Patent classifications
H04L9/00
INTERMEDIARY SERVER, SYSTEM, INTERMEDIATING METHOD, AND NON-TRANSITORY RECORDING MEDIUM
An intermediary server for intermediating transfer of ownership of energy between a supplier and a user, includes circuitry that receives usage information indicating that energy has been used from a communication terminal of the user, and transmits, to a decentralized ledger system, a request for changing ownership of the energy from the previous owner to the user based on the usage information.
SYSTEMS AND METHODS FOR FACILITATING GENERATION OF A CARBON OFFSET BASED ON PROCESSING OF A RECYCLABLE ITEM
Disclosed herein is a method for facilitating generation of a carbon offset based on processing of a recyclable item. Accordingly, the method may include receiving, using a communication device, transportation data associated with transportation of at least one recyclable item from at least one first device. Further, the method may include analyzing, using a processing device, the transportation data. Further, the method may include determining, using the processing device, a carbon value associated with the transportation of the at least one recyclable item based on the analyzing. Further, the method may include generating, using the processing device, a net CO.sub.2e offset associated with the at least one recyclable item based on the carbon value. Further, the method may include storing, using a storage device, the net CO.sub.2e offset associated with the at least one recyclable item in a distributed ledger.
APPARATUS AND METHOD FOR GENERATING SECRET KEY, APPARATUS AND METHOD FOR GENERATING EVALUATION KEY
In a method of generating a secret key according to an embodiment, a share of each of a user and a plurality of other users for a secret key of the user are generated, the share of each of the plurality of other users is provided to a user terminal of each of the plurality of other users, a share of the user for a secret key of each of the plurality of other users is received from the user terminal of each of the plurality of other users, and a new secret key of the user is generated using the share of the user for the secret key of the user and the shares of the user for the secret key of each of the plurality of other users.
System and method for confidentiality-preserving rank-ordered search
A confidentiality preserving system and method for performing a rank-ordered search and retrieval of contents of a data collection. The system includes at least one computer system including a search and retrieval algorithm using term frequency and/or similar features for rank-ordering selective contents of the data collection, and enabling secure retrieval of the selective contents based on the rank-order. The search and retrieval algorithm includes a baseline algorithm, a partially server oriented algorithm, and/or a fully server oriented algorithm. The partially and/or fully server oriented algorithms use homomorphic and/or order preserving encryption for enabling search capability from a user other than an owner of the contents of the data collection. The confidentiality preserving method includes using term frequency for rank-ordering selective contents of the data collection, and retrieving the selective contents based on the rank-order.
Data monetization and exchange platform
A system for providing a large set of data resources for nearly any client with a centralized collection of historical data, and a server through which changing datasets located on provider networks may be accessed through the system without having to upload them to the system. The system providers a marketplace for buying and selling of data, optionally including blockchain technology to allow for secure and/or anonymous transactions.
Quantumproof blockchain
Bitcoins and the underlying blockchain technology are one of the main innovations in building decentralized applications. The effects of quantum computing on this technology are analyzed in general. Provided herein are effective solutions to address security vulnerabilities in a blockchain-based system that can be exploited by a quantum attacker.
Encrypting and decrypting information
Methods, systems, and devices for encrypting and decrypting data. In one implementation, an encryption method includes inputting plaintext into a recurrent artificial neural network, identifying topological structures in patterns of activity in the recurrent artificial neural network, wherein the patterns of activity are responsive to the input of the plaintext, representing the identified topological structures in a binary sequence of length L and implementing a permutation of the set of all binary codewords of length L. The implemented permutation is a function from the set of binary codewords of length L to itself that is injective and surjective.
Encrypting and decrypting information
Methods, systems, and devices for encrypting and decrypting data. In one implementation, an encryption method includes inputting plaintext into a recurrent artificial neural network, identifying topological structures in patterns of activity in the recurrent artificial neural network, wherein the patterns of activity are responsive to the input of the plaintext, representing the identified topological structures in a binary sequence of length L and implementing a permutation of the set of all binary codewords of length L. The implemented permutation is a function from the set of binary codewords of length L to itself that is injective and surjective.
Systems and methods for virtual distributed ledger networks
The disclosed embodiments relate to virtual distributed ledger networks provisioning using distributed ledger technology. In one embodiment, a system is disclosed, comprising a hardware processor and a memory device storing instructions executable by the hardware processor to perform operations. The operations comprise creating one or more virtual machines, and executing a plurality of microservices via the one or more virtual machines. At least two of the plurality of microservices are associated with different distributed ledger technology networks. The plurality of microservices include an event routing manager microservice configured to receive a smart contract microservice request and to route events between microservices, a smart contract execution microservice configured to execute a smart contract associated with the smart contract microservice request, and a transaction resource manager microservice configured to commit an outcome of the smart contract execution microservice to a distributed ledger associated with one of the different distributed ledger technology networks.
DIGITAL WITNESS SYSTEMS AND METHODS FOR AUTHENTICATING AND CONFIRMING THE INTEGRITY OF A DIGITAL ARTIFACT
Digital Witness is a solution based on advanced cryptographic techniques to ensure data integrity, authenticity, irrefutability and confidentiality at the point of data creation. The DigiWit process guarantee is based on using strong cryptographic techniques in conjunction with PKI and public/private block-chains. DigiWit process establishes a ‘root of trust’ for a digital artifact in conjunction with notarization provided by a trusted third-party. The result is a mathematical non-repudiable guarantee that the file under audit is exactly as recorded by the author. The authenticity of the author and the root of trust are provided by the notarizing trusted third-party. Integrity of the captured data is based on the time to insert its unique signature to the block-chain public ledger. This root of trust is intended to be permissible to prove authenticity of evidence in the legal arena (e.g., images of crime scenes, contracts, etc.) based on mathematical veracity.