Patent classifications
H04L63/12
Generating Recovered Data in a Storage Network
A storage network operates by: issuing a read threshold number of read slice requests to storage units of a set of storage units, where the read threshold number of read slice requests identifies a read threshold number of encoded slices of a set of encoded slices corresponding to a data segment; when one or more other encoded data slices of the read threshold number of encoded slices is not received within a time threshold, facilitating receiving a decode threshold number of encoded slices of the set of encoded slices; decoding the decode threshold number of encoded slices to produce recovered encoded data slices, wherein a number of the recovered encoded data slices corresponds to the read threshold number minus a number of the encoded slices received within the time threshold; and outputting the recovered encoded data slices and the encoded slices of the read threshold number of encoded slices received within the time threshold.
BLOCKCHAIN DATA SEARCH METHOD
A blockchain data search method is proposed, the method including receiving a search term for identifying a block from a user terminal, and selecting a blockchain network to be searched from among multiple blockchain networks; accessing the selected blockchain network to enter the search term and thus searching the selected blockchain network for a block corresponding to the search term; receiving data stored in the searched block from the selected blockchain network; and transmitting the received data to the user terminal.
SERVICE COMMUNICATION METHOD, SYSTEM, APPARATUS, ELECTRONIC DEVICE, AND STORAGE MEDIUM
A service communication method, system, apparatus, electronic device, computer-readable storage medium, and computer program product; the method includes: receiving an authentication request sent by a service access process, performing synchronous verification processing on the service access process, and performing asynchronous verification processing on the service access process; determining service key information allocated for the service access process according to a synchronous verification processing result of the service access process, sending the service key information to the service access process to perform encrypted service communication with the service access process based on the service key information, and controlling a communication connection used for bearing the encrypted service communication with the service access process according to an asynchronous verification processing result of the service access process.
PRIVACY PRESERVING AUDITABLE ACCOUNTS
An approach for privacy-preserving auditable accounts on blockchain networks. The approach may include encoding tokens associated with a blockchain network. The encoding may include data relating to the current epoch, where an epoch is a specific time range. The tokens may be received from a user for inspection by an auditing entity. The approach may include performing an audit check on the encoded tokens. If the audit check succeeds, the auditing entity may submit an audit transaction verifying the tokens were generated in the current epoch and making the tokens auditable for the next epoch.
Systems and Methods for Using a Non-Fungible Digital Asset to Facilitate Accessing an Access-Restricted Resource
An exemplary method includes an access management system receiving a signed message that is associated with a non-fungible digital asset and that includes a non-fungible digital asset identifier and a nonce. The non-fungible digital asset may be configured to provide access to an access-restricted resource. Based on the non-fungible digital asset identifier included in the signed message, the access management system may access a distributed record that is configured to store ownership information associated with the non-fungible digital asset. Based on the signed message and the ownership information stored in the distributed record, the access management system may verify that a user of the non-fungible digital asset is authorized to access the access-restricted resource.
Method and system for managing content of digital brand assets on the internet
A digital brand asset system is provided enabling a brand owner to create, distribute, maintain, manage, merchandise and analyze smart brand assets. The system enables distribution and sharing of smart brand assets across the websites. The websites can host webpages containing codes representing the smart brand assets. When a user device retrieves a webpage from one of the websites and renders the webpage, it executes the codes and requests the content of the smart brand assets from a brand asset server. Through the brand asset server, a brand owner can control the content and the presentation of the smart brand asset hosted by the websites. The system further enables the brand partners to adjust the content of the smart brand assets based on their needs.
Methods and systems for PKI-based authentication
Methods, systems, and devices are provided for authenticating API messages using PKI-based authentication techniques. A client system can generate a private/public key pair associated with the client system and sign an API message using the private key of the private/public key pair and a PKI-based cryptographic algorithm, before sending the signed API message to a server system. The server system (e.g., operated by a service provider) can authenticate the incoming signed API message using a proxy authenticator located in less trusted zone (e.g., a perimeter network) of the server system. In particular, the proxy authenticator can be configured to verify the signature of the signed API message using the public key corresponding to the private key and the same cryptographic algorithm. The authenticated API message can then be forwarded to a more trusted zone (e.g., an internal network) of the server system for further processing.
Methods and systems for executing smart contracts in secure environments
Method for the secure execution of programs (smart contracts) implemented between a first wallet node (WN) (WN1) and a second wallet node (WN2), at least the second WN being implemented in an enclave of a processor, and the WNs being capable of executing programs designated in the messages that reach them, the method comprising the following steps: a) sending by WN1 to WN2 of a pre-message; b1) in response to this pre-message, execution in the enclave of a first program (WNRoT); b2) generation by the enclave of a certificate of authenticity of said first program and of the integrity of its execution; b3) sending said certificate to WN1; c) verification by WN1 of said certificate; d) in the event of successful verification, sending by WN1 to WN2 of a message intended to trigger the execution of a given program in WN2, and e) execution of said program in WN2.
Adjusting efficiency of storing data in a storage network
A method for execution by a computing device to adjust data storage efficiency of data in a storage network includes determining an estimated overwrite frequency for a data segment for storage in memory of the storage network. The method continues by determining a storage approach for the data segment based on the estimated overwrite frequency. The method continues by processing the data segment based on the storage approach to produce a processed data segment. The method continues by error encoding the processed data segment to produce a set of encoded data slices, where a decode threshold number of encoded data slices is needed to recover the processed data segment. The method continues by storing the set of encoded data slices in the memory of the storage network.
VERIFYING, MONITORING, AND TOKENIZING DIGITAL ASSETS AS PROOF OF OWNERSHIP AND VALUATION OF THE DIGITAL ASSETS
One embodiment provides a method comprising verifying a digital asset to determine ownership, provenance, and lineage of the digital asset. The verifying includes blockchain forensic analysis and triangulation of one or more electronic devices involved in one or more blockchain transactions relating to the digital asset. The method further comprises computing a confidence score corresponding to the digital asset. The confidence score is a measurement derived from the verifying. The method further comprises maintaining a record of the digital asset in an electronic registry. The record includes the confidence score and is indicative of the ownership, the provenance, and the lineage of the digital asset. The method further comprises monitoring one or more changes to the ownership, the provenance, and the lineage of the digital asset, and updating the record including the confidence score in response to the one or more changes.