and computer-usable medium are disclosed for generating a cyber behavior profile, comprising: monitoring user interactions between a user and an information handling system; converting the user interactions and the information about the user into electronic information representing the user interactions; generating a unique cyber behavior profile based upon the electronic information representing the user interactions and the information about the user; and, storing information relating to the unique cyber behavior profile in a behavior blockchain. 1. A computer-implementable method for generating a cyber behavior profile , comprising:monitoring electronically-observable user behavior;converting the electronically-observable user behavior into electronic information representing the electronically-observable user behavior, the electronic information representing the electronically-observable user behavior comprising respective user behavior elements;generating a user behavior profile based upon the electronic information representing the electronically-observable user behavior;storing information relating to the user behavior profile in a behavior blockchain;determining whether a user behavior is suspectgenerating a user behavior block representing the suspect user behavior; and,appending the user behavior block to the behavior blockchain, the user behavior block comprising a known good user behavior representation when the user behavior is not suspect and a suspect user behavior representation when the user behavior is suspect.2. The method of claim 1 , wherein:the electronic information representing the user interactions comprise a user behavior element; and further comprisingstoring information relating to the user behavior element in a user behavior block of the behavior blockchain.3. The method of claim 1 , wherein:the user behavior profile is based upon at least one of an identification factor and a user behavior factor.4. The method of claim ...

Подробнее
02-01-2020 дата публикации

BLOCKCHAIN-BASED SMART CONTRACT CALL METHODS AND APPARATUS, AND ELECTRONIC DEVICE

Номер: US20200007544A1
Автор: Wang Jiyuan, Yan Xuebing
Принадлежит: ALIBABA GROUP HOLDING LIMITED

This specification describes techniques for blockchain-based smart contract call. One example method includes receiving a target transaction initiated by a client device of a blockchain, wherein the target transaction is preconfigured for a call rule used to initiate a call for a smart contract; obtaining the call rule preconfigured for the target transaction; executing the call rule to initiate a call for a target smart contract; and providing a call result to the client device when the call for the target smart contract is completed. 1. A computer-implemented method for blockchain-based smart contract call , the computer-implemented method comprising:receiving a target transaction initiated by a client device of a blockchain, wherein the target transaction is preconfigured for a call rule used to initiate a call for a smart contract;obtaining the call rule preconfigured for the target transaction;executing the call rule to initiate a call for a target smart contract; andproviding a call result to the client device when the call for the target smart contract is completed.2. The computer-implemented method of claim 1 , wherein the target transaction comprises description information claim 1 , and wherein the description information is used to determine the call rule preconfigured for the target transaction.3. The computer-implemented method of claim 2 , wherein the description information is a transaction type of the target transaction claim 2 , and wherein the call rule comprises a supported transaction type.4. The computer-implemented method of claim 3 , wherein obtaining the call rule configured for the target transaction comprises:searching for the call rule whose supported transaction type corresponds to the transaction type of the target transaction; anddetermining the call rule as the call rule preconfigured for the target transaction.5. The computer-implemented method of claim 1 , wherein before executing the call rule to initiate the call for the target ...

Подробнее
20-01-2022 дата публикации

Decisional Architectures in Blockchain Environments

Номер: US20220020001A1
Автор: Snow Paul
Принадлежит: Inveniam Capital Partners, Inc.

Digital or “smart” contracts execute in a blockchain environment. Any entity (whether public or private) may specify a digital contract via a table identifier in a blockchain. Because there may be many digital contracts offered as virtual services, the table identifier uniquely identifies a particular decision table and/or the digital contract offered by a virtual machine, vendor or supplier. The blockchain is thus not burdened with the programming code that is required to execute the decision table and/or the digital contract. The blockchain need only include or specify the table identifier (and perhaps one or more contractual parameters), thus greatly simplifying the blockchain and reducing its size (in bytes) and processing requirements. 1. A method performed by a server outsourcing a cloud-based contractual service , the method comprising:receiving, by the server, a contract identifier specified by a blockchain associated with a digital contract;receiving, by the server, a contractual parameter specified by the blockchain associated with the digital contract;identifying, by the server, a subcontractor's Internet protocol address by querying an electronic database that associates the contract identifier specified by the blockchain to the subcontractor's Internet protocol address;identifying, by the server, a table identifier by querying the electronic database that also associates the contract identifier specified by the blockchain to the table identifier;sending, by the server, a service request specifying the table identifier to the subcontractor's Internet protocol address and requesting the cloud-based contractual service based on the contractual parameter specified by the blockchain and a decision table referenced by the table identifier; andgenerating, by the server, a data record in a blockchain data layer describing the service request sent to the subcontractor's Internet protocol address requesting the cloud-based contractual service based on the ...

