Patent classifications
G06F21/645
PROCESSING OF REQUESTS TO CONTROL INFORMATION STORED AT MULTIPLE SERVERS
Methods, systems, and apparatus, including computer programs encoded on a computer storage medium, for transmitting/processing requests to control information stored at multiple content platforms/servers. In one aspect, a client device can send a request to verify the device's trustworthiness to a device trustworthiness server. The client device can receive, from the device trustworthiness server, data indicating that the client device is trustworthy, in response to which, the client device can send, to a relay server, a request to control user data stored at a plurality of servers. The client device can receive, via the relay server, a response from each of the plurality of servers. Based on the responses, the client device can determine that at least a subset of the plurality of servers that included the user data has performed the action specified in the request to control the user data.
System and Method for Preventing Wet Signature Legal Documents, and the Agency Relationships they Create, from Being Used to Perpetrate Fraud and Financial Abuse
A system and method for securing and authenticating legal documents and agency relationships to prevent each from being used to perpetrate fraud and financial abuse, including a network server having a processor and memory and an executable program with code stored in said memory and configured for bidirectional communication with a plurality of network connectable devices through the Internet to accept requests from notaries and registered members to register digital copies of wet signature legal documents.
DETECTION OF ANOMALIES IN A COMPUTER SYSTEM
Systems and methods of detecting anomalies in a computing system are disclosed. The computing system can be a member of a blockchain network of a plurality of blockchains. Digests of blocks may be passed between blockchains of the plurality of blockchains, which enables each member of the blockchain network to verify an immutable record of data transactions, free of the mutual trust requirement of a typical blockchain environment. The passing of blockchain block digests further enables a member of the blockchain network to assist another member of the blockchain network to identify an anomaly within moments of when the anomaly first occurs.
DATA MANAGEMENT
In some examples, a method for data management, the method comprises booting a trusted diskless operating system image via a device firmware component, accessing a non-volatile storage of the device using the trusted diskless operating system image; and retrieving user data from the non-volatile storage of the device, and/or writing user data received from a remote location to the non-volatile storage of the device.
Method and system for IoT code and configuration using smart contracts
Method and Systems for configuring, monitoring, updating and validating Internet of Things (IoT) software code and configuration using blockchain smart contract technology. The use of smart contracts for delivering software code and or configuration scripts to IoT devices is an enhanced cybersecurity solution meant to ensure the security and integrity of IoT devices. The use of smart contracts is also shown how it can be used for verifying the integrity of the IoT devices software code and or configuration is a proactive method of cybersecurity. The proactive cybersecurity method will prevent man in the middle attacks as well as preventing rogue devices from impacting other IoT devices or networks.
Identifying internet of things network anomalies using group attestation
An approach is provided that identifies Internet of Things (IoT) network anomalies. The approach receives IoT endpoint device data at an attestation entity included in the network. The data is logged to a secured ledger and analyzed. Conditions pertaining to the IoT endpoint devices are analyzed with the analysis being based on a set of network policy data. Based on the analysis, the approach detects network anomalies that correspond to the IoT endpoint devices. These network anomalies and their corresponding IoT endpoint devices are then reported.
Systems, methods, and program products for depositing, holding and/or distributing collateral as a token in the form of digital assets on an underlying blockchain
The present invention relates to a method, system, and program product for depositing, holding and/or distributing collateral in the form of a stable value token for a security token, the tokens being on the same underlying blockchain. Furthermore, the present invention relates to methods, systems, and program products for lending digital assets, such as crypto currency and other related products.
Weighted source data secured on blockchains
Technologies are shown for secure management of evaluation data that involves receiving an evaluation value signal from a source, the evaluation value signal relating to an evaluation entity having an evaluation score secured on an evaluation data blockchain and verifying whether the source is identified in trusted source data. If the source is trusted, then the technology involves obtaining a weight associated with the source, obtaining the evaluation score for the evaluation entity from a first evaluation data block in the evaluation data blockchain, where the first evaluation data block is a most recent evaluation data block in the evaluation data blockchain, calculating a new evaluation score based on the evaluation score obtained from the first evaluation data block and the received valuation signal weighted according to the weight associated with the source, and securely committing the new evaluation score to the evaluation data blockchain in another evaluation data block.
Methods, blockchain nodes and storage media for deploying smart contract
A computer-implemented method, non-transitory, computer-readable medium, and computer-implemented system are provided for deploying a smart contract in a blockchain network. The computer-implemented method includes: receiving, by a blockchain node in a blockchain network, a transaction for creating a smart contract, wherein the transaction comprises a machine code of the smart contract, and the machine code of the smart contract is obtained by Ahead of Time (AoT) compilation of a bytecode of the smart contract in a first trusted execution environment (TEE); determining, by the blockchain node, that the machine code of the smart contract is obtained in a trusted TEE; and in response to determining that the machine code of the smart contract is obtained by the trusted TEE, completing, by the blockchain node, a deployment of the smart contract.
Generating electronic signatures
According to a first aspect of the present invention, there is provide a method of electronically signing content. Content to be signed and an attribute sharing item are presented at a signing device associated with a signer. It is detected that the signer has accessed the attribute sharing item to provide one or more identity attributes which uniquely identify the signer. It is also detected that the signer has initiated a signing action at the signing device. The signing action and the identity attributes are transmitted to a signing service which is configured to create an electronic signature including encrypting the content to be signed and the one or more identity attribute.