H04L9/0643

NON-FUNGIBLE TOKEN AUTHENTICATION

Disclosed are systems and methods that authenticate non-fungible tokens (“NFT”) and/or digital data represented by or pointed to by an NFT. In some implementations, authentication may be with respect to an existing NFT. In other implementations, authentication may be with respect to an NFT that is being created. The disclosed implementations may compare a candidate and/or candidate NFT data with existing NFTs and/or existing NFT data to determine if the candidate NFT and/or candidate NFT data is similar to other NFTs and/or other NFT data of another NFT, which may exist on any of many different blockchains.

DISTRIBUTED VEHICLE COMPUTING
20230042500 · 2023-02-09 · ·

A vehicle identifier and a nonfungible token (NFT) associated with the vehicle identifier are stored on an electronic ledger. The electronic ledger is a distributed electronic ledger shared between at least a computer and a remote computer. Upon transitioning a vehicle to an on state, the electronic ledger is queried to identify programming instructions associated with the NFT. Upon retrieving the identified programming instructions from the electronic ledger, the vehicle is actuated based on the retrieved programming instructions.

KEY IDENTIFIER DERIVATION AND MANAGEMENT SYSTEMS AND METHODS

This disclosure relates to, among other things, systems and methods for deriving key identifiers and managing mapping between keys and key identifiers. Consistent with embodiments disclosed herein, the disclosed systems and methods may provide a mechanism that allows multiple parties to reconstruct unique identifiers given a set of known inputs that may be used to look up, identify, and/or otherwise access services and/or data objects. In some embodiments, this may allow for a service provider and a rights management service to independently derive key identification information based on information that both entities share (e.g., a content document such as a Content Protection Information Exchange Format document), thereby reducing requirements to maintain such mappings.

SYSTEM AND METHOD FOR MANAGING SECRETS IN COMPUTING ENVIRONMENTS
20230041959 · 2023-02-09 · ·

Systems and methods for sharing secrets including passwords, keys, and other confidential information used in computing environments. A secrets record generated at a secrets vault client device is encrypted using an application key associated with a computing environment. The encrypted secrets record is stored in the secrets vault server. The secrets vault client device configures a sharing client device and associated with an access token. The secrets vault client device hashes the access token and sends to the secrets vault server as a client identifier. The sharing client device performs a first-time authentication using a hashed access token with the secrets vault server. Upon successful authentication, the sharing client device requests secrets records from the secrets vault server using the client identifier.

Secure and transparent pruning for blockchains
11556247 · 2023-01-17 · ·

A method for enabling pruning of a blockchain of a blockchain network includes creating an active blocks commitments Merkle tree from hashes of active blocks and creating an active smart contracts commitments Merkle tree from hashes of active smart contracts. The Merkle trees are created after an amount of blocks created in the blockchain has reached a threshold set by a pruning threshold parameter stored in the blockchain network. Hashes of the roots of the Merkle trees are stored in a header of a new block as a new genesis block. The new genesis block is broadcast to the blockchain network. A set of the active blocks and active smart contracts used respectively to create the active blocks commitments Merkle tree and the active smart contracts commitments Merkle tree are committed to upon the blockchain network reaching consensus on the new genesis block.

System and method for prescription security and authentication
11558178 · 2023-01-17 · ·

Systems, methods, and computer-readable storage media for receiving, from an issuer, an electronic prescription for a patient, then fulfilling that prescription using a blockchain/distributed ledger verification system. The system receives multiple public keys, combines them, then performs a hash function (or other encryption) on that combination. The resulting output is then transmitted to a pharmacy for prescription fulfillment.

Distributed data storage

According to an example aspect of the present invention, there is provided a method, comprising: receiving an input ordered set of transactions after a genesis block or a preceding compressed block in a chain of blocks, generating a compressed block on the basis of the input ordered set of transactions, wherein processing of the compressed block results to an equivalent final state as processing of the input ordered set of transactions, and providing the compressed block to a distributed network for establishing a new chain epoch and replacing a set of uncompressed blocks associated with the input ordered set of transactions.

Secure analytics using homomorphic and injective format-preserving encryption
11558358 · 2023-01-17 · ·

Secure analytics using homomorphic and injective format-preserving encryption are disclosed herein. An example method includes encoding an analytic parameter set using a homomorphic encryption scheme as a set of homomorphic analytic vectors; transmitting the set of homomorphic analytic vectors to a server system; and receiving a homomorphic encrypted result from the server system, the server system having utilized the homomorphic encryption scheme and a first injective, format-preserving encryption scheme to evaluate the set of homomorphic analytic vectors over a datasource.

Universal payment channels

Systems and methods for transferring value. A method includes posting, by a user device to a blockchain, a deposit transaction comprising a deposit value and conditions and updating, by the user device, a state according to a transaction amount. The method also includes transmitting, by the user device, a state update of the state to a server computer and responsive to transmitting the state update, and receiving, by the user device, a payment complete message comprising a tuple from the server computer. The method also includes verifying, by the user device, the conditions and processing, by the user device, a server deposit transaction on the blockchain in response to verifying.

Method and system to facilitate assessment, authorization, and monitoring of policy documents related to an organization
11558182 · 2023-01-17 ·

A method for facilitating assessment, authorization, and monitoring of policy documents in organizations for cyber security. The method includes a process of receiving indications of policy documents related to an organization from a user, thus, allowing the user to manager cyber security controls of written policy documents in accordance with regulations and standards. The method also includes retrieving regulations from external databases. Further, the method includes analysis of policy documents against regulations and generating insights. Subsequently, the method transmits the generated insights and/or reports to the user. Further, the method includes receiving monitoring data related to the organization from one or more user's PC devices. Further, the method uses a MD5 (Message Digest algorithm 5) hashing function to ensure that a document has not been tampered with and may include a time-based trigger utilizing a standard green/yellow/red light chart for ongoing authorizations and monitoring.