Подробнее
20-01-2022 дата публикации

Transaction mode-based electronic contract preservation system

Номер: US20220020014A1
Автор: Bai Jie
Принадлежит:

This application discloses a transaction-based electronic contract deposit system, including an electronic contract platform and a blockchain deposit platform, the blockchain deposit platform including a plurality of deposit nodes that provide deposit services for the electronic contract platform. In this way, the following problem may be resolved: regarding an existing manner of storing an electronic contract in a centralized way, during a subsequent process of invoking electronic contract data, the stored electronic contract data becomes untrustworthy because the contract data is at a risk of being easily tampered with and forged. 1. A transaction-based electronic contract deposit system , comprising an electronic contract platform and a blockchain deposit platform , the blockchain deposit platform comprising a plurality of deposit nodes that provide deposit services for the electronic contract platform , whereinthe electronic contract platform is configured to perform:a deposit information generating step: preprocessing an electronic contract, to obtain deposit information;a data processing step: encrypting and discretizing the deposit information, to generate a corresponding data tree;a transaction constructing step: constructing a deposit transaction, wherein an initiator of the deposit transaction is a user, a receiver is the electronic contract platform, and the deposit transaction is commonly signed by a private key of the user and a private key of the electronic contract platform; anda data sending step: sending the deposit information, the data tree, and the deposit transaction to the blockchain deposit platform; andthe deposit node is configured to perform:a verifying step: verifying legitimacy, integrity, and validity of the received deposit information, data tree, and deposit transaction by using a public key of the user and a public key of the electronic contract platform;a data block generating step: generating a data block based on the deposit ...

Подробнее
20-01-2022 дата публикации

Smart Contract-Based Electronic Contract Forensics Method and System

Номер: US20220020019A1
Автор: Bai Jie
Принадлежит:

This application provides a smart contract-based electronic contract forensic method: when a user wants to perform forensic on an electronic contract in a blockchain digital deposit platform, initiating, by an existing electronic contract platform, a forensic request for the electronic contract; obtaining, by the blockchain digital deposit platform, the forensic request and querying deposit information; if a deciding result is that deposit information corresponding to the electronic contract is stored in the blockchain digital deposit platform, deciding whether there is a deposit transaction in the blockchain digital deposit platform; after the deposit transaction is queried in the blockchain digital deposit platform, initiating a forensic transaction to the smart contract in the blockchain digital deposit platform; verifying the forensic transaction, and executing the smart contract, to generate a forensic token; generating an execution result based on the forensic token; obtaining a digest of the deposit transaction based on the execution result; decrypting the digest, to obtain a storage index table; downloading transaction data of the deposit transaction according to a data index; decrypting the transaction data; and verifying validity, legitimacy, and integrity of the decrypted transaction data. 1. A smart contract-based electronic contract forensic method , comprising:initiating a forensic transaction to a blockchain digital deposit platform based on a forensic request for an electronic contract;verifying the forensic transaction, and executing a smart contract, to generate a forensic token;generating an execution result based on the forensic token;obtaining a digest of a deposit transaction based on the execution result;decrypting the digest, to generate a storage index table;downloading corresponding pieces of distributed stored data according to the storage index table, and splicing the pieces of data to obtain transaction data;decrypting the transaction ...

Подробнее
20-01-2022 дата публикации

STORAGE CONTROLLER, SYSTEM INCLUDING THE SAME, AND METHOD OF OPERATING THE SAME

Номер: US20220021515A1
Принадлежит: SAMSUNG ELECTRONICS CO., LTD.

