H04L9/007

ARTICLE ANTI-FORGERY PROTECTION

The invention relates to securing of an article against forgery and falsifying of its associated data, and particularly of data relating to its belonging to a specific batch of articles, while allowing offline or online checking of the authenticity of a secured article and conformity of its associated data with respect to that of a genuine article.

INFRASTRUCTURE DEVICE ENROLMENT

According to aspects of the present disclosure, there is provided methods and devices for enrolling a device into a network, including a device comprising a secure storage comprising a device identifier and a public key, and a controller configured to: retrieve a proof-of-ownership certificate comprising a cryptographic binding between the device identifier and an owner identifier based on a secret key corresponding to the stored public key, authenticate the proof-of-ownership certificate based on the stored device identifier and public key, establish an authenticated communication channel with a device manager based on the authenticated proof-of-ownership certificate, and receive setup information from the device manager to enrol the device on the network.

SECURE PROVISIONING AND MANAGEMENT OF DEVICES

Systems, methods and devices are provided for provisioning a computerized device. The system may include a distributor computer that is connected to the computerized device and is operable to receive a first digital asset and transmit it to the computerized device, a server that is connected to the distributor computer, and that transmits the first digital asset to the distributor computer when a first authorizing condition is met, the first digital asset being configured to cause the computerized device to become partially provisioned, and a provisioning controller that is connected to the distributor computer and that determines whether the first authorizing condition is met, the server transmits a second digital asset to the computerized device, and the computerized device is functional after the second digital asset is transmitted to the computerized device.

Secure deterministic tokens for encrypting electronic communications

A computer implemented method includes generating, by a processor associated with a first client computer, a request message; generating, by the processor, a first public token based on a first private token; augmenting, by the processor, the electronic data transaction request message with the first public token; transmitting, by the processor, the augmented electronic data transaction request message to a second client computer; generating, by the processor, a second public token based on the first public token; identifying, by the processor, from a database of result messages, a result message labeled with the second public token, the identified result message including encrypted confidential information; generating, by the processor, a second private token corresponding to the second public token used to identify the result message; and decrypting, by the processor, the encrypted confidential information with the second private token.

SOFTWARE DISTRIBUTION IN A WIRELESS AD HOC NETWORK FOR AD-HOC DATA PROCESSING ON A SOURCE NODE
20210281498 · 2021-09-09 ·

A method of acquiring software by a source node in a wireless ad hoc network. The method includes the source node executing application software from which a need to process a particular modality of data is identified, and making a determination that the source node is incapable of processing the particular modality of data. Responsive to the determination, the source node searches a local module repository (MR) of the source node for a software module usable to process the particular modality of data, and responsive to the source node failing to locate the software module in the local MR, broadcasts a request for the software module to neighbor nodes of the plurality of nodes in radio range of the source node. The source node receives the software module from the neighbor node, and uses the software module to process the particular modality of data.

PYRAMID CONSTRUCT WITH TRUSTED SCORE VALIDATION
20210176036 · 2021-06-10 ·

Disclosed herein are systems and methods for decentralized data distribution by a database network system comprising a hierarchical blockchain model. The hierarchical blockchain model may comprise a quantum pyramid consensus to distribute data throughout the database network system in a decentralized and secure manner. The hierarchical construct may be built according to trusted scores calculated for the nodes of the network over their lifetime at the network.

Smart Security
20210288786 · 2021-09-16 ·

A system and method comprising a processor configured with an application interface to create hashed and digital signatures for a plurality of users and to assign each hashed and digital signature to a user as a unique public-private key. The system further includes a memory configured to store smart data profile with each user, and the smart data profile is used to monitor communication and consumption of data, information, content, or communication with super-nodes. The network interface is configured to use the public-private key to receive and send data to securely communicate peer-to-peer, peer-to-super-node, or peer-to-server using network or gossip protocols.

Hash-based digital signatures for hierarchical internet public key infrastructure
11025407 · 2021-06-01 · ·

Techniques for signing internet data are disclosed. The techniques include accessing a plurality of internet data records. The techniques also include generating, using at least one electronic processor, leaf nodes from the plurality of internet data records, and constructing a recursive hash tree from the plurality of leaf nodes. The techniques also include deriving information sufficient to validate the root node, and publishing, in an internet public key infrastructure (PKI) as a synthesized public key, the information sufficient to validate the root node. The techniques also include providing, through the internet and as a signature on at least one of the plurality of internet data records, validation data including sibling path data from the recursive hash tree, such that an internet client validates the at least one of the internet data records using at least the validation data and the synthesized public key.

SYSTEMS AND METHODS FOR SECURING ACCESS RIGHTS TO RESOURCES USING CRYPTOGRAPHY AND THE BLOCKCHAIN
20210119764 · 2021-04-22 ·

The present disclosure generally relates to securing access to resource and access rights using cryptography and the blockchain. Certain embodiments of the present disclosure generally relate to systems and methods that enhance the security of resource access using hierarchical deterministic (HD) cryptography and the blockchain. Certain embodiments of the present disclosure relate to systems and methods that securely and anonymously represent the identity of a user and the user's access code data on a distributed ledger represented across the blockchain.

Method and system for management of secure boot certificates

Methods, systems, and computer programs encoded on computer storage medium, for providing, by a client computing node, an interface identifying a secure boot certificate namespace hierarchy including a plurality of namespaces; in response to providing the interface, receiving, by the client computing node, a request to create a new namespace within the secure boot namespace hierarchy; configuring the new namespace, including adding a certificate that is to be included by the new namespace, the certificate associated with a server computing system; and assigning the new namespace to the server computing system.