Patent classifications
H04L9/50
A SYSTEM AND A METHOD FOR PERFORMING ATOMIC SWAP TRANSACTIONS OF DIGITIAL RECORDS AMONG A PLURALITY OF DITRIBUTED DATABASES
The present invention relates to a system and a method for performing exchanges of digital data records among a plurality of distributed databases. More specifically, the present invention relates to a technology agnostic atomic swap system platform configured to perform atomic swap transactions of digital data records among a plurality of distributed ledger technology platforms.
MAPPING KEYS TO A BLOCKCHAIN OVERLAY NETWORK
A method of managing an overlay network overlaid on data-storage transactions of a blockchain, whereby data content of the overlay network is stored in payloads of the data-storage transactions and overlay-layer links are defined between the data-storage transactions. The method comprises identifying a graph structure of the overlay network, wherein nodes corresponds to different ones of the data-storage transactions and edges correspond to the links. Each node is associated with a respective first key for signing an input of a child data-storage transaction to authorise writing the child to the blockchain. The method further comprises using a child key derivation, CKD, function to determine a hierarchical set of second keys having the same graph structure as the overlay network, wherein the second keys enable an additional function other than signing inputs of the data-storage transactions.
ELECTRONIC VOTING SYSTEM AND ELECTRONIC VOTING METHOD
The present invention relates to an electronic voting system and an electronic voting method. The system for electronic voting includes an operation computer including at least one processor and a memory coupled to the processor, wherein the processor causes the system to: perform user authentication of voting participants who wish to participate in the online electronic voting; anonymize information of the voting participants whose the user authentication has been completed; give unique identification information to each of the voting participants who have completed anonymization process; and collect the voting information that the electronic voting has been conducted using the unique identification information given to the voting participants, and count the collected voting information as voting results.
WATERMARKING OF GENOMIC SEQUENCING DATA
Examples are described for dynamically applying a digital watermark to a file, such as a dataset of genomic sequencing data. In one example, a method of dynamically applying a watermark to at least a portion of a file includes generating, using a secret key, a first random seed, generating, using the first random seed, an ordered pseudorandom set of integers, generating, using entity information and timing information, a second random seed, selecting, using the second random seed, a subset of the ordered pseudorandom set of integers, and modifying data at data locations in the file corresponding to at least a portion of the identifiers included in the subset to generate a watermarked file. The method may further include performing a check to determine whether the watermark is present in a file using a sequence of watermark elements that are generated based on the secret key.
A METHOD FOR SYMMETRIC ASYNCHRONOUS GENERATIVE ENCRYPTION
Methods of data encryption using a mutating encryption key are disclosed. The methods generate an encryption key and utilize a codex to mutate or vary the encryption key value. The encryption key may be generated using a random number generator. The encryption key value in pre-mutation state, together with the codex, is used to generate the next valid value for the encryption key. Unencrypted message data may be used together with the codex to mutate the encryption key. A valid encryption key and the unencrypted or successfully deciphered message are thus required to mutate the encryption key to the next key post-mutation state at each end.
INFORMATION PROCESSING METHOD, DEVICE, SYSTEM, AND COMPUTER-READABLE STORAGE MEDIUM
The present disclosure discloses an information processing method, device, system and computer-readable storage medium, and relates to the field of information technology. The information processing method includes: determining a second user associated with a first user from users corresponding to distribution tasks of a distributor, wherein a state of goods of the second user is Shipped; generating reconsignment information to be provided to the first user, wherein the reconsignment information comprises information of the first user and goods information of the second user; generating distribution task information to be provided to the first user in response to the first user acquiring the reconsignment information and sending a confirmation of the reconsignment information; and changing the state of goods of the second user in the distribution task of the distributor to Delivered after acquiring a confirmation of completion of reconsignment sent by the second user.
DATA MANAGEMENT SYSTEM
In a blockchain, contents of communication of electronic data are basically made public, and a malicious person can find system vulnerability of the blockchain. Leak of secret information or the like to an unintended third party through unauthorized access or the like by exploiting the vulnerability and cause is actually possible. Thus, it cannot be said that sufficient security measures are taken. In the present invention, a colony server stores partial data containing data of a predetermined size from a beginning of data to be managed received from a terminal, and a center server stores body data containing data of the predetermined size +1 and thereafter. Thus, the data to be managed is managed in a divided manner. Also, even if the body data is leaked from the colony server through unauthorized access or the like, the body data is merely part of the data to be managed, and has no value on its own. Thus, the present invention provides a system and the like for achieving robust security against unauthorized access.
DELEGATED OFF-CHAIN PAYMENTS USING CRYPTOCURRENCIES
A method for securing an interblockchain transaction includes receiving, from a first user application, a registration request including a first permissioned blockchain public key and a first permissionless blockchain public key. The method also includes performing, by the processing circuitry, receiving, from a second user application, a second registration request including a second permissioned blockchain public key and a second permissionless blockchain public key. The permissioned blockchain public keys are valid on the permissioned blockchain and the permissionless blockchain public keys are valid on the permissionless public blockchain. In addition, the method includes receiving, from the first user application, a transaction identification, the transaction identification identifying a first transfer transaction executed on the permissionless public blockchain. The transaction identification identifies the first and second permissionless blockchain public keys.
MAINTAINING CRYPTO TOKENS WITH IMPROVED BONDING CURVE
A computer-implemented method for maintaining crypto tokens of a first type. A smart contract from a distributed ledger defines a bonding curve being as a sequence of multiple curve segments. A creation or annul function of the smart contract may integrate a bonding curve starting from the current supply size to a new supply size to determine an amount of crypto tokens of a second type. The crypto tokens of the second type may be transferred to or from a pool associated with the smart contract, while crypto tokens of the first type may be transferred to a user or may be destroyed. The current supply size of first type tokens may be updated correspondingly.
CRYPTOCURRENCY TRANSACTIONAL SYSTEMS AND METHODS
A secure cryptocurrency transactional system for actuating transactions involving electronic gaming machines and cryptocurrency wallets.