Patent classifications
H04L9/50
Method to Implement Traceability and Provability in Software Development
A method to implement traceability and provability on a particular project in software development based on blockchain-recorded transactions of assigned developer time, the method comprising of the following steps: setting up a blockchain network comprised of a distributed, redundant, and tamper-resistant ledger; issuing each user an attestable pre-fabricated and signed virtualized environment on approved hardware that comes with functionality required for the user's role implemented as one of a set of virtual machine templates fashioned from a signed and approved pre-fabricated image; and verifying that assigned developer time is valid, and if so, record each development action on the ledger to enable extensive tracking and auditing of end- to-end software development process.
SPLITTABLE BLOCKCHAIN BASED OWNERSHIP VERIFICATION
A method may include splitting an original token into a first sub-token and a second sub-token, generating a first hash value of the first sub-token and a first randomness value, and generating a second hash value of the second sub-token and a second randomness value. The method may also include evaluating an NIZKP regarding the split, and sampling first and second signature keys and verification keys associated with the first and second sub-tokens, respectively. The method may additionally include generating first and second signed values of concatenations of the first and second hash values and the first and second verification keys, respectively, and signed using an initial signature key of a current owner of the original token. The method may additionally include sending the NIZKP, the first and second hash values, the first and second signed values, and the first and second verification keys to the blockchain.
TRANSPORT ONBOARD SECURITY CHECK
An example operation includes one or more of saving a hash of data including occupant data and transport data on a transport in response to the transport is started, performing a security check that validates the hash of data against the data in response to the transport is started, and providing a resolution when the security check fails.
LEDGER-BASED VERIFIABLE CODE EXECUTION
A system includes a ledger on which a task giver may register a task. The task may include executable code. A task solver may accept the task and execute the code to produce a solver output that is recorded on the ledger. Verifiers may provide competing verifier outputs which may also be recorded on the ledger. The solver and verifiers may compare their outputs to determine if there is agreement. Agreement may signify consistent and accurate execution of the code. Disagreement may indicate the presence of errors. In some cases, the solver and verifiers may compete in a contention-based protocol where a solver may assert control of tokens where the solver identifies an error in verifier execution. Additionally or alternatively, a verifier may assert control of tokens where the verifier identifies an error in solver execution.
ELECTRONIC DRAWING SYSTEM AND METHOD
A computer-implemented method of operating an electronic draw system, the method comprising: obtaining a bit sequence in one or more blocks of one or more different blockchains; generating a seed value based on the bit sequence in the one or more blocks of the one or more different blockchains; applying a random number generator algorithm to calculate a sequence of random numbers using the seed value as input; and converting the sequence of random numbers to an electronic drawing output of the electronic draw system.
MULTI-MODAL SENSING BLOCKCHAINS USING FOWLER-NORDHEIM SENSOR DATA LOGGER
A sensor blockchain system is provided. The sensor blockchain system includes a plurality of sensor-data-loggers, wherein each sensor-data-logger includes a memory device which utilizes FN tunneling. An input to the sensing interface alters the geometry of the energy barrier to change the electron leakage rate and the current state of the sensor-data logger is determined by an initial state of the sensor-data-logger, the predetermined electron leakage rate, and any inputs to the sensing interface. The sensor-data-loggers may be synchronized to an initial state. The synchronization will be maintained when they are all subjected to similar changes in environmental conditions in a supply chain. Desynchronization will occur due to changes in environment, including changes in temperature.
METHOD AND SYSTEM FOR RECORDING FORWARD ROYALTIES USING A DISTRIBUTED LEDGER
To manage property records using a multi-layered hybrid distributed ledger architecture, identification information for a particular property is obtained and transmitted to at least one participant in a public distributed ledger network for a public distributed ledger layer. Ownership information for the same particular property is obtained and transmitted to at least one participant in a federated distributed ledger network for a federated distributed ledger layer. Transaction-related documents for the same particular property are obtained and transmitted to at least one participant in a private distributed ledger network for a private distributed ledger. The distributed ledger layers are different layers of a property distributed ledger each having a separate set of consensus rules for appending distributed ledger data to the respective layer. This allows for the immutable preservation of royalty terms and conditions for a property or asset using the distributed ledger.
SECURE MANAGEMENT OF TRANSFERS OF DIGITAL ASSETS BETWEEN COMPUTING DEVICES USING PERMISSIONED DISTRIBUTED LEDGERS
The disclosed exemplary embodiments include computer-implemented systems, devices, and processes that securely manage transfers of digital assets between computing devices using permissioned distributed ledgers. By way of example, an apparatus may receive, from a first device, a request to transfer a digital asset to a second device and a first digital signature applied to the request. Based on a validation of the first digital signature, the apparatus may approve the request and apply a second digital signature to the request and the first digital signature indicative of the approval of the request by the apparatus. The apparatus may also transmit the request, the first digital signature, and the second digital signature to a computing system, which may validate the first and second digital signatures and perform operations that record the first public key and asset data identifying the digital asset within at least one element of a distributed ledger.
METHODS AND SYSTEMS FOR TRACKING AND RECOVERING ASSETS STOLEN ON DISTRIBUTED LEDGER-BASED NETWORKS
The instant disclosure illustrates how the privacy and security of activities occurring on distributed ledger-based networks (DLNs) can be enhanced with the use of zero-knowledge proofs (ZKPs) that can be used to verify the validity of at least some aspects of the activities without private information related to the activities necessarily being revealed publicly. Methods and systems that are directed at facilitating the tracking and recovery of assets stolen on ZKP-enabled DLNs while preserving the confidentiality of the tokens are presented herein.
ISSUING VERIFIABLE PAIRWISE CLAIMS
Generating a verifiable pairwise claim. Receiving a request for issuing a verifiable claim that is associated with a subject entity and is verifiable by one or more verifying entities. The request includes at least an encrypted portion using a particular type of encryptography. Verifying that the subject entity is associated with a subject of the verifiable claim based on decrypting the encrypted portion using the particular type of cryptography. In response to verifying that the subject entity is associated with the subject of the verifiable claim, issuing the verifiable claim that is structured to be verifiable only by the one or more verifying entities.