Patent classifications
H04L9/32
Method for producing a cryptographical signed transaction
The invention relates to a method for producing a cryptographically signed transaction for the transfer of an amount of a currency within a blockchain. The transaction comprises one or more inputs and one or more outputs. The method comprises: retrieving the one or more inputs, the inputs being a reference to one or more previous transactions, determining the one or more outputs, each output defining an amount to be transferred to a receiver indicated in the respective output, adding security information, the security information defining directly or indirectly a maximum amount to be spent with the transaction, and cryptographically signing the transaction by adding signature information.
SALTED HASHING METHOD FOR RESPONSE-BASED CRYPTOGRAPHY
Systems and methods for cryptographic key generation at a client and server are disclosed. The client has an array of PUF devices, and the server has an image that PUF. The server sends the client addresses of PUF devices to be measured, and retrieves previously stored responses corresponding to those addresses from its database. The client measures responses at the addresses. Each device hashes the resulting responses, and the server compares the hash received from the client to its own. If the hashes to not match, the server searches for a matching hash be perturbing the measured response bit stream until a match is achieved. The perturbed response bitstream, and the measured response at the client are then salted, and used for key generation.
SYSTEMS AND METHODS FOR POSTURE CHECKING ACROSS LOCAL NETWORK ZONE ZTNA CONTROL
Systems, devices, and methods are discussed for providing ZTNA control across multiple related, but independently provisioned networks.
PUF-PROTECTED PSEUDO-HOMOMORPHIC METHODS TO GENERATE SESSION KEYS
Systems and methods for the generation and use of session keys supporting secure communications between a client and server device are disclosed. The client device has or receives a password, which it hashes a predetermined first number of times. The hashed password is sent as a message digest to a server. The server applies the hashed password to a an array of PUF devices, and receives a response bitstream which is stored. The client later hashes the password a second predetermined number of times, which is less than the first predetermined number, and this second message digest is sent to the server. The server continues to hash the second message digest, generate PUF responses, and compare the result to the initially stored responses. The number of hashes necessary to achieve a match is the session key.
METHOD AND APPARATUS FOR MANAGING NON-FUNGIBLE TOKEN FOR DIGITAL CONTENT
An electronic device and method are disclosed for managing a non-fungible token (NFT). The electronic device includes: a memory configured to store computer-executable instructions, and a processor. The processor implements the method, including: generating, a NFT for target content in response to receiving a request to register the target content from a first external electronic device, generating, for the NFT, a certification authority (CA) signature indicating that the NFT is generated by the server, and transmitting, via a communication circuitry, the NFT to the first external electronic device, wherein an ownership signature is added to the NFT, together with the CA signature, the ownership signature based on a private key of a user to which ownership of the NFT is assigned.
Tokenizing scarce goods with provenance history bound to biological fingerprints
Techniques for enabling the creation of a digital asset representation of physical goods (e.g., luxury items) produced in limited quantities or heirloom-goods associated with restricted ownership rules. Anti-counterfeiting mechanisms are proposed for both classes of goods. The provenance of both classes of goods is traced using cryptography and decentralized ledger technology. For example, mechanisms to restrict ownership of heirloom-goods are proposed based on the combination of the DNA biological fingerprint of the patron who originated the goods and smart contract technology. The goods can be represented as digital tokens on the blockchain, binding manufacturing evidence to the token. For heirloom-goods that have restricted ownership rules, persons seeking to acquire the good via the digital token and smart contract are required to prove that they satisfy the entitlement rules based on a biological relationship to the patron.
ACCESS CONTROL FOR UPDATING DOCUMENTS IN A DIGITAL DOCUMENT REPOSITORY
A device configured to identify a first digital document in a digital document repository, to identify a first graphical code that represents the first digital document, and to send the first graphical code to an approved user device. The device is further configured to obtain a second graphical code that represents a public encryption key for the organization and to extract the public encryption key for an organization from the second graphical code. The device is further configured to obtain a third graphical code from the approved user device. The third graphical code represents a second digital document comprising data and a digital signature that was signed using a private encryption key for the organization. The device is further configured to determine the third graphical code passes validation using the public encryption key for the organization and to store the second digital document in a digital document repository.
Methods and systems for utilizing hardware-secured receptacle devices
A system for using hardware-secured receptacle devices includes a transfer processing device configured to store transfer method data associated with user on at least a cryptographically secured receptacle device, receive user authentication credentials from a user, authenticate user identity as a function of the user authentication credentials, retrieve a transfer authorization from the at least a cryptographically secured receptacle device as a function of the transfer method data, generate a transfer as a function of the transfer authorization.
DIGITAL DOCUMENT REPOSITORY ACCESS CONTROL USING ENCODED GRAPHICAL CODES
A device configured to obtain a first graphical code that represents a public encryption key for an organization and to extract the public encryption key for the organization from the first graphical code. The device is further configured to obtain a second graphical code that represents a digital document comprising data and a digital signature that was signed using a private encryption key for the organization. The device is further configured to extract the digital document from the second graphical code and to validate the second graphical code using the public encryption key for the organization. The device is further configured to determine the second graphical code passes validation using the public encryption key for the organization and to store the digital document in a digital document repository.
Secure transfer of service identity for information handling systems
Systems and procedures are provided for transferring a service identifier for use by an IHS (Information Handling System), where technical support is provided to the IHS based on the service identifier. During factory provisioning of the IHS, a signed inventory certificate is uploaded to the IHS that includes an inventory identifying factory installed components of the IHS. Upon deployment of the IHS, a hardware component is removed, where the service identifier of the IHS is associated to the removed component. Upon installing a replacement hardware component, a request is initiated to transfer the association of the service identifier from the removed hardware component to the replacement hardware component. In response to the request to transfer the service identifier, an updated inventory certificate is generated that associates the service identifier to the replacement hardware component, wherein the replacement inventory certificate maintains the inventory of factory installed hardware components of the IHS.