H04L9/10

Electrically self-powered surgical instrument with manual release

A method for manufacturing a surgical instrument to have a manual release, which comprises mechanically coupling a manual release to a transmission of a surgical instrument having a self-contained power source disposed within a handle thereof, the transmission mechanically connecting an electrically-powered motor inside the handle to a movable part of a surgical end effector connected to the handle such that the transmission is operable to displace the movable part to a starting position, an actuated position, and at least one point between the starting position and the actuated position when the motor is operated; and wherein the manual release is operable to interrupt the transmission from operation of the motor and, during interruption, displace the movable part towards the starting position irrespective of the position of the movable part and independent of operation of the motor.

Add and drop blobbers in blockchain
11757988 · 2023-09-12 · ·

An approach is disclosed to replace or by-pass a first blobber utilizing a blockchain infrastructure. The first blobber is identified. For replacement, a second blobber is identified and a replacement transaction is written. Write markers with respect to content for the second blobber are generated. The content is transferred to the second blobber. After detecting a successful completion of all the writes to the second blobber, a transaction to drop the first blobber is written. When the first blobber is by-passed content written to the first blobber capable of being reconstructed from other blocks is written to other blobbers. Read markers are sent for the other blocks to the other blobbers. The blockchain monitors for successful completion of all reads of the other blocks. After detecting the successful completion of all the reads of the other blocks from the other blobbers, the content is reconstructed from the other blocks.

Electrically powered surgical instrument with manual release

A surgical device comprising a surgical end effector, an actuation assembly having a part operable to move between a first position and a second position, an electrically-powered motor, a transmission mechanically connecting the motor to the part and being operable to selectively displace the part between the first and second positions when the motor is operated, and a manual release mechanically coupled to the transmission to selectively interrupt the transmission and, during interruption, displace the part towards the first position independent of operation of the motor.

Electrically powered surgical instrument with manual release

A surgical device comprising a surgical end effector, an actuation assembly having a part operable to move between a first position and a second position, an electrically-powered motor, a transmission mechanically connecting the motor to the part and being operable to selectively displace the part between the first and second positions when the motor is operated, and a manual release mechanically coupled to the transmission to selectively interrupt the transmission and, during interruption, displace the part towards the first position independent of operation of the motor.

SECURING CRYPTOGRAPHIC DATA ONTO A PHYSICAL MEDIUM

The present invention relates to a method and a system for inscribing and securely storing cryptographic keys on a physical medium, and to a corresponding physical medium, comprising the following steps: from a first management entity (31), generating (1) a first pair of asymmetric cryptographic keys comprising a first user public key (pub1) and a first user private key (priv1), inscribing (2) the first user private key (priv1) onto a physical medium, and affixing (4) a first tamper-evident concealing element (hol1) to the physical medium in order to conceal the first user private key (priv1) and seal same, said first user private key (priv1) being accessible only by visibly breaking said first tamper-evident concealing element (hol1); from the second management entity (32), generating (6) a second pair of asymmetric cryptographic keys comprising a second user public key (pub2) and a second user private key (priv2), inscribing (7) the second user private key (priv2) onto the physical medium and affixing (9) a second tamper-evident concealing element (hol2) to the physical medium in order to conceal the second user private key (priv2) and seal same, said second user private key (priv2) being accessible only by visibly breaking said second tamper-evident concealing element (hol2); generating (10) at least one last user public key (pub0) and/or at least one cryptographic address (adr, adr-mult) from the first user public key (pub1) and the second user public key (pub2), inscribing (11) said at least one last public user key (pub0) and/or said at least one cryptographic address (adr, adr-mult) onto the physical medium, and verifying (12, 13) same, and finally recovering the private keys (priv1, priv2) comprising the generation of a last user private key (priv0) corresponding to the last user public key (pub0) and/or to said at least one cryptographic address (adr, adr-mult).

SECURING CRYPTOGRAPHIC DATA ONTO A PHYSICAL MEDIUM

The present invention relates to a method and a system for inscribing and securely storing cryptographic keys on a physical medium, and to a corresponding physical medium, comprising the following steps: from a first management entity (31), generating (1) a first pair of asymmetric cryptographic keys comprising a first user public key (pub1) and a first user private key (priv1), inscribing (2) the first user private key (priv1) onto a physical medium, and affixing (4) a first tamper-evident concealing element (hol1) to the physical medium in order to conceal the first user private key (priv1) and seal same, said first user private key (priv1) being accessible only by visibly breaking said first tamper-evident concealing element (hol1); from the second management entity (32), generating (6) a second pair of asymmetric cryptographic keys comprising a second user public key (pub2) and a second user private key (priv2), inscribing (7) the second user private key (priv2) onto the physical medium and affixing (9) a second tamper-evident concealing element (hol2) to the physical medium in order to conceal the second user private key (priv2) and seal same, said second user private key (priv2) being accessible only by visibly breaking said second tamper-evident concealing element (hol2); generating (10) at least one last user public key (pub0) and/or at least one cryptographic address (adr, adr-mult) from the first user public key (pub1) and the second user public key (pub2), inscribing (11) said at least one last public user key (pub0) and/or said at least one cryptographic address (adr, adr-mult) onto the physical medium, and verifying (12, 13) same, and finally recovering the private keys (priv1, priv2) comprising the generation of a last user private key (priv0) corresponding to the last user public key (pub0) and/or to said at least one cryptographic address (adr, adr-mult).