A client system includes a client-side host device, and a client-side storage device including a storage controller and a storage memory. The storage controller includes a host interface, a processor configured to control a read operation and a write operation for the storage memory, and a homomorphic encryption and decryption accelerator configured to, based on receiving a read request from the client-side host device, perform homomorphic encryption on first plaintext data that is read from the storage memory, to generate first homomorphic ciphertext data, and provide the first homomorphic ciphertext data to the client-side host device through the host interface, and based on receiving a write request from the client-side host device, perform homomorphic decryption on second homomorphic ciphertext data that is received through the host interface, to generate second plaintext data, and write the second plaintext data in the storage memory. 1. A client system comprising:a client-side host device; anda client-side storage device comprising a storage controller and a storage memory, a host interface;', 'a processor configured to control a read operation and a write operation for the storage memory; and', [ perform homomorphic encryption on first plaintext data that is read from the storage memory, to generate first homomorphic ciphertext data; and', 'provide the first homomorphic ciphertext data to the client-side host device through the host interface; and, 'based on receiving a read request from the client-side host device, perform homomorphic decryption on second homomorphic ciphertext data that is received through the host interface, to generate second plaintext data; and', 'write the second plaintext data in the storage memory., 'based on receiving a write request from the client-side host device], 'a homomorphic encryption and decryption accelerator configured to], 'wherein the storage controller comprises2. The client system of claim 1 , wherein the homomorphic ...

Подробнее
20-01-2022 дата публикации

Secure data distribution protocol using blockchains

Номер: US20220021527A1
Принадлежит: Truss Financial LLC

One or more systems and methods are presented for secure data communications utilizing blockchains. One or more systems and methods may utilize multiple blockchains to provide an immutable cryptographically linked set of blocks. Each of these blocks may contain one or more actions associated with a computer network. In one embodiment, a trusted third party may be utilized to authenticate and/or verify data prior to inputting data into one or more blockchains.

Подробнее
20-01-2022 дата публикации

SECURE STORAGE TECHNIQUES UTILIZING CONSORTIUM DISTRIBUTED LEDGERS

Номер: US20220021528A1
Принадлежит:

Techniques are disclosed for securely managing data. In one example, a service provider receives user image data and user biometric data associated with a user. The service provider generates a user profile cryptographic key based on hashing this data, which may be associated with a user identifier. The service provider may further generate a public/private key pair associated with the user identifier. The public key and the user profile cryptographic key are stored, in association with the user identifier, to a consortium blockchain network. The service provider then receives a request, signed with the private key, to store a document in association with the user identifier. The service provider generates a document cryptographic key of the document, and executes a request to store the document cryptographic key to the blockchain in association with the user profile cryptographic key, the request verified using the public key. 1. A service provider , comprising: communicate with user devices to collect user image data and user biometric data; and', 'generate user profiles based at least in part on the user image data and the user biometric data;, 'an onboarding system comprising an artificial intelligence module, the onboarding system configured to hashing data of the user profiles to generate user profile cryptographic keys;', 'hashing data of documents to generate document cryptographic keys;', 'generating user cryptographic keys, a user cryptographic key being operable for authenticating a user identifier of a user device to execute a transaction via a plurality of consortium member systems; and', 'responsive to a request, verifying an association between a particular user profile cryptographic key and a particular document cryptographic key, the association previously stored to the plurality of consortium member systems; and, 'perform cryptographic functions comprising, 'a cryptographic system configured toa consortium member management system configured to ...

Подробнее
20-01-2022 дата публикации

SYSTEMS AND METHODS FOR SYNCHRONIZING CONTENT AND INFORMATION ON MULTIPLE COMPUTING DEVICES

Номер: US20220021734A1
Автор: Ratias Cole Asher
Принадлежит:

A method for synchronizing content between a first electronic device and a second electronic device in response to an input signal, includes: (a) receiving a first synchronization signal from the first computing device that is based on the input signal being received in the first electronic device; (b) mapping the first synchronization signal to a second synchronization signal based on mapping information accessible to the second electronic device, wherein the second synchronization signal includes information not represented by the first synchronization signal; and (c) transmitting the second synchronization signal to the second electronic device for processing, wherein (i) the input signal comprises one or more sensors; (ii) the first electronic device comprises a controller that interprets the input signal to provide the first synchronization signal, and (iii) the second electronic device comprises an actuator and wherein the second synchronization signal corresponds to a command for actuation in the second electronic device. 1. A method for , upon request by a third-party application program , verifying the identity of a user , comprising:receiving identification data from the user at a first computing device;at a second computing device, which communicates with the first computing device over a wide-area communication network, establishing the identity of the user by processing the identification data against personal information that is (i) stored at the second computing device or that is accessible from the second computing device, and (ii) authenticated independently of the user, the personal information comprising one or more of: non-public information of the user, biometric information of the user, and contemporaneous physical location of the user; andover a secure communication channel, transmitting to the third-party application program the result of establishing the identity of the user.2. The method of claim 1 , wherein the third-party application ...

