H04L2209/68

TIME-BASED DIGITAL SIGNATURE

A method includes receiving an event, the event associated with a digital signature in a first time-based message comprising a first trusted time stamp token generated using a first hash of digitally signed content from a trusted timing authority; generating a first block on a distributed ledger; generating a second hash of the first trusted time stamp token; receiving a second trusted time stamp token from the trusted timing authority in response to transmitting the second hash to the trusted timing authority; and generating a second block on the distributed ledger; wherein verification of data integrity of the digitally signed content is provided via the first hash of the digitally signed content and second hash of the first trusted time stamp token and via the hash of the first block and a hash of the second block.

Method and apparatus for two-step data signing

A system and method for signing data is presented. In one embodiment, the method comprises: generating a data signing key; transforming the data signing key into a first subkey and a second subkey; encrypting the first subkey according to a secret key of an ODSS; generating a signature verification public key; providing the signature verification public key, the encrypted first subkey, and the second subkey for storage in a client device; accepting a request to sign the data, the request having a representation of the data and the encrypted first subkey; generating a partially computed signature of the data according to the representation of the data and the encrypted first subkey; and providing the partially computed signature of the data to the client device.

Systems and methods for distributed extensible blockchain structures
11757655 · 2023-09-12 · ·

A system, method, and apparatus for distributed extensible blockchain structures is provided. A system includes a parent blockchain. The parent blockchain includes a first block including first content, the first block stored at a first location, and a second block stored at a second location different than the first location. The second block includes second content and a first SignerInfo element. The first SignerInfo element includes a hash on the second content, a hash on the first content of the first block, a pointer to the first location of the first block, and a first SignatureValue element generated by digitally signing at least the hash on the second content, the hash on the first content, and the pointer to the first location.

SYSTEMS AND METHODS FOR DISTRIBUTED EXTENSIBLE BLOCKCHAIN STRUCTURES
20230379170 · 2023-11-23 · ·

A system, method, and apparatus for distributed extensible blockchain structures is provided. A system includes a parent blockchain. The parent blockchain includes a first block including first content, the first block stored at a first location, and a second block stored at a second location different than the first location. The second block includes second content and a first SignerInfo element. The first SignerInfo element includes a hash on the second content, a hash on the first content of the first block, a pointer to the first location of the first block, and a first SignatureValue element generated by digitally signing at least the hash on the second content, the hash on the first content, and the pointer to the first location.

Method for broadcast service signaling

Systems, methods, and devices enable a receiver device to determine completeness of low level signaling (LLS) tables received via broadcast transmissions. In various embodiments, broadcast service signaling may include determining whether a received LLS table is a directory table identifying each of a complete set of LLS tables, parsing the directory table, determining whether the directory table is confirmed based at least in part on a digital signature in the directory table, determining whether a complete set of LLS tables is received based at least in part on the identification of each of the complete set of LLS tables in the directory table, and determining available services based at least in part on the complete set of LLS tables before an expiration a repetition time period after receiving the directory table.

Blockchain transaction method and apparatus
11451400 · 2022-09-20 · ·

One or more embodiments of the present specification provide blockchain-based transaction methods, apparatuses, and electronic devices. A target transaction sent by a node device of a transaction initiator is received. An account of the transaction initiator corresponds to a plurality of public keys, and the target transaction includes transaction content and a digital signature. The digital signature is created by using one or more private keys corresponding to the plurality of public keys of the account and is created based on at least a part of the transaction content. The target transaction is verified, including verifying whether the digital signature is valid. In response to a successful verification, the target transaction is recorded to a distributed database of a blockchain based on a consensus rule of the blockchain.

CERTIFICATION OF A MEASUREMENT RESULT OF A MEASURING DEVICE

The invention enables the certification of a measurement result of a measuring device. A measuring device arranged in connection with a data security module according to the invention takes under processing a measurement result produced using a measuring instrument of the measuring device (501). The measuring device associates a digital calibration certificate associated with a public key corresponding to a secret key stored in a key storage with the measurement result taken under processing (502). The measuring device digitally signs the associated measurement result using a signing function of the data security module and the secret key stored in the key storage (503).

CONTENT USE SYSTEM, PERMISSION TERMINAL, BROWSING TERMINAL, DISTRIBUTION TERMINAL, AND CONTENT USE PROGRAM

A permission terminal 4 includes a generation unit 423 that generates access information for content using a content public key of the content and a user public key of a browser of the content, and a registration unit 424 that registers the access information in a blockchain. The access information includes an aggregate public key in which the content public key and the user public key are aggregated, a message for the content, and a content signature in which the message is signed with a content private key corresponding to the content public key. A browsing terminal 5 includes a checking unit 523 that acquires access information of requested content from a blockchain and verifies, with the aggregate public key of the access information, an aggregate signature where a user signature in which a message of the access information is signed with a user private key and the content signature of the access information are aggregated, and a request unit 524 that transmits a content request including the user signature or the aggregate signature if the verification succeeds.

Resolving cryptographic bottlenecks for distributed multi-signature contracts shared with cryptographic accelerators by switching between local and accelerator cryptographic libraries

Various embodiments are provided for managing cryptographic bottlenecks for distributed multi-signature blockchain contracts in a computing environment. One or more cryptographic bottlenecks of cryptographic requests at a cryptographic accelerator may be resolved by switching between a blockchain node cryptographic library and an accelerator cryptographic library upon a number of the cryptographic requests at the accelerator exceeding a defined threshold.

AEROSPACE ADVANCED CHAIN OF TRUST
20220078021 · 2022-03-10 ·

A method implemented by an onboard avionics computer for executing a plurality of binary codes that are associated with a plurality of sets of metadata, wherein: the plurality of binary codes and the plurality of metadata are hierarchized into a number of levels at least equal to two; a first binary code, of a level, is associated with a first set of metadata of the level, and a second binary code of a lower level, itself associated with a second set of metadata of the lower level; the first set of metadata comprises a data signature, the data comprising at least a first message digest associated with the first binary code, and the second set of metadata comprises a public key; the method comprising the execution, by the second binary code, of the following steps: applying a hash function to obtain a second message digest of the first binary code; decrypting the signature using the public key to obtain the first message digest; authorizing the execution of the binary code, if and only if the first message digest is identical to the second.