H04L2209/42

DISTRIBUTED NETWORK WITH BLINDED IDENTITIES

According to an embodiment of a first aspect of the invention, there is a distributed network comprising a plurality of network nodes. Each of the plurality of network nodes is linked to a first node identity of a plurality of first node identities. Each of the plurality of first node identities comprises a first verification key of a public-key signature scheme. The distributed network is configured to perform a key shuffling step adapted to perform an unlinkable one-to-one mapping between the plurality of first node identities and a plurality of second node identities. Each of the plurality of second node identities comprises a second verification key of a public-key signature scheme. The distributed network is configured to perform a consensus protocol with a subset of the plurality of second node identities. Further aspects of the invention relate to a corresponding computer-implemented method, a network node and a computer program product.

CRYPTOGRAPHIC METHODS AND SYSTEMS USING ACTIVATION CODES FOR DIGITAL CERTIFICATE REVOCATION

To revoke a digital certificate, activation of the digital certificate is blocked by withholding an activation code from the certificate user. The certificates are generated by a plurality of entities in a robust process that preserves user privacy (e.g. anonymity) even in case of collusion of some of the entities. The process is suitable for connected vehicles, e.g. as an improvement for Security Credential Management System (SCMS).

CRYPTOGRAPHIC METHODS AND SYSTEMS USING BLINDED ACTIVATION CODES FOR DIGITAL CERTIFICATE REVOCATION

To revoke a digital certificate (160p), activation of the digital certificate is blocked by withholding an activation code from the certificate user (110). The certificates are generated by a plurality of entities (210, 220, 838) in a robust process that preserves user privacy (e.g. anonymity) even in case of collusion of some of the entities. The process is suitable for connected vehicles, e.g. as an improvement for Security Credential Management System (SCMS).

CREDENTIAL RENEWAL CONTINUITY FOR APPLICATION DEVELOPMENT
20220159011 · 2022-05-19 · ·

Disclosed herein are methods, systems, and processes for continuously renewing credentials in application development and testing environments that include application products from third-party vendors. A notification indicating that an existing credential associated with a developer account of a third-party application will expire is received via a webhook. A credential renewal request for a new set of credentials for the developer account is sent using a request method specified for the third-party application and the new set of credentials for the developer account are received within the expiration period via the webhook.

VOTING SYSTEM TO PREVENT FRAUD USING BLOCKCHAIN TECHNOLOGY
20220156757 · 2022-05-19 ·

A voting system comprising at least one voting machine comprising: at least one voting machine processor. The voting machine processor performing voting machine operations comprising: initializing a vote blockchain with a vote blockchain genesis block. The vote blockchain genesis block comprising a voting machine identifier and a voting machine identifier hash value; storing the vote blockchain in at least one voting machine memory; iteratively, for a plurality of voters: receiving a signal indicating at least one vote made by a voter; creating a data structure comprising the at least one vote and a hash value of a preceding block; determining a new block hash value of the data structure; appending a new block comprising the data structure and the new block hash value to the vote blockchain; and storing the vote blockchain in the at least one voting machine memory

VOTING SYSTEM TO PREVENT FRAUD USING BLOCKCHAIN TECHNOLOGY
20220156758 · 2022-05-19 ·

A voting system comprises at least one voting machine comprising: at least one voting machine processor performing voting machine operations comprising initializing a vote blockchain with a vote blockchain genesis block, the vote blockchain genesis block comprising a voting machine identifier and a genesis block hash value; creating a data structure comprising a plurality of votes and a hash value of a preceding block; determining a new block hash value of the data structure; appending a new block comprising the data structure and the new block hash value to the vote blockchain; and storing the vote blockchain in the at least one voting machine memory.

Data processing method

There is disclosed a method of processing a data packet received by a packet sniffer, the packet containing an associated identifier, the method including transmitting the packet to a recipient, determining if the identifier corresponds to a particular network, wherein if the identifier is determined to correspond to the particular network, the identifier is provided to the recipient; and if the identifier is determined to not correspond to the particular network, the identifier is withheld from the recipient.

Terminal identity protection method in a communication system
11336437 · 2022-05-17 · ·

A method for determining a terminal ID from a message received from a terminal in a communication system avoids sending the terminal ID in the clear. In this system each terminal ID has an associated encryption key. A transmitted message comprises at least a Message Authentication Code (MAC), a n-bit hash, and encrypted message text. At least the terminal key and a nonce is used to generate the MAC, and neither the terminal ID or the terminal key are included in the transmitted message. An authentication broker stores the set of all (terminal ID, terminal key) pairs for the plurality of terminals in the communication system. The set of all terminal keys is grouped into at least two partitions, and on receipt of a message the authentication broker identifies the partition that includes the terminal key of the terminal that transmitted the received message using the n-bit hash (the search partition). The authentication broker then searches the search partition for the terminal key that authenticates the MAC to identify the terminal ID. In some embodiments the nonce is not included in the message but is known or obtainable by the terminal and the authentication broker. A partitioning function generates the «-bit hash from at least the nonce and a terminal key. In some embodiments the nonce is included in the received message and a partitioning function generates the n-bit hash by using the nonce to select n bits from the terminal ID. In some embodiments the partitions are arranged into hierarchical groups such as tree, and each node has a partition key, and the n-bit has is formed as the ordered set of MACs for the partition keys on the path from the root node to the leaf node partition that includes the terminal key.

Methods, devices and systems for a distributed coordination engine-based exchange that implements a blockchain distributed ledger
11336713 · 2022-05-17 · ·

A distributed system that implements an online exchange may comprise a plurality of server nodes, each of which being configured to receive exchange transaction proposals from customers of the online exchange over a computer network and each being configured to store a copy of a blockchain distributed ledger of completed exchange transactions. A distributed coordination engine may be coupled, over the computer network, to the plurality of server nodes and may receive a plurality of exchange transaction proposals from the plurality of server nodes. The distributed coordination engine may be being further configured to achieve consensus on the plurality of exchange transaction proposals and to generate, in response, an ordering of agreed-upon exchange transaction proposals that includes the plurality of exchange transaction proposals on which consensus has been reached. This ordering of agreed-upon exchange transaction proposals is identically provided to each of the server nodes and specifies the order in which the server nodes are to execute exchange transactions and to update their copy of the distributed ledger. The ordering of agreed-upon exchange transaction proposals may optionally be re-ordered and identically provided to each server node to conform to the local orderings at the exchange transaction proposal's node server of origin.

Automated event processing computing platform for handling and enriching blockchain data

Methods and systems for using block chain technology to verify transaction data are described herein. A computing platform may receive data about events related to transactions, personal or corporate information, supply chains, and other relevant information about a person or corporate entity. The event information may be received, aggregated, and processed to determine metadata about the person or corporate entity. The metadata may indicate, for example, a trustworthiness of the person or corporate entity for various purposes. Such event information and/or metadata may be stored as transactions in a block chain that may be accessible by counterparties to a potential transaction involving the person or corporate entity. The automated event processing computing platform may further use automated techniques to implement smart transactions between the person/entity and counterparty based on the trust metadata.