Patent classifications
H04L9/30
Method of enabling a secure communication to a target device over a network
A method for enabling a secure communication with a target device over a network includes: opening an unsecured OPC UA Endpoint by an OPC UA Server that runs on the target device; connecting to the OPC UA Server over the network by an OPC UA Client running on a first device, and requesting the initial device certificate; receiving the initial device certificate by unsecured communication over the network; validating, by the first device, the initial device certificate; establishing, by the first device, a device certificate; encrypting, by the first device, at least the device certificate; sending the encrypted data over the network; decrypting, by the target device, the encrypted data using an initial device private key associated with the initial device certificate to obtain at least the device certificate; storing the device certificate on the target device; and opening a secured OPC UA Endpoint by the OPC UA Server.
Method for performing cryptographic operations in a processing device, corresponding processing device and computer program product
A method performs cryptographic operations on data in a processing device. An iterative operation between a first operand formed by a given number of words and a second operand using a secret key is performed. The iterative operation includes, for each bit of the secret key, applying one of a first set operations and a second set of operations to the first operand and to the second operand depending on of the bit, and conditionally swapping words of the first and the second operand based on a control bit value obtained by applying a logic XOR function to a random bit.
System and method for sharing user preferences without having the user reveal their identity
A system and method for sharing user preferences pertaining to one or more products, without having the user reveal their identity, is described herein. The system is configured for registering a user by receiving a set of biometric samples of the user, processing the set of biometric samples to compute a Secret-Key (S1) corresponding to the user, generating a Unique-Number (N1) using a random number generation algorithm, applying a Function (F1) to the Secret-Key (S1) and the Unique-Number (N1), to compute a Public-Key (P1). Once the user is registered, the system is configured to receive a biometric sample from the user in real-time and compute the Secret-Key (S2) for authenticating the user. Once the user is authenticated, the system may recommend to the user, a candidate product from a product catalog, based on the user's preferences.
System and method for sharing user preferences without having the user reveal their identity
A system and method for sharing user preferences pertaining to one or more products, without having the user reveal their identity, is described herein. The system is configured for registering a user by receiving a set of biometric samples of the user, processing the set of biometric samples to compute a Secret-Key (S1) corresponding to the user, generating a Unique-Number (N1) using a random number generation algorithm, applying a Function (F1) to the Secret-Key (S1) and the Unique-Number (N1), to compute a Public-Key (P1). Once the user is registered, the system is configured to receive a biometric sample from the user in real-time and compute the Secret-Key (S2) for authenticating the user. Once the user is authenticated, the system may recommend to the user, a candidate product from a product catalog, based on the user's preferences.
Blockchain-based systems and methods for communicating, storing and processing data over a blockchain network
A computer-implemented method for transmitting and/or submitting digital content such as feedback for an entity to a blockchain is disclosed. This may be, for example, the Bitcoin blockchain. The method, which is implemented at a first node, includes: submitting, to the blockchain, a first transaction for committing a first quantity of tokens to transfer to a second node associated with the entity, the first transaction having a first output; generating a first content for submission to the blockchain; and submitting, to the blockchain, a second transaction that returns a second quantity of the committed first quantity of tokens to an address associated with the first node, the second transaction having the first output of the first transaction as an input, wherein the first content is used to unlock the first output of the first transaction.
Blockchain-based systems and methods for communicating, storing and processing data over a blockchain network
A computer-implemented method for transmitting and/or submitting digital content such as feedback for an entity to a blockchain is disclosed. This may be, for example, the Bitcoin blockchain. The method, which is implemented at a first node, includes: submitting, to the blockchain, a first transaction for committing a first quantity of tokens to transfer to a second node associated with the entity, the first transaction having a first output; generating a first content for submission to the blockchain; and submitting, to the blockchain, a second transaction that returns a second quantity of the committed first quantity of tokens to an address associated with the first node, the second transaction having the first output of the first transaction as an input, wherein the first content is used to unlock the first output of the first transaction.
SYSTEM AND METHOD FOR MANAGING TRANSACTIONS IN DYNAMIC DIGITAL DOCUMENTS
A system software and method which relates to the field of computing technology or business process models or computer systems or distributed computer systems or computer networks relating to general purpose devices that can be programmed to carry out a set of data table or hash table updates, validations or modifications supporting, enabling or executing public and private services, financial transactions and commercial applications. More specifically, the present invention is directed to distributed and decentralized computing in which said distributed network is supported and encrypted by cryptographic technology, hash functions and distributed public or private keys or other related technology. System and methods for managing dynamic electronic documents on a private distributed ledger comprise establishing a dynamic electronic document comprising a first state object, wherein the state object references a prior approved first transaction; proposing a second transaction comprising as an input the first state object and as an output a transaction command to alter the state object as well as what parameters are required to validate the second transaction; validating the proposed second transaction; and updating the state object on a private distributed ledger to reference the second transaction.
METHOD FOR SUPPORTING SHARING OF TRAVEL HISTORY OF TRAVELERS IN AIRPORTS
A method for supporting sharing of travel history of travelers in airports includes receiving, by a trusted entity of the distributed ledger system, a registration request from a traveler via a traveler application. The registration request provides personal information of the traveler to the trusted entity. The method further includes generating, by the trusted entity, a public key for the traveler using an identity-based encryption mechanism and sending, from the trusted entity to the global identity blockchain, a registration transaction with respect to the traveler. The registration transaction comprises the public key of the traveler. The method further includes recording a travel history that includes all travel tickets of the traveler, wherein a Merkle tree of all the travel tickets of the traveler is generated. The Merkle tree has a Merkle root, and the Merkle root of the Merkle tree is stored in the global identity blockchain.
METHOD FOR SUPPORTING SHARING OF TRAVEL HISTORY OF TRAVELERS IN AIRPORTS
A method for supporting sharing of travel history of travelers in airports includes receiving, by a trusted entity of the distributed ledger system, a registration request from a traveler via a traveler application. The registration request provides personal information of the traveler to the trusted entity. The method further includes generating, by the trusted entity, a public key for the traveler using an identity-based encryption mechanism and sending, from the trusted entity to the global identity blockchain, a registration transaction with respect to the traveler. The registration transaction comprises the public key of the traveler. The method further includes recording a travel history that includes all travel tickets of the traveler, wherein a Merkle tree of all the travel tickets of the traveler is generated. The Merkle tree has a Merkle root, and the Merkle root of the Merkle tree is stored in the global identity blockchain.
KEY GENERATION AND PACE WITH PROTECTION AGAINST SIDE CHANNEL ATTACKS
A method for key generation is arranged in a client processor device, by means of which a second public client key P.sub.c′ of the client is generated. The public key P.sub.c′ is formed by a calculation, or sequence of calculations, which does not contain any operation whose result depends exclusively on the nonce s and at least one public value, or the public key P.sub.c′ being formed by a calculation, or sequence of calculations, where into each operation in which the nonce s enters, at least one non-public value enters the first private client key k.sub.c or the second private client key k.sub.c′, for example as a result of the calculation P.sub.c′=(k.sub.c′.Math.s).Math.G+(k.sub.c′.Math.k.sub.c).Math.P.sub.t.