H04L9/006

Systems and methods for “machine-to-machine” (M2M) communications between modules, servers, and an application using public key infrastructure (PKI)
11606204 · 2023-03-14 · ·

Methods and systems are provided for supporting efficient and secure “Machine-to-Machine” (M2M) communications using a module, a server, and an application. A module can communicate with the server by accessing the Internet, and the module can include a sensor and/or an actuator. The module, server, and application can utilize public key infrastructure (PKI) such as public keys and private keys. The module can internally derive pairs of private/public keys using cryptographic algorithms and a first set of parameters. A server can authenticate the submission of derived public keys and an associated module identity. The server can use a first server private key and a second set of parameters to (i) send module data to the application and (ii) receive module instructions from the application. The server can use a second server private key and the first set of parameters to communicate with the module.

Cryptographic methods and systems for managing digital certificates with linkage values

Improved pseudonym certificate management is provided for connected vehicle authentication and other applications. Temporary revocation of a certificate is enabled. With respect to Security Credential Management Systems (SCMS), pre-linkage values can be employed. The pre-linkage values can be encrypted using homomorphic encryption. Other embodiments are also provided.

Method of generating globally verifiable unique identifiers using a scalable interlinked blockchain structure

This disclosure describes systems and methods for employing interlinking multiple independent and separately-scalable blockchains to create globally verifiable unique identifiers. The disclosed systems and methods facilitate the creation of the globally verifiable unique identifiers to a level of scalability unattainable without employing the underlying two-dimensional blockchain structure, metadata, and cryptographic information stored on the blockchain. Moreover, the system avoids collisions and name conflicts among the globally verifiable unique identifiers, supports post-creation verification of the globally verifiable unique identifiers, and provides a variety of ancillary functions using the globally verifiable unique identifiers.

System and Method for Authentication Using Non-Fungible Tokens
20230128790 · 2023-04-27 ·

In an example, a non-transitory machine-readable storage medium includes stored instructions. The store instructions, when executed by one or more processors, cause the one or more processors to: receive a unique identifier of a tagged physical good; receive a public key stored in a Non-Fungible Token (NFT) corresponding to the unique identifier; encrypt a first passphrase using the public key to obtain an encrypted passphrase; compare a second passphrase to the first passphrase; and generate an output indication in response to comparing the second passphrase to the first passphrase. The second passphrase is generated by decrypting the encrypted passphrase using a private key stored on an electronic tag device embedded in the tagged physical good.

BROKER-BASED BUS PROTOCOL AND MULTI-CLIENT ARCHITECTURE

A system and method for an eSync bus protocol is provided. The eSync bus protocol uses a broker to route communications between electronic devices within an electronic environment, such as within a vehicle or the like. The electronic devices may first register with the broker, and thereafter send messages to the broker for routing to other registered electronic devices. In this way, the broker may act as an intermediary to route communications using the eSync bus protocol. A multi-client architecture is also provided in which multiple domains may be defined by the functions performed by electronic devices within a respective domain.

Conducting secure interactions utilizing reliability information

Embodiments of the invention are directed assessing reliability between two computing devices. A distributed database may maintain reliability associations between pairs of computing devices. Each reliability association may indicate a particular device has determined (e.g., locally) that another device is reliable. In order to determine an amount of reliability between a first computing device and a second computing device, an ordered combination of the reliability associations may be determined utilizing the distributed database. The ordered combination of reliability associations may identify a reliability path between the first computing device and the second computing device. An amount of reliability may be determined based on the reliability path. An interaction between the devices may be allowed or restricted based at least in part on the amount of reliability between the computing devices.

IoT devices, block chain platforms and IoT systems for recording transportation data of objects and methods of using the same

The present disclosure includes IoT devices, block chain platforms, and IoT systems for recording transportation data of an object and methods of using the same. In some examples, IoT devices are one time programmed with a private key in a manufacturing process of the IoT device. In some examples, IoT devices may include at least one sensor configured to detect external environment data of an object during transportation of the object; and a processor configured to receive the data from the sensor and generate a data packet based on the data using a private key, the data packet including a unique identification number of the IoT device, the data and a signature generated according to the unique identification number and the data.

Authentication, authorization and accounting in managed cloud computing services

In an embodiment, a computer implemented method comprises receiving, at a first computing device associated with a managing entity, a request to perform an operation of a managed service; publishing to a first block of a distributed ledger system, by the first computing device associated with the managing entity, identification information of the managing entity; identifying, by a second computing device associated with the managed service, the identification information published to the first block of the distributed ledger system; publishing to a second block of the distributed ledger system, by the second computing device associated with the managed service, acknowledgement information comprising an indication that the identification information of the managing entity published to the first block was received and verified; publishing to a third block of the distributed ledger system, by the second computing device associated with the managed service, management request information comprising an operation request for the managing entity; identifying, by the first computing device associated with the managing entity, the management request information published to the third block of the distributed ledger system; publishing to a fourth block of the distributed ledger system, by the first computing device associated with the managing entity, management request acknowledgment information comprising an indication that the management request information of the third block was received; and in response to a performance of an operation included in the management request information published to the third block, publishing to a fifth block of the distributed ledger system, by the first computing device associated with the managing entity, management operation record information including a history of operations performed by the managing entity.

Methods and system for serving targeted advertisements to a consumer device

A method for auditing an advertisement impression in which a first advertisement was presented in conjunction with first media content is disclosed. The method generally comprises transmitting to a plurality of second computing devices a plurality of randomly generated first cryptographic proofs; receiving, a first message from a second computing device indicating that the first advertisement was presented in conjunction with the first media content; and evaluating the first targeting model for the first advertisement based on the at least one media content classifier.

Cryptographic feature licensing

Techniques to facilitate feature licensing of industrial devices employed in an industrial automation environment are disclosed herein. In at least one implementation, a security certificate for an industrial device is provisioned based on a first private key associated with the industrial device, wherein the first private key is securely stored in a hardware root of trust within the industrial device. A device information package for the industrial device is generated based on the security certificate, wherein the device information package is encrypted with a first public key paired with the first private key and signed by a certificate authority using a second private key. The device information package is provided to the industrial device, wherein the industrial device is configured to validate the device information package using a second public key paired with the second private key and decrypt the device information package with the first private key.