Patent classifications
H04L2209/68
System and method for extracting device uniqueness to assign a license to the device
An information handling system includes a device, a controller, and a license manager subsystem. The controller is configured to determine whether the device has a license assigned and to extract a unique identification for the device in response to a request for information about the device. The license manager subsystem is configured to send the request for information about the device to the controller, to send the unique identification for the device to a license server as a request for the license for the device, to receive the license from the license server, and to assign the license to the device when the license is received.
Transactional system with peer-to-peer distributed architecture for exchanging units of account
A transaction system based on a distributed peer-to-peer computer architecture, said system involving transactions generated by users by means of wallets and allowing the transfer of units of account by feeding inputs from outputs, each transaction (called downstream transaction) having an input directly or indirectly referring to an output of an upstream transaction (or several inputs each referring to an output of a respective upstream transaction) and having an output specifying the number of units of account and an address of a recipient.
The system comprises means for connecting an input of a downstream transaction to an output of an upstream transaction as a function of matching rules between a code computed on all or part of the content of the downstream transaction and a check code contained in the upstream transaction, or conversely,
The system further comprises means for propagating a contract, predetermined at an upstream transaction, to a downstream transaction having an input connected to the output of said upstream transaction, said contract being executable on a context for establishing allocation constraints of the output(s) of the downstream transaction, such allocation being authorized only if the constraints are met.
Managing access to a secure digital document
In a method for managing access to a secure digital document by workflow participants, in which a respective public key is associated with each of the workflow participants, an entry table is populated with a participant entry for each of the workflow participants. Each of the participant entries includes a map entry identifier that corresponds to a map entry tag in a map file, and a first label associated with the map entry identifier. In addition, symmetric keys for the workflow participants are accessed and each of the first labels is encrypted using a respective symmetric key to generate a plurality of second labels, the entry table is populated with the plurality of second labels, each of the plurality of symmetric keys is encrypted with the public key of a respective workflow participant, and the entry table is incorporated into the digital document.
AUTOMATIC E-SIGNATURES IN RESPONSE TO CONDITIONS AND/OR EVENTS
Techniques are disclosed that allow for automatic signing of a digital document in response to some event and/or when the document satisfies some predefined condition. The document may be, for example, an agreement, a technical paper for publication, a press release or marketing materials, or any other digital document that might need to be assented to, approved by, and/or attributed to one or more persons or representatives. The techniques may further provide support for automatic signature tracking and notification in order to assist with auditability. In one example embodiment, the techniques are implemented in the context of an e-signature application or service, which may be installed locally on the user's computer or provided to the user via a network from a server. In one example embodiment, the e-signature service is configured to automatically impress a signer's signature into a given document, if the signer's pre-established auto-sign criteria is met.
Automatic E-signatures in response to conditions and/or events
Techniques are disclosed that allow for automatic signing of a digital document in response to some event and/or when the document satisfies some predefined condition. The document may be, for example, an agreement, a technical paper for publication, a press release or marketing materials, or any other digital document that might need to be assented to, approved by, and/or attributed to one or more persons or representatives. The techniques may further provide support for automatic signature tracking and notification in order to assist with auditability. In one example embodiment, the techniques are implemented in the context of an e-signature application or service, which may be installed locally on the user's computer or provided to the user via a network from a server. In one example embodiment, the e-signature service is configured to automatically impress a signer's signature into a given document, if the signer's pre-established auto-sign criteria is met.
Hybridization of dilithium and falcon for digital signatures
In one example an apparatus comprises receive, in a processing platform, an input request from a remote device comprising a digital signature signing or verify function and determine a selected digital signature scheme for the request based at least in part on a determination of whether the processing platform is to apply a signing function or a verify function to the input request. Other examples may be described.
Digital signature system
This disclosure introduces digital signature systems having dynamically validated, multi-level signature seals. An exemplary digital signature system includes a multi-level signature seal with an attestation and machine-readable code configured to direct a user, upon scanning or selecting the machine-readable code, to a validation portal for the attestation. The validation portal includes an artifact graphically indicating a current validation status of the attestation and a validation link configured to direct the user, upon selection, to multi-level signature data for the seal. A user dashboard is provided to allow the conveyor of the seal to manually validate and invalidate the attestation. The user dashboard includes a scans widget that, upon selection, directs a user to a scan details informational view for the seal.
Lightweight network authentication for resource constrained devices via mergeable stateful signatures
Signature-based authentication is a core cryptographic primitive essential for most secure networking protocols. A new signature scheme, MSS, allows a client to efficiently authenticate herself to a server. The new scheme is modeled in an offline/online model where client online time is premium. The offline component derives basis signatures that are then composed based on the data being signed to provide signatures efficiently and securely during run-time. MSS requires the server to maintain state and is suitable for applications where a device has long-term associations with the server. MSS allows direct comparison to hash chains-based authentication schemes used in similar settings, and is relevant to resource-constrained devices, e.g., IoT. MSS instantiations are derived for two cryptographic families, assuming the hardness of RSA and decisional Diffie-Hellman (DDH) respectively. Then used is the new scheme to design an efficient time-based one-time password (TOTP) protocol.