Подробнее
02-01-2020 дата публикации

ARCHITECTURE FOR CRYPTOCURRENCY MINING OPERATION

Номер: US20200008320A1
Автор: SU Jiahai, YU Wei, Zheng Linlin
Принадлежит:

The present invention is a modular, energy efficient structure for housing racks of computers specifically designed for mining Bitcoin assets. The fundamental principal towards an optimized mining facility design is to decrease electricity consumption as well as effective construction budget management, ensuring only appropriate business expenditures. The side benefits including improved stability of the facility computer network and electricity supply. The design concept is carried out through a cool/hot air segregation process, which results in controllable internal facilities temperatures, dust filtration and energy savings. 112.-. (canceled)13. An architecture for performing computing tasks , comprising:a plurality of modules, each module including an air intake port, a particle filtration system, and an air temperature altering filtration system;one or more computers arranged within each module, the one or more computers being positioned in a cool section and eject heat into a warm section;exhaust fans positioned in the warm section for moving warm air out of the modules;wherein the modules are arranged so that the moving warm air from adjacent modules enter a common current of upwardly moving air outside the modules.14. The architecture for computing tasks of claim 13 , further comprising a motorized intake shutter for controlling an opening of an intake shutter at the air intake port.15. The architecture for computing tasks of claim 13 , further comprising a water curtain positioned adjacent to the particle filtration system.16. The architecture for computing tasks of claim 15 , where the water curtain comprises the air temperature altering filtration system.17. The architecture for computing tasks of claim 13 , further comprising a window above the plurality of computers.18. The architecture for computing tasks of claim 13 , wherein the modules include a roof having an inclination with respect to a horizontal direction.19. The architecture for computing ...

Подробнее
14-01-2021 дата публикации

PALLET MANAGEMENT DEVICE

Номер: US20210009310A1
Принадлежит: MyOmega Systems GmbH

A device for monitoring and managing a pallet includes one or more sensors for determining properties associated with a pallet, which may include a weight of a load of a pallet, and the presence, number and/or location of one or more load items on a pallet. The device may be physically coupled to a pallet, and may include a processing unit coupled to the one or more sensors, the processing unit having one or more interfaces to communicate with the one or more sensors, and one or more interfaces to communicate with one or more networks. The device may include one or more hydraulic mats including one or more pressure sensors, and RFID (UHF) and/or optical code readers for detecting and/or identifying load items. The device may include RFID (NFC) readers for exchange of payment and access information. The device also may include multiple layers, each of which may include one or more cavities for accommodating components of the device. 1. A device for monitoring a pallet , comprising:one or more layers including one or more elements for attaching the device to the pallet;one or more sensors physically coupled to the one or more layers, the one or more sensors detecting one or more properties associated with the pallet, each of the one or more sensors producing a signal indicative of one or more properties associated with the pallet; anda processing unit physically coupled to the one or more layers and communicatively coupled to the one or more sensors, the processing unit receiving and processing signals produced by the one or more sensors.2. The device according to claim 1 , wherein the one or more properties include one or more properties of the pallet.3. The device according to claim 1 , where the one or more properties include one or more properties of a load carried by the pallet.4. The device according to claim 1 , wherein the one or more sensors include at least a first sensor for detecting a weight of a load carried by the pallet.5. The device according to claim ...

Подробнее
27-01-2022 дата публикации

DATA DEDUPLICATION IN BLOCKCHAIN PLATFORMS

Номер: US20220027319A1
Принадлежит:

