H04L9/32

Secure communication between a contact lens and an accessory device

Described herein are systems and methods that allow for secure wireless communication between a contact lens system and an accessory device to protect sensitive data and prevent unauthorized access to confidential information. In certain embodiments, tampering attempts by potential attackers are thwarted by using a Physically Unclonable Functions (PUF) circuit that is immune to reverse engineering. In addition, sensors monitor a to-be-protected electronic device to detect tampering attempts and physical attacks to ensure the physical integrity of the communication system.

Management of virtual goods in a blockchain-ledger based gaming architecture
11557174 · 2023-01-17 · ·

Various embodiments provide management of virtual goods. In some embodiments, a gaming platform can be used to provide a secure ledger system for recording money transfer, play action, bets, analytics, gaming statistics, and the like, which are associated with virtual goods. Non-limiting examples of virtual goods comprise: characters; badges/icons; gameplay attributes; virtual money; cryptocurrencies; tokens; digital gifts; gameplay levels/add-ons; and prizes, among other examples. In some examples, gaming systems can directly interact with the distributed multi-ledger architecture for secure and transparent transactions which can also be accessed by auditors, tax authorities, partners, and/or other entities. Some examples may use private and/or public blockchains as part of the distributed multi-ledger gaming architecture. For instance, multiple distributed network nodes may be utilized to manage transaction records.

Network access authentication and authorization using a blockchain network

Some implementations of the disclosure are directed to receiving, at an authentication server system, a distributed ledger address transmitted by a client device to identify itself during an authentication process for accessing a network, where the distributed ledger address corresponds to a distributed ledger network; transmitting an authentication challenge message from the authentication server to the client device; in response to transmitting the authentication challenge message from the authentication server to the client device, receiving at the authentication server, a response to the challenge message including a signature; and using at least the distributed ledger network to determine if the signature used to sign the response to the challenge message is associated with the distributed ledger address transmitted by the client device.

Multidimensional attribute authentication

A user requesting authentication is presented a keypad that includes multiple keys and respective keys include a character that is associated with a shape. Responsive to selection of a key, a first set of attributes is activated for selection. Responsive to determining a selection of an attribute from the first set of attributes, activating one or more additional sets of attributes associated with the first key. Responsive to determining a selection from the one or more additional sets of attributes, determining whether a selection of an additional key is made. Responsive to determining the selection of the additional key, activating for selection a first set of attributes and one or more additional sets of attributes of the additional key, and responsive to determining selections of keys and corresponding attributes associated with the selection of respective keys, determining the validity of the authentication code.

Real-time attestation of cryptoprocessors lacking timers and counters

The present technology discloses methods and systems for receiving a security profile request from an integrity verifier, the request including a nonce; requesting, from a trusted platform module, a new nonce, wherein the new nonce is generated at least in part by the nonce and a current timestamp from a clock in the trusted platform module; receiving, from the trusted platform module, the new nonce; requesting, from a cryptoprocessor, a set of platform configuration registers; receiving, from the cryptoprocessor, the set of platform configuration registers; and sending a response to the integrity verifier, the response including the new nonce and the set of platform configuration registers to verify a security status of the trusted platform module and the cryptoprocessor.

Management Method and Apparatus for System Configuration Independent of Smart Contract for Blockchain
20230007873 · 2023-01-12 ·

A management method and apparatus for a system configuration independent of a smart contract for a blockchain is provided. The method includes that: a blockchain node receives a new proposal, where the new proposal includes at least one transaction; the blockchain node determines whether a special transaction exists in the at least one transaction, where the special transaction is used for storing system configuration content without service logic; the blockchain node verifies the special transaction according to a preset verification rule to obtain a verification result in response to determining that the special transaction exists in the at least one transaction; and the blockchain node performs, in response to the verification result indicating that the special transaction passes verification, update management on a current system configuration according to the system configuration content.

Management Method and Apparatus for System Configuration Independent of Smart Contract for Blockchain
20230007873 · 2023-01-12 ·

A management method and apparatus for a system configuration independent of a smart contract for a blockchain is provided. The method includes that: a blockchain node receives a new proposal, where the new proposal includes at least one transaction; the blockchain node determines whether a special transaction exists in the at least one transaction, where the special transaction is used for storing system configuration content without service logic; the blockchain node verifies the special transaction according to a preset verification rule to obtain a verification result in response to determining that the special transaction exists in the at least one transaction; and the blockchain node performs, in response to the verification result indicating that the special transaction passes verification, update management on a current system configuration according to the system configuration content.

GRAPHIC-BLOCKCHAIN-ORIENTATED SHARDING STORAGE APPARATUS AND METHOD THEREOF
20230009961 · 2023-01-12 ·

The present invention relates to a graphic-blockchain-orientated sharding storage apparatus, at least comprising a first sharding module and a second sharding module, wherein the first sharding module shards nodes having different resource capacity levels based on ledger data organized using a DAG structure, and the second sharding module assigns transactions to the shards matching with execution difficulty levels of the transactions, so that each said transaction is processed and stored in the shard corresponding thereto. The present invention incorporates the sharding technology into a graphic blockchain to provide a graphic-blockchain-orientated sharding storage method, so as to reduce pressure in terms of data storage and transaction processing on nodes of the graphic blockchain system. In addition, nodes, transactions, and data are dynamically divided according to resource heterogeneity among nodes, so as to further enhance performance of the graphic blockchain system while achieving efficient use of resources.

Artifact Origination and Content Tokenization

Devices can be configured to broadcast blocks incorporating artifact origination tokens. Devices can include network interfaces, memory; and processors. Processors can be configured to obtain artifact-to-time association elements. Artifact-to-time association elements can include artifact references and timestamps. Timestamps can include references to artifact references. Processors can be further configured to obtain artifact origination tokens. Artifact origination tokens can include artifact-to-time association element, certifier descriptors indicating certifier public keys, and/or certifier digital signatures. Certifier digital signatures can be generated based on certifier public keys and/or artifact-to-time association elements. Processors can be further configured to obtain ledger entries including artifact origination tokens with public keys, compute challenges based on ledger entries, and broadcast blocks incorporating the ledger entries. Blocks can be validated using cryptographic systems to obtain proof based challenges.

Application Programming Interface (API)-enabled Automated Compliance Verification and Processing

Various aspects of the disclosure relate to automated compliance verification systems for authenticating and verifying compliance associated with electronic transactions. A compliance verification platform may be an intermediary between an application for managing and/or recording transactions and a transaction processing platform for processing a transaction. Based on successful compliance verification and authentication, the compliance verification platform may send notifications to the transaction processing platform to process a transaction requested via the application