H04L9/14

SQL extension for secure encryption key transfer
11563563 · 2023-01-24 · ·

Embodiments afford secure transfer of security key type(s) between different database servers having different key hierarchies. For example, a key transfer may occur from a source server to a target server during a database migration process. Particular embodiments comprise a SQL transfer command statement (e.g., TRANSFER ENCRYPTION KEY) recognized by an engine. Syntax of the SQL transfer command includes a password and a filename for a security key. Upon receiving the SQL transfer command, the engine references an information repository to identify a relevant key hierarchy and key type, encrypts the security key with a key derived from password, and stores (exports) the encrypted security key in a file for consumption (import) at the target server. The SQL transfer command may further comprise a direction component determining flow of key information, and an override function to deal with error messages arising from any already-existing security key having the same name.

SQL extension for secure encryption key transfer
11563563 · 2023-01-24 · ·

Embodiments afford secure transfer of security key type(s) between different database servers having different key hierarchies. For example, a key transfer may occur from a source server to a target server during a database migration process. Particular embodiments comprise a SQL transfer command statement (e.g., TRANSFER ENCRYPTION KEY) recognized by an engine. Syntax of the SQL transfer command includes a password and a filename for a security key. Upon receiving the SQL transfer command, the engine references an information repository to identify a relevant key hierarchy and key type, encrypts the security key with a key derived from password, and stores (exports) the encrypted security key in a file for consumption (import) at the target server. The SQL transfer command may further comprise a direction component determining flow of key information, and an override function to deal with error messages arising from any already-existing security key having the same name.

Terminal device and computer program
11704420 · 2023-07-18 ·

As a saving target file is specified, a controller (110) executes a file management program to divide the saving target file, encrypt a divided file using a cryptographic key corresponding to the logical address of the divided file, save the divided file at a storing destination corresponding to the logical address, and create a table associating the logical address, the cryptographic key, and the saving destination physical address. As a reading target file is specified, the controller (110) identifies the corresponding divided file from the logical address, identifies the saving destination physical address of the divided file and the cryptographic key with reference to the table, reads the divided file from the identified physical address, and decrypts the divided file using the identified cryptographic key.

Terminal device and computer program
11704420 · 2023-07-18 ·

As a saving target file is specified, a controller (110) executes a file management program to divide the saving target file, encrypt a divided file using a cryptographic key corresponding to the logical address of the divided file, save the divided file at a storing destination corresponding to the logical address, and create a table associating the logical address, the cryptographic key, and the saving destination physical address. As a reading target file is specified, the controller (110) identifies the corresponding divided file from the logical address, identifies the saving destination physical address of the divided file and the cryptographic key with reference to the table, reads the divided file from the identified physical address, and decrypts the divided file using the identified cryptographic key.

Crypto multiple security asset creation and redemption platform

An asset trading system utilizing a distributed ledger and configured to: when a creation request to create a digital fund token representing at least one share of a fund having a plurality of different assets (i) is received, (ii) is electronically signed with a private key associated with a first addressed account, and (iii) indicates a composition of the at least one share of the fund: place the plurality of different assets represented by the at least one share of the fund into an escrow account; create the digital fund token, wherein the digital fund token indicates the composition of the share of the fund; and record the creation of the digital fund token on a distributed ledger.

Crypto multiple security asset creation and redemption platform

An asset trading system utilizing a distributed ledger and configured to: when a creation request to create a digital fund token representing at least one share of a fund having a plurality of different assets (i) is received, (ii) is electronically signed with a private key associated with a first addressed account, and (iii) indicates a composition of the at least one share of the fund: place the plurality of different assets represented by the at least one share of the fund into an escrow account; create the digital fund token, wherein the digital fund token indicates the composition of the share of the fund; and record the creation of the digital fund token on a distributed ledger.

Communication node, method of operating thereof and collaborative system

The present invention relates to a communication node, a method of operating the same, and a collaborative system. In an example of the present invention, there may be provided an operation method of a first communication node (a transmission node) comprising: a step of confirming whether data is to be transmitted to the receiving side communication node by a transmitting side communication node among communication nodes connected to each other on the network; a step for generating first control information for verifying authentication and integrity of the data; a step for generating a first control information including information for authenticating and verifying integrity of the data to be transmitted by the transmitting side communication node; a step for sharing the first control information with at least one or more participating communication nodes including the receiving side communication node through a channel formed in a block chain network; and a step for transmitting a message including the data through a channel formed in a network different from the block chain network.

Communication node, method of operating thereof and collaborative system

The present invention relates to a communication node, a method of operating the same, and a collaborative system. In an example of the present invention, there may be provided an operation method of a first communication node (a transmission node) comprising: a step of confirming whether data is to be transmitted to the receiving side communication node by a transmitting side communication node among communication nodes connected to each other on the network; a step for generating first control information for verifying authentication and integrity of the data; a step for generating a first control information including information for authenticating and verifying integrity of the data to be transmitted by the transmitting side communication node; a step for sharing the first control information with at least one or more participating communication nodes including the receiving side communication node through a channel formed in a block chain network; and a step for transmitting a message including the data through a channel formed in a network different from the block chain network.

Storage network with enhanced data access performance
11704184 · 2023-07-18 · ·

A method for execution by a storage network begins by issuing a decode threshold number of read requests for a set of encoded data slices to a plurality of storage units of a set of storage units and continues by determining whether less than a decode threshold number of read requests has been received in a time window. The method continues by identifying one or more encoded data slices encoded data slices associated with read requests of the decode threshold number of read requests that have not been received and for an encoded data slice of the one or more encoded data slices, issuing a priority read request to a storage unit storing a copy of the encoded data slice. The method then continues by receiving a response from the storage unit storing the copy of the encoded data, where the storage unit storing the copy of the encoded data slice is adapted to delay one or more maintenance tasks in response to the priority read request.

Storage network with enhanced data access performance
11704184 · 2023-07-18 · ·

A method for execution by a storage network begins by issuing a decode threshold number of read requests for a set of encoded data slices to a plurality of storage units of a set of storage units and continues by determining whether less than a decode threshold number of read requests has been received in a time window. The method continues by identifying one or more encoded data slices encoded data slices associated with read requests of the decode threshold number of read requests that have not been received and for an encoded data slice of the one or more encoded data slices, issuing a priority read request to a storage unit storing a copy of the encoded data slice. The method then continues by receiving a response from the storage unit storing the copy of the encoded data, where the storage unit storing the copy of the encoded data slice is adapted to delay one or more maintenance tasks in response to the priority read request.