A method for deduplicating a distributed ledger, a blockchain, and a computer program product. One embodiment may comprise splitting a new block on a distributed ledger into a plurality of partitions, comparing the plurality of partitions to a deduplication (dedup) map, replacing a first partition of the plurality of partitions with a first reference to the dedup map to produce a transformed block, and communicating the transformed block via a network interface to one or more peers. 1. A method for deduplicating a distributed ledger , comprising:splitting a new block for a distributed ledger into a plurality of partitions;comparing the plurality of partitions to a deduplication (dedup) map;replacing a first partition of the plurality of partitions with a first reference to the dedup map to produce a transformed block; andcommunicating the transformed block via a network interface to one or more peers.2. The method of claim 1 , further comprising:creating a second reference in the dedup map;replacing the second partition of the plurality of partitions with the second reference; andcommunicating the second reference via the network interface to the one or more peers.3. The method of claim 2 , further comprising:receiving the second reference; andupdating a local copy of the dedup map with the second reference.4. The method of claim 2 , further comprising:determining whether the second partition is currently referenced in the dedup map;responsive to the second partition being currently referenced, replacing the second partition with the second reference to produce the transformed block; andresponsive to the second partition not being currently referenced, communicating the transformed block with the second partition.5. The method of claim 1 , further comprising:receiving the transformed block; andreconstructing the new block using the transformed block and a local copy of the dedup map.6. The method of claim 1 , further comprising:receiving a subsequent block for ...

Подробнее
27-01-2022 дата публикации

PROOF-OF-WORK FOR BLOCKCHAIN APPLICATIONS

Номер: US20220027352A1
Принадлежит:

Methods, computing apparatuses, computer readable media and systems are described that are for use with blockchain applications. An authority server may communicate a data package to a mining node. The mining node may receive the data package from the authority server, the data package comprising a plurality of datasets, each dataset comprising signal information. The mining node may analyse the data package to convert the signal information of each dataset to a corresponding data output. The mining node may communicate the plurality of data outputs to an authority server and, upon verification of the plurality of data outputs, the plurality of data outputs may be used in establishing a proof-of-work for appending a block record to a blockchain. Encryption and decryption methods may be used to secure data according to methods described herein. In some examples, the signal information of each dataset relates to a polynucleotide sequence and the corresponding data output relates to a read. 1. A method for appending a block record to a blockchain stored on mining nodes of a network , the block record comprising payload data , a proof-of-work , and a unique identifier of a preceding block record of the blockchain , wherein the method comprises:receiving a data package from an authority server, the data package comprising a plurality of datasets, wherein each dataset of the plurality of datasets comprises signal information;analyzing the data package to convert the signal information of each dataset to a corresponding data output; andcommunicating one or more of the data outputs to the authority server, the plurality of data outputs for use in establishing the proof-of-work for appending the block record to the blockchain.2. The method of claim 1 , further comprising:receiving a signed token from the authority server;creating the block record for the blockchain using the signed token as the proof-of-work; andcommunicating the created block record to at least one mining ...

Подробнее
27-01-2022 дата публикации

METHODS FOR EXTENDING A PROOF-OF-SPACE-TIME BLOCKCHAIN

Номер: US20220027355A1
Принадлежит:

A method for extending a blockchain comprises, at a space server: allocating an amount of drive storage for generating proofs-of-space; or accessing a first challenge based on a prior block of the blockchain, the prior block comprising a first proof-of-space and a first proof-of-time; in response to accessing the first challenge, generating a second proof-of-space based on the first challenge and the amount of drive storage, the second proof-of-space indicating allocation of the amount of drive storage; accessing a second proof-of-time based on the prior block and indicating a first time delay elapsed after extension of the blockchain with the prior block; generating a new block comprising the second proof-of-space and the second proof-of-time; and broadcasting the new block over a distributed network. 1. A method for generating a proof-of-space comprising:accessing a series of initial entries;generating, via a pseudorandom function, a first series of entries in a first table in a series of tables, each entry in the first series of entries corresponding to an entry in the series of initial entries; identifying a set of matching pairs of entries in the table based on a matching condition; and', 'for each matching pair of entries in the set of matching pairs of entries, executing a cryptographic hash function on the matching pair of entries to generate a forward-propagated entry in a subsequent table in the series of tables;, 'for each table in the series of tables the series of tables; and', 'a final table comprising a series of final entries comprising forward-propagated entries from a prior table in the series of tables;, 'storing a plot file comprisingaccessing a proof-of-space challenge; andgenerating a proof-of-space based on the proof-of-space challenge and the plot file.2. The method of claim 1 , wherein accessing the series of initial entries comprises accessing a consecutive series of integers.3. The method of claim 1 , wherein generating the first series of ...