IC CHIP WITH AUTO-IDENTIFICATION
20230370264 · 2023-11-16 ·

An authentication (or identification) of an electronic apparatus is performed using a response to be generated from a specific random number, which is specific to an IC chip included in the electronic apparatus, and a challenge, which is input to the electronic apparatus. A physical firewall, which is composed of the authenticated electronic apparatuses, is configured. Furthermore, a pair of a secret and public keys are generated using the said response. The said public key or a code information generated using the said public key serves as a logical address of the said electronic apparatus. An electronic signature generated using the said secret key is used to perform data transmission between electronic apparatuses inside the physical firewall.

Securing cryptographic data onto a physical medium

The present invention relates to a method and a system for inscribing and securely storing cryptographic keys on a physical medium, and to a corresponding physical medium, comprising the following steps: from a first management entity (31), generating (1) a first pair of asymmetric cryptographic keys comprising a first user public key (pub1) and a first user private key (priv1), inscribing (2) the first user private key (priv1) onto a physical medium, and affixing (4) a first tamper-evident concealing element (hol1) to the physical medium in order to conceal the first user private key (priv1) and seal same, said first user private key (priv1) being accessible only by visibly breaking said first tamper-evident concealing element (hol1); from the second management entity (32), generating (6) a second pair of asymmetric cryptographic keys comprising a second user public key (pub2) and a second user private key (priv2), inscribing (7) the second user private key (priv2) onto the physical medium and affixing (9) a second tamper-evident concealing element (hol2) to the physical medium in order to conceal the second user private key (priv2) and seal same, said second user private key (priv2) being accessible only by visibly breaking said second tamper-evident concealing element (hol2); generating (10) at least one last user public key (pub0) and/or at least one cryptographic address (adr, adr-mult) from the first user public key (pub1) and the second user public key (pub2), inscribing (11) said at least one last public user key (pub0) and/or said at least one cryptographic address (adr, adr-mult) onto the physical medium, and verifying (12, 13) same, and finally recovering the private keys (priv1, priv2) comprising the generation of a last user private key (priv0) corresponding to the last user public key (pub0) and/or to said at least one cryptographic address (adr, adr-mult).

Securing cryptographic data onto a physical medium

The present invention relates to a method and a system for inscribing and securely storing cryptographic keys on a physical medium, and to a corresponding physical medium, comprising the following steps: from a first management entity (31), generating (1) a first pair of asymmetric cryptographic keys comprising a first user public key (pub1) and a first user private key (priv1), inscribing (2) the first user private key (priv1) onto a physical medium, and affixing (4) a first tamper-evident concealing element (hol1) to the physical medium in order to conceal the first user private key (priv1) and seal same, said first user private key (priv1) being accessible only by visibly breaking said first tamper-evident concealing element (hol1); from the second management entity (32), generating (6) a second pair of asymmetric cryptographic keys comprising a second user public key (pub2) and a second user private key (priv2), inscribing (7) the second user private key (priv2) onto the physical medium and affixing (9) a second tamper-evident concealing element (hol2) to the physical medium in order to conceal the second user private key (priv2) and seal same, said second user private key (priv2) being accessible only by visibly breaking said second tamper-evident concealing element (hol2); generating (10) at least one last user public key (pub0) and/or at least one cryptographic address (adr, adr-mult) from the first user public key (pub1) and the second user public key (pub2), inscribing (11) said at least one last public user key (pub0) and/or said at least one cryptographic address (adr, adr-mult) onto the physical medium, and verifying (12, 13) same, and finally recovering the private keys (priv1, priv2) comprising the generation of a last user private key (priv0) corresponding to the last user public key (pub0) and/or to said at least one cryptographic address (adr, adr-mult).

Method and system for securely registering cryptographic keys on a physical medium for cryptographic keys, and physical medium produced

The present invention relates to a method and a system for inscribing and securely storing cryptographic keys on a physical medium, and to a corresponding physical medium, comprising the following steps: from a first management entity (31), generating (1) a first pair of asymmetric cryptographic keys comprising a first user public key (pub1) and a first user private key (priv1), inscribing (2) the first user private key (priv1) onto a physical medium, and affixing (4) a first tamper-evident concealing element (hol1) to the physical medium in order to conceal the first user private key (priv1) and seal same, said first user private key (priv1) being accessible only by visibly breaking said first tamper-evident concealing element (hol1); from the second management entity (32), generating (6) a second pair of asymmetric cryptographic keys comprising a second user public key (pub2) and a second user private key (priv2), inscribing (7) the second user private key (priv2) onto the physical medium and affixing (9) a second tamper-evident concealing element (hol2) to the physical medium in order to conceal the second user private key (priv2) and seal same, said second user private key (priv2) being accessible only by visibly breaking said second tamper-evident concealing element (hol2); generating (10) at least one last user public key (pub0) and/or at least one cryptographic address (adr, adr-mult) from the first user public key (pub1) and the second user public key (pub2), inscribing (11) said at least one last public user key (pub0) and/or said at least one cryptographic address (adr, adr-mult) onto the physical medium, and verifying (12, 13) same, and finally recovering the private keys (priv1, priv2) comprising the generation of a last user private key (priv0) corresponding to the last user public key (pub0) and/or to said at least one cryptographic address (adr, adr-mult).