Patent classifications
H04L63/12
SECURE ENROLMENT OF SECURITY DEVICE FOR COMMUNICATION WITH SECURITY SERVER
Provided is novel technology for secure security data transmission and more particularly for registering network-enabled security devices such as IP cameras to a security server over a public network such as to a cloud-based security service. An enrolment server is provided that is logged into using a computing device to request and receive an activation code for the security device. The activation code is then provided to the security device, e.g. directly by the computing device. The Security device authenticates itself based on the activation code and in one example provides a public key that will be used to verify its registration. Data transmissions by the device are secured in part on the basis of its registration.
Distributed Consent Protecting Data Across Systems And Services
Non-limiting examples of the present disclosure relate to generation and implementation of a new security protocol that is used to secure common data access transactions across distributed network examples. An exemplary proof of verification protocol is disclosed that implements consensus security mechanisms across a plurality of distributed nodes, which may be utilized to validate owners of data in common data access transactions. Extending principles of blockchain security to common data access transactions and Internet of Things (IoT) networking requires a solution that: improves speed in transactional processing; reduces computational complexity; and presents efficient, secure and repeatable validation for owners of data in distributed networking environments. An exemplary proof of verification protocol provides such technical advantages by validating both user-specific data for a subscriber of an application/service and session data for user activity (past and present) within the application/service.
SECURE AND ROBUST DECENTRALIZED LEDGER BASED DATA MANAGEMENT
Systems and methods providing access control and data privacy/security with decentralized ledger technology are disclosed. To ensure data privacy the decryption or access to data by a non-data owner requires joint orchestration of decentralized system nodes to provide partial decryption components with n-of-x required to fulfill request. Data can be encrypted, and access control policy can be decided including required number of key fragments to fulfill decryption. Access control policies can be stored in the decentralized ledger based system. Key information can be stored in the system in a decentralized manner with partial key fragments encrypted and split among system nodes. An access request can be sent to the system to fetch a data file, without disclosing the requester's identity in the system. The decentralized ledger based system can verify a legitimate request to access the data and denies access to malicious or faulty participants.
Methods and systems for universal storage and access to user-owned credentials for trans-institutional digital authentication
Described is an approach for an improved method, system, and computer program product that performs zero-knowledge proof of knowledge of user identification and/or authentication for a decentralized, trustless storage and management of user identification and/or authentication using one or more distributed ledger systems.
Systems and methods for encrypted vehicle data service exchanges
Encrypted vehicle data service exchanges are provided. In one embodiment, a vehicle communication manager comprises memory storing an embedded public key (EPK) for a data service; a processor executing a vehicle data service protocol to initiate a session with the data service. The protocol causes the processor to: transmit a session request to the data service and receive a session reply, the reply indicates if the manager is authorized for encrypted service, the processor validates authenticity of the session reply using the EPK; determine whether to enable message encryption, and transmit an initialization request indicating whether encryption is elected; generate a key derivation key (KDK) and transmit the KDK to the data service; receive an initiation response confirming whether message encryption is elected; and when elected generate at least one Message Encryption Key (MEK) from the KDK; encrypt data service uplink and downlink messages using the at least one MEK.
Task completion using a blockchain network
Methods, systems, and computer readable media for distributing tasks using a blockchain network. A method includes generating a task for completion via an interactive application and distributing, using the blockchain network, the task via a block in a blockchain associated with the blockchain network. The blockchain network includes a plurality of nodes and is accessible by a plurality of client devices associated with the interactive application. The method further includes receiving, from one or more of the client devices, data associated with results of processing the task via the interactive application and validating completion of the task based on the received data. Validating completion of the task may include receiving a set of user inputs from a set of the client devices, respectively, as to whether the task was completed and making a consensus determination as to whether the task was completed based on the received set of user inputs.
Systems and methods for trigger based synchronized updates in a distributed records environment
A computerized system and method may include, in response to receiving a blockchain via a communications network that includes information associated with an event, parsing, by a blockchain parsing engine being executed by a blockchain node, the information to identify a status state of an item related to the event. The blockchain may be inclusive of the information along with the status state of the item may be stored in a storage unit. An event tracking engine may determine from the parsed information that the status state of the item transitioned from a first state to a second state. Responsive to the event tracking engine determining that a qualifying state is satisfied by the item being in the second state, automatically executing, by the blockchain node, a smart code inclusive of initiating communications between a first party and a second party.
System and method for blockchain based decentralized storage with dynamic data operations
This disclosure relates generally to decentralized storage and more particularly to method and system for blockchain based decentralized storage with dynamic data operations. Conventional decentralized storage are limited in capacity thereof to enable dynamic data operations on the sectors stored at them. In an embodiment, the disclosed method and system enabled dynamic data operations such as modification, insertion, and deletion on the stored sectors by leveraging blockchain to achieve publicly verifiable fully stateless Provable Data Possession. Moreover, the disclosed system enables data integrity in decentralized storage with dynamic operations using scheme based on Merkle hash tree and blockchain to provide a transparent verification framework with high detection probability of malicious hosts.
Method and System for Remote Data Access
A system and method for securely storing, retrieving and sharing data using PCs and mobile devices and for controlling and tracking the movement of data to and from a variety of computing and storage devices.
Method and System for IoT Code and Configuration using Smart Contracts
Method and Systems for configuring, monitoring, updating and validating Internet of Things (IoT) software code and configuration using blockchain smart contract technology. The use of smart contracts for delivering software code and or configuration scripts to IoT devices is an enhanced cybersecurity solution meant to ensure the security and integrity of IoT devices. The use of smart contracts is also shown how it can be used for verifying the integrity of the IoT devices software code and or configuration is a proactive method of cybersecurity. The proactive cybersecurity method will prevent man in the middle attacks as well as preventing rogue devices from impacting other IoT devices or networks.