Подробнее
27-01-2022 дата публикации

Data Manifest as a Blockchain Service

Номер: US20220027384A1
Принадлежит:

Methods and systems for providing data manifests as a service (DMAAS) are described herein. A first computing system, may generate a first data manifest comprising a first count parameter and a first hash parameter associated with a first data exchange transaction between the first computing system and a second computing system, store the first data manifest to a blockchain data store and transfer a data payload of the first data exchange transaction. The second computing system may analyze the data payload received via the transport mechanism, generate a second data manifest including a second count parameter and a second hash parameter and store the second data manifest to the blockchain data store. A DMAAS computing system facilitates access to the blockchain data store, identifies transmission errors, and triggers acceptance of data at the second computing system upon a successful data exchange transaction. 1. Non-transitory computer-readable media storing instructions that , when executed by a processor , causes a centralized data manifest as a service (DMAAS) computing system to:retrieve, from a blockchain data store, a first data manifest comprising a first count parameter and a first hash parameter associated with a first data exchange transaction between a first computing system and a second computing system, wherein the first data manifest comprises a name of each field transferred of data of the first data exchange transaction;retrieve, from the blockchain data store, a second data manifest including a second count parameter and a second hash parameter, the second data manifest corresponding to a data payload of the first data exchange transaction received via a transport mechanism;determine, based on the first data manifest comprising the first count parameter and the first hash parameter retrieved from the blockchain data store and the second data manifest comprising the second count parameter and the second hash parameter retrieved from the blockchain ...

Подробнее
27-01-2022 дата публикации

ACCESS MANAGEMENT SYSTEM, AUTHENTICATION DEVICE FOR ACCESS MANAGEMENT SYSTEM, MANAGEMENT DEVICE FOR ACCESS MANAGEMENT SYSTEM, PORTABLE TERMINAL FOR ACCESS MANAGEMENT SYSTEM, MOBILE BODY FOR ACCESS MANAGEMENT SYSTEM, DATA STRUCTURE FOR ACCESS MANAGEMENT DATA, ACCESS MANAGEMENT PROGRAM, AND CONSTRUCTION METHOD FOR ACCESS MANAGEMENT SYSTEM

Номер: US20220027448A1
Автор: TAKAI Manato
Принадлежит: Mitsubishi Electric Corporation

An access management system that reduces possibility of unauthorized access, an authentication device, a management device, a portable terminal, and a mobile body configuring the access management system, a data structure for access management data used in the access management system, an access management program executed in the access management system, and a construction method for the access management system. A plurality of nodes connected by a P2P network share a blockchain. Authentication conditions are recorded in blocks of the blockchain by a management node, which is any one of the plurality of nodes. The authentication conditions include authentication information. The authentication conditions designate an authentication node, which is any one of the plurality of nodes, as a node that performs authentication. The passing body is authenticated by the authentication node. 1. An access management system comprising a plurality of nodes connected by a P2P network , to store a blockchain shared among the plurality of nodes; and', 'to validate validity of a block added to the blockchain, wherein, 'each of the plurality of nodes including processing circuitryin at least any one of the plurality of nodes, the processing circuitry generate a block added to the blockchain,in a management node, which is any one of the plurality of nodes, the processing circuitry record in blocks of the blockchain, authentication conditions including authentication information of an authenticatable passing body, and the processing circuitry read authentication information of the passing body; and', 'authenticate the passing body when the authentication node is designated, in the authentication conditions recorded in the blocks of the blockchain, as a node that performs authentication and the read authentication information is included in the authentication conditions., 'in an authentication node, which is any one of the plurality of nodes and provided in a region where the passing ...

Подробнее
27-01-2022 дата публикации

SYSTEMS AND METHODS FOR REMOTE OWNERSHIP AND CONTENT CONTROL OF MEDIA FILES ON UNTRUSTED SYSTEMS

Номер: US20220027481A1
Автор: Valdez Shane Ryan
Принадлежит:

