Patent classifications
H04L9/00
METHOD AND SYSTEM FOR BLOCKCHAIN-DRIVEN COMMUNICATION USING ENCAPSULATED VIRTUAL CHAINS
A method and system for blockchain-driven communication using encapsulated virtual chains can facilitate blockchain-driven inter-PSAP communication using encapsulated virtual chains. Embodiments can be generalized for any context (e.g. not only for the specific examples of the Next Generation 9-1-1 and 1-1-2 (NG9-1-1/NG1-1-2) architectures).
METHOD AND SYSTEM FOR MULTI-BLOCK MINING BY A SINGLE NODE, IN (A) SINGLE ROUND(S), UNDER DIFFERENT CONSENSUS SCHEMES
A method and a system for multi-block mining in at least one single round under different consensus schemes. Embodiments can utilize a concept of sequential multiple block mining in (a) single mining round(s) from a single node. Thereby, the node can separate the transactions based on the context to select the appropriate consensus algorithm in order to use multiple consensus algorithms at the same mining round, one for each block (not one after another in different mining rounds).
Blockchain-based payment withholding and agreement signing method, apparatus, and electronic device
Computer-implemented methods, non-transitory, computer-readable media, and computer-implemented systems for blockchain-based payment withholding and agreement signing are described. In one computer-implemented method, an agreement signing transaction submitted by a user is received and used to authorize a payment system to provide a payment withholding service for a payment order of the user in a third-party service system. The agreement signing transaction includes agreement signing information of a tripartite agreement submitted by the user. Withholding verification logic declared in a first smart contract published on the blockchain is invoked to check whether there is a withholding agreement signed between the payment system and the third-party service system on the blockchain. If yes, the tripartite agreement is created that authorizes the payment system to provide the payment withholding service for the payment order for the user and published to the blockchain for certificate storage.
CONTROL METHOD, NON-TRANSITORY COMPUTER-READABLE RECORDING MEDIUM STORING CONTROL PROGRAM, AND INFORMATION PROCESSING DEVICE
A control method executed by a computer, including: when accepting execution instructions for a first task and a second task, adding an operation code that causes execution of an operation, to a processing program that corresponds to the first task, and generating a first program that includes the processing program and the operation code; encrypting a second program that corresponds to the second task to generate encrypted data, by using an operation result obtained based on the execution of the operation; and transmitting the first program and the encrypted data to a device that corresponds to the first task.
Private password constraint validation
Privately determining whether a password satisfies a constraint without having to divulge the password itself to a third party that evaluates the constraint, and without the third party even being aware of the result of the evaluation. After the user selects a password, private communication (e.g., private information retrieval) is used to determine whether the selected password satisfies password constraints. For instance, the password might be encrypted (e.g., homomorphically), and then the encrypted password and a function definition (e.g., a homomorphic function definition) is then provided to the third party. The third party then performs the function and returns an already encrypted result. The third party generated the encrypted result directly, without having access to the result in the clear. Upon receiving the encrypted result, the user's computing system may then decrypt the result, to find out whether the password satisfies the constraints, and thus is sufficiently safe.
System and method for providing security services with multi-function supply chain hardware integrity for electronics defense (SHIELD)
A system and a method for a supply-chain hardware integrity for electronics defense (SHIELD) dielet embedded over a component of a device, a radio frequency identification (RFID) probe system coupled to the SHIELD dielet, and a secure server system communicating with the RFID probe system that can enable security services is provided. Embodiments include a multi-function SHIELD software defined, hardware enabled security system that provides hardware identity, anti-tamper, encryption key generation and management, trusted platform module services, and cryptographic software security services for a device.
Synchronization circuit for threshold implementation of S-box
This application relates to a synchronization circuit for synchronizing signals used in a threshold implementation operation process performing in an S-box of an encryption circuit. In one aspect, the synchronization circuit includes an enable signal generator configured to generate an enable signal. The synchronization circuit may also include a synchronization unit included in an encryption circuit and located inside an S-box that performs a threshold implementation operation that calculates by dividing bits of an input signal into bits equal to or greater than the number of bits of the input signal. The synchronization unit may be configured to synchronize signals used in a threshold implementation operation process based on the generated enable signal.
METHODS AND SYSTEMS FOR USER ENVIRONMENT CUSTOMIZATION BASED ON NON-FUNGIBLE TOKENS
According to embodiments of the present disclosure, a method is provided. The method includes receiving first body data for a user of a user device. The method further includes determining second body data for the user by using at least the received first body data. The method further includes generating a non-fungible token based on the second body data. The method further includes registering the non-fungible token in a digital asset client on a user device of the user. The method further includes retrieving from the digital asset client an identifier of the non-fungible token. The method further includes transmitting to a receiver system the identifier of the non-fungible token. The method further includes controlling one or more features of a user environment provided by the receiving system. based on the values of the properties of the non-fungible token.
Computer-implemented privacy engineering system and method
A system allows the identification and protection of sensitive data in a multiple ways, which can be combined for different workflows, data situations or use cases. The system scans datasets to identify sensitive data or identifying datasets, and to enable the anonymisation of sensitive or identifying datasets by processing that data to produce a safe copy. Furthermore, the system prevents access to a raw dataset. The system enables privacy preserving aggregate queries and computations. The system uses differentially private algorithms to reduce or prevent the risk of identification or disclosure of sensitive information. The system scales to big data and is implemented in a way that supports parallel execution on a distributed compute cluster.
Method and device for recognizing blinding attacks in a quantum encrypted channel
A receiver for recognizes blinding attacks in a quantum encrypted channel having an optical fiber. The receiver includes a multipixel detector having a plurality of pixels, and configured to be illuminated by a light beam outputted by the optical fiber. A processing unit connects to the multipixel detector and is configured to determine the presence of a blinding attack if a predetermined number of pixels detects light within a predetermined interval. The receiver recognizes blinding attacks in a quantum encrypted channel and implements a method for recognizing blinding attacks in a quantum encrypted channel.