H04L9/0618

Stateless system to encrypt and decrypt data
11502826 · 2022-11-15 · ·

A method including determining, by a user device, an assigned key pair including an assigned public key and an associated assigned private key; determining, for content to be encrypted, an access key pair including an access public key and an associated access private key; encrypting the access private key by utilizing the assigned public key; encrypting a randomly generated key by utilizing the access public key; and encrypting content utilizing the randomly generated key. Various other aspects are contemplated.

DATA SECURITY PROCESSING TERMINAL, SYSTEM AND METHOD
20220360443 · 2022-11-10 · ·

The application provides a data security processing terminal, system and method, and is related to a field of data processing. The data security processing terminal includes: an image acquisition device configured to acquire image data and transmit the image data to a Trust Execution Environment through a secure channel; an image acquisition driver operating in the Trust Execution Environment and configured to drive, in response to a drive instruction from a processor, the image acquisition device to acquire the image data; the processor operating in the Trust Execution Environment and configured to send the drive instruction to the image acquisition driver, obtain the image data, encrypt the image data using a stored first key to obtain image ciphertext data, and output the image ciphertext data. The technical solution of the present applicant can be used to ensure the security of image data.

DATA ENCRYPTION AND DECRYPTION METHOD, DEVICE, STORAGE MEDIUM AND ENCRYPTED FILE
20220360441 · 2022-11-10 · ·

The application provides a data encryption and decryption method, device, storage medium, and encrypted file, and relates to the technical field of data processing. The method for data encryption includes: obtaining a first key, and performing an obfuscation operation on the first key and data to be encrypted to obtain obfuscation operation result data; obtaining a second key, and obtaining a first signature of the obfuscation operation result data according to the second key; obtaining a third key, and encrypting the first key, the data to be encrypted and the first signature using the third key to obtain a target ciphertext; obtaining a fourth key, and obtaining a second signature of the target ciphertext according to the fourth key; generating an encrypted file including the target ciphertext and the second signature. With the technical solutions of the application, security of data protection can be improved.

DATA SECURITY USING RANDOMIZED FEATURES
20220358236 · 2022-11-10 ·

Data security using randomized features, provides improved protection of user data, within a cloud infrastructure. Files received are broken apart into data blocks then randomly written into storage locations that are recorded in sequence into a key comprising an array of pointers. Data blocks may be randomly sized between maximum and minimum parameters. Storage locations may first be tested to prevent unwanted overwrites of preexisting data, undersized locations may receive a partial write, plus a pointer to an overflow location into which the remainder of data is written. Randomized data storage is separate and isolated from pointers based key storage via separate communication channels, and separate storage infrastructures. Download speeds may be boosted via parallel processing of data blocks out of storage and into reassembly according to the pointers key sequence. Re-assembled files may be worked upon then saved back into the cloud infrastructure.

BLOCKCHAIN-BASED DYNAMIC PAYTERM GENERATOR
20220358495 · 2022-11-10 ·

Systems, methods, and apparatus are provided for a dynamic contract payment term (“payterm”) generator. A machine learning algorithm may generate a replacement payment term for a contract based on market-based parameters and blockchain metadata for the contract. The blockchain metadata may encode hierarchical interdependencies between contracts using blockchain encryption. The blockchain metadata may be applied to auto-generate machine learning inputs for related contracts having interdependent payment terms. The machine learning inputs may include contract parameters that have been extracted and encrypted as blockchain metadata, as well as market-based parameters extracted from enterprise sources.

SECURE AND ROBUST DECENTRALIZED LEDGER BASED DATA MANAGEMENT
20230040235 · 2023-02-09 ·

Systems and methods providing access control and data privacy/security with decentralized ledger technology are disclosed. To ensure data privacy the decryption or access to data by a non-data owner requires joint orchestration of decentralized system nodes to provide partial decryption components with n-of-x required to fulfill request. Data can be encrypted, and access control policy can be decided including required number of key fragments to fulfill decryption. Access control policies can be stored in the decentralized ledger based system. Key information can be stored in the system in a decentralized manner with partial key fragments encrypted and split among system nodes. An access request can be sent to the system to fetch a data file, without disclosing the requester's identity in the system. The decentralized ledger based system can verify a legitimate request to access the data and denies access to malicious or faulty participants.

CRYPTOGRAPHIC DATA ENTRY BLOCKCHAIN DATA STRUCTURE
20230039531 · 2023-02-09 ·

A method for securely storing and transmitting data using a blockchain structure. The blockchain structure is operated on the local node and through SSH transmission with an arbiter server and cloud infrastructure. The local application coordinates the order of appended blocks, where each block is a flat file that uses a respective filename to indicate block order. Data entry and retrieval is performed where plaintext data is available only in local memory as decrypted through an authorized client. Data written to disk only as encrypted.

SYSTEM AND METHODS FOR TRACKING AN ITEM IN A DISTRIBUTED ENVIRONMENT

A method for tracking an item in a distributed environment is provided. At least one node in a network adds a new block to a first cryptographically verifiable ledger represented by a first sequence of blocks that is stored in one or more non-transitory computer-readable media. The new block added to the first cryptographically verifiable ledger contains a component identifier and a hash of a previous block in the first sequence of blocks. The at least one node in the network adds a new block to a second cryptographically verifiable ledger represented by a second sequence of blocks that is stored in the one or more non-transitory computer-readable media. The new block added to the second cryptographically verifiable ledger contains a destination identifier, the first sequence of blocks, and a hash of a previous block in the second sequence of blocks.

Machine and system for making liquid or semi-liquid food products

A machine for making liquid or semi-liquid food products, including: a first processing container for processing a basic liquid or semi-liquid product and defining a processing chamber; a stirrer positioned inside the first processing container; a thermal system including a heat exchanger, associated with the first processing container; at least one sensor, configured to measure an operating parameter of the machine; a processing and control unit, operatively connected to the at least one sensor and including a module for receiving and transmitting data captured by the sensor, wherein the module for receiving and transmitting data is configured to transmit data captured by the sensor to a “smart contract” program.

System for simplifying executable instructions for optimised verifiable computation

The invention relates to distributed ledger technologies such as consensus-based blockchains. Computer-implemented N methods for reducing arithmetic circuits derived from smart contracts are described. The invention is implemented using a blockchain network, which may be, for example, a Bitcoin blockchain. A set of conditions encoded in a first programming language is obtained. The set of conditions is converted into a programmatic set of conditions encoded in a second programming language. The programmatic set of conditions is precompiled into precompiled program code. The precompiled program code is transformed into an arithmetic circuit. The arithmetic circuit is reduced to form a reduced arithmetic circuit, and the reduced arithmetic circuit is stored.