One example method includes receiving, by a client computing device, a request to open a superfile stored in a memory device at the client computing device, the superfile comprising encrypted content, the request comprising user credential information; in response to receiving the request to open the superfile, communicating, by the client computing device, a request to a remote server to access the superfile, the request including a credential associated with the user account; receiving, from the remote server, cryptographic information; decrypting, using the cryptographic information, the encrypted content; accessing and presenting the decrypted content; and maintaining communications with the remote server while the decrypted content is accessed. 1. A method comprising:receiving, by a client computing device, a request to open a superfile stored in a memory device at the client computing device, the superfile comprising encrypted content, the request comprising user credential information;in response to receiving the request to open the superfile, communicating, by the client computing device, a request to a remote server to access the superfile, the request including a credential associated with the user account;receiving, from the remote server, cryptographic information;decrypting, using the cryptographic information, the encrypted content;accessing and presenting the decrypted content; andmaintaining communications with the remote server while the decrypted content is accessed.2. The method of claim 1 , further comprising claim 1 , providing usage information associated with the superfile while the superfile is open and using the maintained communications with the remote server.3. The method of claim 2 , wherein the usage information indicates a portion of the decrypted content being presented or a user input associated with the decrypted content.4. The method of claim 1 , further comprising claim 1 , while the decrypted content is accessed:receiving modified ...

Подробнее
27-01-2022 дата публикации

COMPUTER IMPLEMENTED SYSTEMS AND METHODS FOR STORING, RETRIEVING AND COMMUNICATION DATA VIA A PEER-TO-PEER NETWORK

Номер: US20220027491A1
Принадлежит:

The invention provides a system for searching a blockchain (e.g. Bitcoin) for data/content stored in one or more blockchain transactions, and accessing that data/content. It may be used in conjunction with a protocol for searching the blockchain. An embodiment of the invention can be arranged to enable a user to search for, access, view, write and/or retrieve a portion of data provided in at least one blockchain transaction (Tx), and also arranged to identify the at least one transaction (Tx) based on a transaction index (TX) comprising a transaction ID and a public key associated with the transaction (Tx). The system may comprise a search facility which is either provided within the blockchain search system; or arranged to interface and/or communicate with the blockchain search system. It may also comprise at least one cryptocurrency wallet. 1. A computer-implemented system arranged to enable a user to search for , access , view , write and/or retrieve a portion of data provided in at least one blockchain transaction (Tx) , wherein:{'sub': 'index', 'the system is arranged to identify the at least one blockchain transaction (Tx) based on a transaction index (TX) comprising a transaction ID and a public key associated with the at least one blockchain transaction (Tx).'}2. A system according to claim 1 , wherein the system comprises a search facility which is:provided within the system; orarranged to interface and/or communicate with the system.3. A system according to claim 1 , and further comprising:at least one cryptocurrency wallet.4. A system according to claim 3 , wherein:the at least one cryptocurrency wallet is arranged to generate, store and/or process hierarchical deterministic keys.5. A system according to claim 3 , wherein the at least one cryptocurrency wallet is arranged to store at least one cryptographic key and/or at least one token in a Trusted Execution Environment.6. A system according to claim 1 , and further comprising:a decompression component ...

Подробнее
27-01-2022 дата публикации

METHODS AND SYSTEM FOR SERVING TARGETED ADVERTISEMENTS TO A CONSUMER DEVICE

Номер: US20220027945A1
Принадлежит:

A method for auditing an advertisement impression in which a first advertisement was presented in conjunction with first media content is disclosed. The method generally comprises transmitting to a plurality of second computing devices a plurality of randomly generated first cryptographic proofs; receiving, a first message from a second computing device indicating that the first advertisement was presented in conjunction with the first media content; and evaluating the first targeting model for the first advertisement based on the at least one media content classifier. 1. A method for presenting an advertisement in conjunction with media content , the method comprising:transmitting, with a transceiver of a first computing device, a first message to a second computing device, the first message requesting media content from the second computing device, the media content having a defined location at which an advertisement can be presented in conjunction with the media content;receiving, with the transceiver, a second message from the second computing device, the second message including (i) the media content and (ii) a first content mapping key from a set of content mapping keys associated with the second computing device, wherein associations between each content mapping key in the set of content mapping keys and at least one media content classifier being stored on at least one blockchain;selecting, with a processor of the first computing device, a first advertisement from a set of advertisements based on a first targeting model for the first advertisement, the first targeting model being stored on the at least one blockchain and defining a target audience for the first advertisement; andpresenting, with an output device of the first computing device, the first advertisement in conjunction with the media content at the defined location.2. The method according to claim 1 , wherein claim 1 , the method further comprising:exchanging, with the transceiver of the first ...

Подробнее