H04L63/00

BROKERING SERVICE TO VERIFY ONLINE CLAIMS

In one embodiment, a brokering service receives, from a requesting device, a request to verify an online claim associated with an online resource. The brokering service identifies, based upon the request, a proving entity for the online claim. The brokering service obtains, from the proving entity, digitally verifiable proof that indicates that the online claim has been securely verified by the proving entity. The brokering service provides the digitally verifiable proof to the requesting device, wherein the digitally verifiable proof causes the requesting device to display an indication that the online claim has been securely verified.

NON-FUNGIBLE TOKEN-BASED PLATFORM FOR TRACING SOFTWARE AND REVISIONS

A non-fungible token (NFT)-based platform is provided for validating the authenticity of software and providing software traceability on a device and/or user-level. Software is configured by the developer with logic that detects installation and, in some embodiments, change (i.e., upgrades, patches or the like) and, in response generates a non-fungible token (NFT) that is subsequently verified via a distributed trust computing network. The NFT may be linked to one or more of the device, the user(s), IP address(es), licensee, such that a distributed ledger storing the linked NFTs can be accessed to readily determine which devices the software is installed on and the users of the software.

SYNCHRONISING EVENT STREAMS
20230093411 · 2023-03-23 ·

The present disclosure proposes methods, devices and systems for synchronising a plurality of event streams using an atomic blockchain transaction, the transaction having multiple inputs, each spending a dust output of a previous transaction for a respective event stream among the plurality, each input having an unspent dust output and a data payload.

METHOD OF DYNAMICALLY LOADING ENCRYPTION ENGINE
20230093105 · 2023-03-23 ·

A method of dynamically loading an encryption engine generates a relationship between encryption identifiers and information parameters. The information parameters includes information security levels, information sizes, and information access speeds. The encryption identifiers include a soft encryption identifier and a hard encryption identifier. A target encryption identifier of current to-be-encrypted information is obtained, and a target encryption mode of the current to-be-encrypted information is determined. An encryption engine corresponding to the current to-be-encrypted information is loaded according to the encryption mode. The method can reduce waste of resources, and improve an efficiency of encryption and decryption of information.

Sharing Data Via Transactions of a Blockchain
20220342951 · 2022-10-27 ·

According to a first aspect of the disclosure, there is provided a method of accessing data from one or more destination transactions stored on a blockchain, wherein the method comprises selecting one or more hyperlinks linking to the destination transaction(s). According to a second aspect of the disclosure, there is provided a request-response protocol for requesting access to data from a destination transaction.

Product Packaging and Associated System and Method for Authenticating a Product
20230085252 · 2023-03-16 ·

Product packaging includes a packaging container configured to contain product. The packaging also includes a first tag disposed on the packaging container and encoded with a first one of a plurality of package attributes and a second code disposed on the packaging container and encoded with a second one of the plurality of package attributes. The first tag and the second tag are linked to each other to determine authenticity of the product.

SYSTEMS AND METHODS FOR USE IN GENERATING AUDIT LOGS RELATED TO NETWORK PACKETS

Systems and methods are provided for generating audit log entries for data packet transactions. One example computer-implemented method includes, in response to a request to share data about a user with a first party, retrieving data identified in the request and generating a transaction ID for the request where the transaction ID is unique to the request to share the data. The method also includes compiling a data packet including at least the transaction ID and the identified data, and generating a signature value for the data packet. The method then further includes transmitting, by the computing device, the data packet to the first party as a transaction and appending an entry to an audit log, which includes the transaction ID and the signature value, but not the identified data.

METHOD AND DEVICE FOR PROVIDING COMMUNICATION PATH

A computer implemented method for providing a communication path is provided. The method includes to determine, with a receiving device, a shared secret based on a receiving device private key and an electronic device public key communicated to the receiving device over a network, and determine, with the electronic device, the shared secret based on an electronic device private key and a receiving device public key communicated to the electronic device over the network. The method also includes to determine, with the receiving device, an identifier of the receiving device based on the shared secret, and determine, with the electronic device, a time-based one-time password (TOTP) based on the shared secret. The method also includes to obtain a token based on the TOTP, communicate the token from the electronic device to the receiving device based on the identifier, and provide a communication path between the receiving device and electronic device based on the token.

Handling failures when synchronizing objects during a write operation

A method for execution by a dispersed storage network (DSN). The method begins by obtaining a data object for synchronized storage within a plurality of storage vaults, identifying a plurality of storage vaults, encoding the data object for each storage vault, initiating storage of data slices for each storage vault and interpreting received data slice information from at least some of the storage vaults to determine a number of storage vaults that have successfully stored the corresponding plurality of sets of encoded data slices and when the vault threshold number of storage vaults have not successfully stored the corresponding plurality of sets of encoded data slices within a synchronization timeframe, initiating a rollback process to abandon storage of the data object in the plurality of storage vaults and a store data response to indicate unsuccessful synchronized storage of the data object in the plurality of storage vaults.

SYSTEM AND A METHOD FOR AUTOMATIC GENERATION OF SMART CONTRACTS ACROSS BLOCKCHAIN PLATFORMS

The present invention provides for a system (100) and a method for generating smart contracts for blockchain platforms. An input received as natural language text is processed into a first parameter to generate a Domain Specific Language (DSL) construct. DSL construct is disintegrated into a stream of tokens and a syntax analysis is performed on the stream of tokens to check if the syntax of the DSL construct matches with a grammar file defined for the DSL construct. Each of the marked lines of the stream of tokens is read and the read marked lines are transformed into an organized structure. A file specific to a target blockchain platform is generated based on a second parameter and the organized structure is mapped with the generated file associated with the target blockchain platform to generate a target code template for generating a deployable target smart contract for the target blockchain platform.