H04L9/00

Cybersecurity infection detection system and method
11711378 · 2023-07-25 ·

A cybersecurity infection detection system and method of use. In some embodiments, the system and process provide improved network security, computer security, or both, through mutually assured, defense in depth approaches. In some embodiments, one or more of defense in depth, collaborative attack detection, remediation, component redundancy, component self-monitoring, and component self-replacing are combined to effect an enhanced cybersecurity system. In some embodiments, the cybersecurity system and method include, but are not limited to, one or more of one or more probes, monitors, configuration ledgers, signature ledgers, audit ledgers, configuration controllers, message engines, switchboards, and a public-private key infrastructure.

Validating test results using a blockchain network

A validation method applied to sensor data prior to submitting to a blockchain, a computer program product, and a system for validating chemical data. One embodiment may comprise receiving a sensor captured result at an application, applying the sensor captured result to a domain-specific statistical model of expected range of variability of measured results to extract a distribution of expected sensor values, computing a confidence value in the sensor captured result using the domain-specific statistical model, validating the confidence value against a required threshold of confidence, and submitting the sensor captured result for appending to the blockchain if the confidence level is validated against the threshold of confidence.

Transaction-enabled systems and methods for resource acquisition for a fleet of machines

The present disclosure describes transaction-enabling systems and methods. A system can include a controller and a fleet of machines, each having at least one of a compute task requirement, a networking task requirement, and an energy consumption task requirement. The controller may include a resource requirement circuit to determine an amount of a resource for each of the machines to service the task requirement for each machine, a forward resource market circuit to access a forward resource market, and a resource distribution circuit to execute an aggregated transaction of the resource on the forward resource market.

5G network slicing with distributed ledger traceability and resource utilization inferencing

Various systems and methods for implementing an edge computing system to realize 5G network slices with blockchain traceability for informed 5G service supply chain are disclosed. A system configured to track network slicing operations includes memory and processing circuitry configured to select a network slice instance (NSI) from a plurality of available NSIs based on an NSI type specified by a client node. The available NSIs uses virtualized network resources of a first network resource provider. The client node is associated with the selected NSI. The utilization of the network resources by the plurality of available NSIs is determined using an artificial intelligence (AI)-based network inferencing function. A ledger entry of associating the selected NSI with the client node is recorded in a distributed ledger, which further includes a second ledger entry indicating allocations of resource subsets to each of the NSIs based on the utilization.

Multi-party encryption cube processing apparatuses, methods and systems

Computer-implemented systems and methods are disclosed herein for use within secure multi-party computation. A system and method are used for storing an operation preference and a cryptographic preference. A data set is stored based on the operation preference and the cryptographic preference. A determination is made that processing the query involves performing an allowable operation on the data set based on the operation preference.

Trust-based shard distribution apparatus and method for fault tolerant blockchain networks

A shard distribution apparatus and method are disclosed. The shard distribution apparatus can include a trust calculation unit configured to obtain a trust value for each of a multiple number of nodes in a blockchain network by receiving a consensus result from each of the multiple nodes, where the consensus result may be obtained by aggregating the result of verifying the validity of a block by each of the multiple nodes and the results of verifying the validity of the block received from other nodes; and a shard distribution unit configured to distribute the multiple nodes to a multiple number of shards by calculating a shard trust value, which is represented by a sum of trust values of nodes distributed to each of the multiple shards, and distributing the multiple nodes such that deviations of the calculated shard trust values are the smallest.

A METHOD FOR BUILDING A BLOCKCHAIN
20230237479 · 2023-07-27 ·

Computer implemented method for generating a hash value (110) is disclosed, the method comprises the following steps: i) Providing a first digital RGB image (112) having first RGB colors of a physical object (114); ii) Combining first transaction data (116) and the first digital RGB image (112), thereby generating a second RGB image (118) having second RGB colors; iii) Converting (128) color values of the second RGB image (118) from RGB color space (130) to a secondary color space (132) having at least four primary colors and determining (134) a number of respectively colored pixels for each primary color of the secondary color space (132); iv) Generating (136) the hash value (110) by converting the determined number of respectively colored pixels for each primary color of the secondary color space (132) to hexadecimal numerals.

TIME-LOCKED BLOCKCHAIN TRANSACTIONS AND RELATED BLOCKCHAIN TECHNOLOGY
20230004967 · 2023-01-05 ·

A blockchain payment channel is effected based on a series of spending transactions exchanged between parties, in which each transaction of the series of spending transactions has a future lock time, before which it cannot be committed to the blockchain, and comprises at least two spendable transaction outputs having respective digital asset values. At computer equipment of the party, a previous transaction of the series of spending transactions is received, and a function is applied to one or more function variables contained in the previous transaction to at least partially determine the current transaction. A portion of the current transaction is cryptographically signed, the signed portion comprising the at least two spendable transaction outputs, using a private key counterpart to the public key of the party, thereby computing a transaction signature for inclusion in the transaction input of the current transaction.

METHODS AND DEVICES FOR AUTOMATED DIGITAL CERTIFICATE VERIFICATION

A public key may be recorded on the blockchain by a certificate authority in such a manner that any third party may quickly and easily verify that the public key is certified by the certificate authority and that the certification has not been revoked. The certificate authority may be able to revoke the certification nearly instantaneously, and/or may be able to simultaneously certify a new key for the same entity while revoking the old key. The verification may be incorporated into a new transaction so that there is no gap between reliance on the certificate and the verification of its validity. In some cases, each transaction in which the certificate is used may also serve as linked certificate transaction that renews the certificate to enable a subsequent use.

System, Method, and Computer Program Product for Maintaining User Privacy in Advertisement Networks
20230004674 · 2023-01-05 ·

A method for maintaining user privacy in advertisement networks may include receiving first persona data associated with a first user from at least one publisher system. The first persona data may be generalized to form first generalized persona data. A session key may be generated. The first generalized persona data and the session key may be encrypted with a first public key of an advertisement network system to form a first ciphertext. The first ciphertext and first user identity data may be communicated to a mediator system. The first user identity data may be associated with first user's identity. A first encrypted targeted advertisement may be received based on the first generalized persona data from the advertisement network system via the mediator system. The first encrypted targeted advertisement may be decrypted with the session key to form a first targeted advertisement. A system and computer program product are also disclosed.