H04L63/04

SYSTEMS AND METHODS FOR ENSURING CORRECT EXECUTION OF COMPUTER PROGRAM USING A MEDIATOR COMPUTER SYSTEM

In a distributed system, a first computer system may require computationally verifiable assurances of the authenticity and integrity of computations (e.g., performed as part of the execution of a program) performed by a second computer system. Methods described herein may be utilized to enforce and/or ensure the correct execution of a program. The first computer system may delegate execution of a program to a second computer system and a protocol may be employed to constrain the second computer system to perform a correct execution of the program. The protocol may include mitigation and correction routines that mitigate and/or correct the incorrect execution of a program. In various systems and methods described herein, the protocol may utilize a blockchain network such as a Bitcoin-based blockchain network.

Communication apparatus and communication method

In a communication apparatus on a network where communication apparatuses perform direct communication with each other, a network management apparatus for managing the network based on message information transmitted and received on the network is determined. When the communication apparatus itself is determined as the network management apparatus, the apparatus collects information indicating device capabilities from other communication apparatuses. On the other hand, the communication apparatus receives information indicating device capabilities from another communication apparatus when the other communication apparatus is determined as the network management apparatus.

INFORMATION PROCESSING APPARATUS, INFORMATION PROCESSING METHOD, AND PROGRAM

According to an embodiment, an information processing apparatus comprises a first interface, a second interface, a third interface, and a processor. The first interface acquires a character string image that includes a character string. The second interface transmits and receives data to and from an internal device through a first network. The third interface transmits and receives data to and from an external device through a second network. The processor transmits, if the character string image includes personal information, the character string image to the internal device through the second interface and receive an input of the character string from the internal device and transmits, if the character string image does not include the personal information, the character string image to the external device through the third interface and receive an input of the character string from the external device.

MASKING PRIVATE INFORMATION WHILE STREAMING A LIVE SESSION
20230216835 · 2023-07-06 ·

Aspects of the present disclosure involve a system comprising a computer-readable storage medium storing a program and method for streaming a live session. The program and method provide for receiving, from a first device of a first user, indication of first user input provided by the first user with respect to a first data input field of plural data input fields included in a displayed page; determining whether the first user input corresponds to personally identifiable information; causing, when the first user input does not correspond to personally identifiable information, a second device associated with a second user to display the plural data input fields and to display the first user input; and causing, when the first user input corresponds to personally identifiable information, the second device to display the plural data input fields and to mask display of the first user input.

METHODS, APPARATUSES, AND COMPUTER-READABLE STORAGE MEDIA FOR SECURE END-TO-END GROUP MESSAGING AMONG DEVICES USING DYNAMIC GROUPING
20230216832 · 2023-07-06 ·

An end-to-end group messaging method or apparatus organizes a plurality of local groups of members into local-group (LG) trees and a public-group (PG) tree. Each tree has a plurality of nodes including a root node connecting to a plurality of leaf nodes. Each LG tree corresponds to a local group. Each member of a local group is associated with a leaf node of the corresponding LG tree. Each LG tree is associated with a leaf node of the PG tree. Members of a same local group may establish communication therebetween by using a group key associated with the root node of the LG tree of the local group. Members of all local groups may establish communication therebetween by using a group key associated with the root node of the PG tree.

Electronic distribution method, apparatus and system
11696123 · 2023-07-04 · ·

The present disclosure discloses an electronic distribution method and apparatus. The method includes: acquiring user information and first terminal information of a distribution terminal which are transmitted by a server; generating a first key and transmitting the first key to the server; acquiring second terminal information which is encrypted by the distribution terminal using the first key received from the server and is transmitted by the distribution terminal; decrypting the second terminal information encrypted by using the first key to obtain the second terminal information; matching the second terminal information with the first terminal information; and displaying the user information if the second terminal information matches the first terminal information.

Transaction certification management system, transaction certification management apparatus, and transaction certification processing method
11694202 · 2023-07-04 · ·

In general, according to one embodiment, a transaction certification system includes a transaction processing apparatus and a server. The transaction processing apparatus outputs encrypted data including transaction certification data for certification of a transaction executed on the transaction processing apparatus. The server receives the encrypted data from a first terminal apparatus that reads the encrypted data that has been output by the transaction processing apparatus. The server acquires a first user identifier identifying a user of the first terminal apparatus sending the encrypted data. The server stores the transaction certification data of the encrypted data in a storage device. The transaction certification data is stored in correlation with the acquired user identifier. The server receives a second user identifier from a user requesting a transaction certification, and then transmits the transaction certification data to a second terminal apparatus associated with the second user identifier.

Systems and methods for ensuring correct execution of computer program using a mediator computer system

In a distributed system, a first computer system may require computationally verifiable assurances of the authenticity and integrity of computations (e.g., performed as part of the execution of a program) performed by a second computer system. Methods described herein may be utilized to enforce and/or ensure the correct execution of a program. The first computer system may delegate execution of a program to a second computer system and a protocol may be employed to constrain the second computer system to perform a correct execution of the program. The protocol may include mitigation and correction routines that mitigate and/or correct the incorrect execution of a program. In various systems and methods described herein, the protocol may utilize a blockchain network such as a Bitcoin-based blockchain network.

Methods and systems for secure DNS routing

Various arrangements for performing secure domain name system (DNS) routing are presented. A secure signature may be generated using an internet protocol (IP) address of an authorized device. An encoded character string may be generated that comprises the IP address. The domain name server may receive a request for an IP address mapped to the hostname. The hostname may be validated using the secure signature. The IP address of the authorized device may be decoded from the encoded character string at least partially in response to the hostname being validated by the domain name server. The IP address decoded from the encoded character string may be transmitted at least partially based on the hostname being validated and the request for the IP address.

Credential management for distributed services

Embodiments are directed to credential management for distributed services. A plurality of mesh agents for an overlay network may be provided such that the overlay network may be employed to provide a secure tunnel between a client and a resource server. If client request that requires user credentials is provided to a mesh agent associated with the resource server, credential instructions may be provided to the mesh agent and the credential instructions may be employed to determine credential information that enables access to the resource server. The mesh agent may be employed to communicate the client request and the credential information to the resource server; determining a response to the client request from the resource server; employing the mesh agent to receive a response to the client request from the resource server and forwarded to the client over the overlay network.