Patent classifications
H04L63/12
SYSTEM AND METHOD TO MANAGE LARGE DATA IN BLOCKCHAIN
A computer implemented method for managing large and sensitive data in a blockchain includes determining a master block store node from a plurality of block store nodes to add large and sensitive data to the blockchain after validation, and generating a block including the large and sensitive data that is validated and its metadata. If the block store nodes, a plurality of block verifier nodes and a plurality of block backup nodes of the blockchain are in synchronization, the method adds, using the master block store node, the block to its chain and generates a synchronization request to the block store nodes, the block verifier nodes and the block backup nodes of the blockchain. Based on assigned roles, the method performs enabling the block store nodes to store the block, enabling the block verifier nodes to store only the metadata, and enabling the block backup nodes to store the block.
Network access point
A computer implemented method of a network access point for secure network access by a mobile computing device, the mobile device being associated with the access point by a digitally signed record in a blockchain wherein the blockchain is accessible via a network and includes a plurality of records validated by miner computing components, the method including receiving a request from another network access point to associate the mobile device with the other access point, the request having associated identification information for the mobile device; responsive to a verification of an entitlement of the mobile device to access the network, generating a new record for storage in the blockchain, the new record associating the mobile device with the other access point and being validated by the miner components such that the other access point provides access to the network for the mobile device based on the validation of the new record.
Secure, immutable and verifiable interview records
A method of creating an immutable digital record of a video conference conducted over the Internet and involving two or more parties is provided. The method comprises: routing conference data through one or more servers; identifying data streams of the conference data, including video and audio streams uploaded by respective parties; separately processing the audio streams to convert speech data to text data thereby providing a text record for each party; storing the data streams and the text records at said server or servers, or at a storage medium associated with server or servers; and generating a hash value across the data streams and the text records and saving the hash value to a Blockchain ledger.
Federated identity management with decentralized computing platforms
Provided is a process that establishes user identities within a decentralized data store, like a blockchain. A user's mobile device may establish credential values within a trusted execution environment of the mobile device. Representations of those credentials may be generated on the mobile device and transmitted for storage in association with an identity of the user established on the blockchain. Similarly, one or more key-pairs may be generated or otherwise used by the mobile device for signatures and signature verification. Private keys may remain resident on the device (or known and input by the user) while corresponding public keys may be stored in associated with the user identity on the blockchain. A private key is used to sign representations of credentials and other values as a proof of knowledge of the private key and credential values for authentication of the user to the user identity on the blockchain.
Peer node recovery via approximate hash verification
An example operation may include one or more of receiving, from a blockchain peer node, a sequence of blocks stored in a hash-linked chain of blocks on a distributed ledger, where each block in the sequence of blocks includes a reduced-step hash of block content from a previous block in the sequence, performing an approximate hash verification on the reduced-step hashes stored among the sequence of blocks, and determining whether the sequence of blocks has been tampered with based on the approximate hash verification on the reduced-step hashes.
Method and system for heterogeneous blockchain service management
A system and method for enabling users to operate multiple blockchain (or distributed ledger) nodes efficiently, at a much lower cost, etc. For example, when one blockchain starts to take up resources, the system can automatically adjust by looking at the application container layer to see if it is possible to shift resources. It can also shift resources at the server layer to adjust for computation and memory resources to, for example, increase efficiency. It may also share storage for nodes that share the same blockchain to, for example, increase efficiency. The system can also identify tokens that are more efficient to stake, and to shift tokens from one blockchain to another for staking reward efficiencies, etc. It may also deploy one node to another geographic region to increase decentralization, as well as adjust rewards and commissions to provide incentives to boost decentralization as well.
Distributed ledger-based ad-hoc system, apparatus and method using fingerprint verification
A system, method and apparatus for routing traffic in ad-hoc networks. A routing blockchain network processes routing node information proposals received from manager nodes of network clusters. Performance metrics, including content integrity metrics, of one or more nodes in the system are validated using distributed ledger techniques and provided to the manager nodes as updates to each manager node's routing information. The manager nodes further determine routing paths for ad-hoc communication requests based on an authentication record that defines conditions necessary to route traffic streams in association with a particular resource or destination, one of the conditions comprising a minimum content integrity metric. Data may be transmitted in data segments, each data segment associated with a particular original fingerprint. The data segments and associated fingerprints are provided to routing nodes and, ultimately, to a destination node. One or more of the nodes in the routing path performs verification of the integrity of the data segments comparing locally-generated fingerprints to original fingerprints generated by a source node. Fingerprint information may be stored by a fingerprint blockchain network for accountability and tracking purposes.
FILE STORAGE METHOD, TERMINAL, AND STORAGE MEDIUM
Embodiments of the present disclosure disclose a file storage method, terminal, and storage medium. The file storage method includes: obtaining a to-be-stored file, performing splitting processing on the to-be-stored file to obtain N sub-files corresponding to the to-be-stored file, wherein N is an integer greater than or equal to 1; sending the N sub-files to an IPFS, and receiving M pieces of address information corresponding to the N sub-files returned by the IPFS, wherein M is an integer greater than or equal to 1 and less than or equal to N; generating an address set corresponding to the to-be-stored file according to the M pieces of address information, and encrypting the address set to obtain an address set ciphertext; sending the address set ciphertext to a blockchain network and receiving a target index value returned by the blockchain network, wherein the target index value is used to identify the address set ciphertext.
REDACTABLE BLOCKCHAIN
A method for redacting a private blockchain comprises applying a hash function to a prefix and new content to compute a hash for a block of the blockchain; performing a modulo operation to convert the hash to an integer modulo; determining an inverse of the integer modulo; computing a redactable suffix from the prefix and the inverse of the integer modulo; replacing current content of the blockchain with the new content; and applying the redactable suffix to the block having the new content.
Zero-Trust Enabled Workload Access for User Equipment
The present disclosure relates to systems and methods for cloud-based 5G security network architectures intelligent steering, workload isolation, identity, and secure edge steering. Specifically, various approaches are described to integrate cloud-based security services into Multiaccess Edge Compute servers (MECs). That is, existing cloud-based security services are in line between a UE and the Internet. The present disclosure includes integrating the cloud-based security services and associated cloud-based system within service provider's MECs. In this manner, a cloud-based security service can be integrated with a service provider's 5G network or a 5G network privately operated by the customer. For example, nodes in a cloud-based system can be collocated within a service provider's network, to provide security functions to 5G users or connected by peering from the cloud-based security service into the 5G service provider's regional communications centers.