Patent classifications
H04L63/12
Database storing authenticated skill-based attributes
An example operation may include one or more of receiving a request to store a skill-based attribute of a user at a database, temporarily storing the skill-based attribute and an identification of one or more storage nodes associated with the skill-based attribute in a temporary data structure of the database, determining whether a predetermined amount of the one or more storage nodes have authenticated the user as having the skill-based attribute, and, in response successful authentication of the skill-based attribute by the predetermined amount of storage nodes, transferring the authenticated skill-based attribute from the temporary data structure to a primary data structure of the database.
Distributed, crowdsourced internet of things (IoT) discovery and identification using Block Chain
Disclosed embodiments relate to distributed, crowd-sourced Internet of Things (IoT) discovery using Block Chain. In one example, a method includes scanning a network and generating a signature based on IoT device traits discovered, determining whether the signature is already in a verified or an unverified Block Chain, when the signature exists in the verified Block Chain, providing a verified entry including at least the IoT device type, otherwise, when the signature exists in the unverified Block Chain, providing an unverified entry including at least the IoT device type, incrementing a count, and promoting the unverified entry to the verified Block Chain when the count reaches a threshold, and otherwise, when the signature is in neither Block Chain, using the traits to guess the IoT device type, generating a new entry including the IoT device type, a location, and a timestamp, and storing the new entry in the unverified Block Chain.
Dynamic permission assignment and enforcement for transport process
An example operation may include one or more of receiving transport data of a multi-party transport process, identifying documents and events that are associated with the multi-party transport process based on the received transport data, dynamically determining read and write permissions for the documents and the events of the multi-party transport process based on predefined roles, and storing an identifier of the multi-party transport process and the dynamically determined read and write permissions in a block on a blockchain.
System and method employing virtual ledger with non-fungible token (NFT) generation
A system, method and computer program product for computer based open innovation, includes an asset valuation device receiving asset information regarding tangible or non-tangible assets, and generating a valuation signal, based thereon; a self-executing code device receiving the valuation signal, and generating a self-executing code signal, based thereon; an air router device having both low band radio, and internet router channels for redundant internet communications, and a malicious code removal device for scrubbing malicious code from data received, receiving the valuation signal, and generating a node voting request signal, based thereon; a mesh network having node devices receiving the node voting request signal, and generating vote confirmation signals, based thereon; and computing devices connected to each of the respective node devices, and configured to perform non-fungible token (NFT) generation based on the assets, including tracking respective ownership and valuation of the assets, based on the asset information.
Decentralized privacy-preserving rewards with cryptographic black box accumulators
A decentralized and trust-minimizing computer architecture for computing rewards for users of an advertising system includes cryptographic black box accumulators (BBA), which is a cryptographic counter that only the issuer can update. An attention application requests initialization of a BBA from a guardian and subsequently requests updates to the BBA to track interactions between a user of the attention application and ads on the attention application. The guardian signs updates to the BBA to reach agreement on the state of ad interactions. The attention application may randomize the BBA and submit requests via an anonymous channel such that no participant can link two encounters with the BBA to each other or link the BBA to a specific attention application, thus improving user privacy. Reward redemption requests can be made based on a known policy and committed to a public blockchain for verification by observers that the protocol is operating correctly.
Device vulnerability detection during device handshake
Described are implementations that analyze the unencrypted messages of a cryptographic protocol handshake between two devices and/or the receipt or absence of encrypted messages of the handshake to detect security vulnerabilities of one or both of those devices. For example, the unencrypted messages of a TLS handshake between a client device and a server may be analyzed to determine security vulnerabilities of the client device. Because the disclosed implementations utilize the unencrypted messages of a handshake and/or detection of the receipt or absence of encrypted messages of the handshake, involvement in the handshake or decryption of encrypted messages of the handshake is not necessary. The requirement is that the disclosed implementations are able to observe the messages of a handshake that are used to establish a secure communication between the devices.
CROSS-BLOCKCHAIN IDENTITY AND KEY MANAGEMENT
A method of implementing a revocable threshold hierarchical identity-based signature scheme may include receiving an identifier associated with a user. A first secret key based on the identifier may be generated. A string and the identifier may be directed to be posted on a block of a blockchain. A second secret key may be generated using the string, the first secret key, and the identifier. The block that includes the string and the identifier may be signed using the second secret key. A message may be signed using the second secret key to generate a signature. The signature may be provided to a device. The signature may be verifiable by the device using the string and the identifier obtained from the block by the device.
Systems and methods for ensuring correct execution of computer program using a mediator computer system
In a distributed system, a first computer system may require computationally verifiable assurances of the authenticity and integrity of computations (e.g., performed as part of the execution of a program) performed by a second computer system. Methods described herein may be utilized to enforce and/or ensure the correct execution of a program. The first computer system may delegate execution of a program to a second computer system and a protocol may be employed to constrain the second computer system to perform a correct execution of the program. The protocol may include mitigation and correction routines that mitigate and/or correct the incorrect execution of a program. In various systems and methods described herein, the protocol may utilize a blockchain network such as a Bitcoin-based blockchain network.
Verification apparatus, information processing method, and program
There is provided a verification apparatus including: an acquisition unit configured to acquire each of control data that causes artificial intelligence to function in an apparatus and learning data of the control data; and a verification unit configured to verify the acquired control data on the basis of the control data obtained as a result of performing learning with use of the acquired learning data, and on the basis of the acquired control data.
Method and device for cross-domain strong logical isolation and secure access control in the internet of things
Embodiments of the present disclosure provide a method and a device for cross-domain strong logically isolation and secure access control in the Internet of Things (IoT). The method includes the following. When one IoT gateway receives the identity authentication request, the IoT gateway sends the identity authentication request to all IoT gateways in the domain excluding that IoT gateway. When all IoT gateways in the domain receive the identity authentication request, all IoT gateways verify separately whether the identity authentication request is legal. After a certain IoT gateway obtains the identity authentication result, a distributed consensus procedure is initiated. The IoT gateways in the domain reach a consensus on the identity authentication result through a distributed consensus mechanism, and the identity authentication result is written and stored to a block of a blockchain.