Patent classifications
H04L63/12
System and Method of Providing Physically Authenticated Digital Tracking and Association for Objects and Products
A method and system comprising; a physical medium having a first unique identifier and a second unique identifier stored within; where said physical medium is in communication with a first distributed ledger having said first unique identifier associated with said second unique identifier stored within; where said distributed ledger is operatively connected with a first comparison algorithm providing; physical authentication of data associated with additional data elements; further provides mathematical coupling to further additional data which allows for novel visibility and management, including reducing inefficiencies and errors, within physical systems, for example product supply chains, without the need to fully replace current supply chain management systems.
SMART CONTRACT SYSTEM USING ARTIFICIAL INTELLIGENCE
The invention is integrated heterogenous smart contracts using artificial intelligence and associated methodologies for transactions on blockchains. Embodiments of the invention are comprised of three elements. First, a user provides data through an online interface. Second, an artificial intelligence computer program processes the data to automatically preprocess and store the data in a centralized database. Third, a second artificial intelligence program interacts between the database and a blockchain to control smart contract processing.
METHODS AND SYSTEMS TO IDENTIFY A COMPROMISED DEVICE THROUGH ACTIVE TESTING
Methods and devices for determining whether a mobile device has been compromised. File tree structure information for the mobile device is obtained that details at least a portion of a tree-based structure of folders and files in a portion of memory. The file tree structure information is analyzed to determine that the mobile device has been compromised, has not been compromised, or might be compromised. Based on determining that the mobile device might be compromised, the mobile device is instructed to execute a restricted action. If the restricted action occurs on the mobile device then it is determined that the mobile device has been compromised. Based on that determination, an action is taken.
QUORUM-BASED AUTHORIZATION
A framework for managing authorization for performance of actions with a computing system. For example, techniques for performing authorization of users and/or clients for access to an infrastructure service provided by a cloud servicer provider (CSP) and/or for performance of actions with the infrastructure service.
INTELLIGENT REAL TIME DYNAMIC SMART CONTRACT GENERATION FOR SECURE PROCESSING OF INTERNET OF THINGS (IOT) DEVICE BASED EVENTS
Aspects of the disclosure relate to computing hardware and software for IoT event processing. A computing platform may monitor communication between an initiating IoT device and a service provider IoT device to detect an event processing request. The computing platform may extract, from the event processing request, event features. The computing platform may feed the event features into a deep learning engine, which may produce a smart contract corresponding to the event processing request. The computing platform may identify, using a distributed ledger, whether the event features comply with the smart contract. Based on identifying that the event features do comply with the smart contract, the computing platform may send, to an event processing system, authorization to process the event processing request, which may cause the event processing system to transfer funds from an initiating user to the service provider.
Creating secure data in an oil and gas supply chain
The present invention generally relates to a system and method creating secure data in a gas and oil supply chain. The system creates secure data related to oil and gas assets while traversing an oil and gas supply chain. At least one repository system(s), which collects secure data generated by capturing information using a secure observer device, sends the secure data to a gateway which is a part of a global management system or an integrity management system to create clustered events. The disclosure also relates to a system and method for managing and controlling data between entities in an oil and gas asset supply chain, and in particular to an excise tax management system and method to identify and reconcile tax filings, production volumes and operational reports.
Rule-based network-threat detection
A packet-filtering device may receive packet-filtering rules configured to cause the packet-filtering device to identify packets corresponding to network-threat indicators. The packet-filtering device may receive packets and, for each packet, may determine that the packet corresponds to criteria specified by a packet-filtering rule. The criteria may correspond to one or more of the network-threat indicators. The packet-filtering device may apply an operator specified by the packet-filtering rule. The operator may be configured to cause the packet-filtering device to either prevent the packet from continuing toward its destination or allow the packet to continue toward its destination. The packet-filtering device may generate a log entry comprising information from the packet-filtering rule that identifies the one or more network-threat indicators and indicating whether the packet-filtering device prevented the packet from continuing toward its destination or allowed the packet to continue toward its destination.
Digital property authentication and management system
Systems and methods for digital property authentication and management are disclosed. A document representing a trade secret may be requested to be registered with a trade secret registry. A document obfuscation value corresponding to the document may be generated and may be registered with a blockchain. A record of the registration may be generated for the trade secret registry. The registry may be searchable and/or offer functionality such as valuation, insurance provision, and/or verification, among other benefits and functionalities.
Cascading family of blockchains
A system, method, and computer-readable storage medium is provided for creating first and second blockchain instances, each comprising representative blocks corresponding to steps in first and second multistep processes, respectively; performing a linking operation to link a block in the first blockchain instance to a block in the second blockchain instance; receiving change evidence data pertaining to steps in one of the first and second multi-step processes; and performing an update operation comprising updating one of the first and second blockchain instances based on said change evidence data.
Customized view of restricted information recorded into a blockchain
Systems, methods, and software are disclosed herein to generate a customized view of a blockchain transaction. A blockchain of block entries is maintained in a distributed network of nodes. The block entries each comprise a plurality of data portions and data access guidelines are received which govern access by a user to one or more of the data portions. A request to view one or more data portions of a block entry is received from the user. The data access guidelines for the user are applied to the request and the one or more data portions that are accessible by the request according to the data access guidelines are identified. A customized view of the block entry is generated which includes the one or more data portions determined to be accessible by the request.