Patent classifications
H04L9/3066
Wireless Universal Interface
Systems and techniques for accessing and controlling field devices to collect data and convert protocols are disclosed herein. An example system to access a field device includes one or more processors, a transmitter, a wireless network interface controller, and a memory storing instructions that, when executed, may cause the field communicator device to retrieve process parameter data encoded in a field device transmission protocol. The field communicator device may retrieve the process parameter data at a plurality of time intervals from a field device, and the process parameter data may correspond to a process parameter for the field device. The field communicator device may also store at least some of the process parameter data, analyze the process parameter data over the plurality of time intervals to identify a condition of the field device, and transmit an indication of the condition of the field device to a remote device.
BLOCKCHAIN-IMPLEMENTED METHOD FOR CONTROL AND DISTRIBUTION OF DIGITAL CONTENT
The disclosure relates to a blockchain-implemented system and method of controlling the transmission and/or distribution of digital content. A first user transfers a deposit quantity of cryptocurrency to a common address. A first node associated with the first user: sends a request to the second node to provide an episode of digital content from a series of digital content; determines a payment transaction to transfer a payment quantity of cryptocurrency to the second user based on a quantity of episodes of digital content in the series; and signs and sends the payment transaction to a second node. The second node associated with the second user: receives the request and the payment transaction; verifies the payment transaction; and based on a result of verifying: provides access to the episode of digital content to the first node; and co-signs and sends the payment transaction to a distributed ledger.
Authentication using key agreement
A client may transmit an authentication request to a server. The server may initiate a key agreement process using a short-lived private key generated at the server and a public key of the device, generate a shared secret, and derive a symmetric key. The symmetric key may be used to encrypt a random challenge. Further, the server initiates a key agreement process for the client using the partial private key that was generated for the client and the short-lived public key generated at the server. A partial key agreement result and the encrypted random challenge may be transmitted to the client. The client may complete the key agreement process using the partial key agreement result and a respective portion of the private key. The client may derive the encryption key and decrypt the random challenge. An indication of the random challenge may be transmitted to the server, which authenticates the client.
PERSONAL DEVICE SECURITY USING CRYPTOCURRENCY WALLETS
A method of encrypting data at an electronic device where the electronic device is associated with a key device. Each device is associated with an asymmetric cryptography pair, each pair including a first private key and a first public key. Respective second private and public keys may be determined based on the first private key, first public key and a deterministic key. A secret may be determined based on the second private and public keys. The data at the electronic device may be encrypted using the determined secret or an encryption key that is based on the secret. Information indicative of the deterministic key may be sent to the key device where the information may be stored.
Cryptographic Pseudonym Mapping Method, Computer System, Computer Program And Computer-Readable Medium
The invention is a cryptographic pseudonym mapping method for an anonymous data sharing system, the method being adapted for generating a pseudonymized database (DB) from data relating to entities and originating from data sources (DS.sub.i), wherein the data are identified at the data sources (DS.sub.i) by entity identifiers (D) of the respective entities, and wherein the data are identified in the pseudonymized database (DB) by pseudonyms (P) assigned to the respective entity identifiers (D) applying a one-to-one mapping. According to the invention, one mapper (M) and one key manager (KM) are applied, and a respective pseudonym (P) is generated by the mapper (M), for each encrypted entity identifier (C.sub.i) encrypted by the data source (DS.sub.i), utilizing the mapping cryptographic key (hi) corresponding to the particular data source (DS.sub.i). The invention is further a computer system realizing the invention, as well as a computer program and a computer-readable medium.
Secure multiparty loss resistant storage and transfer of cryptographic keys for blockchain based systems in conjunction with a wallet management system
A solution for controlling access to a resource such as a digital wallet implemented using a blockchain. Use of the invention during set-up of the wallet can enable subsequent operations to be handled in a secure manner over an insecure channel. An example method comprises splitting a verification element into multiple shares; determining a common secret at multiple nodes in a network; and using the common secret to transmit a share of the verification element between nodes. The shares can be split such that no share is sufficient to determine the verification element and can be stored at separate locations. Upon share unavailability, the share can be retrieved a location accessibility. For safe transmission of the share(s), the common secret is generated at two different nodes independently and used to generate an encryption key for encrypting at least one share of the verification element to be transmitted securely.
REDUCTION AND CONVERSION OF A SCALAR TO A TAU-ADIC REPRESENTATION
The present disclosure relates to a cryptographic method including the execution, by a cryptographic circuit, of an algorithm applied to a scalar in order to generate an output vector, of length L+n, which digits are d.sub.0, . . . , d.sub.L+n−1, the algorithm comprising iterations i, each iteration i taking an input data value, initially equal to said scalar and an input vector of length c, which digits are d′.sub.i, . . . , d′.sub.i+c−1, where for each j∈{i, . . . , i+c−1}, the digit d′.sub.j is such that:
Systems and methods for preserving data integrity when integrating secure multiparty computation and blockchain technology
Disclosed herein are systems and methods for preserving data integrity when integrating secure multiparty computation (SMPC) and blockchain technology. In one exemplary aspect, a method may split, via a data publisher, data into a plurality of data secret shares using an SMPC protocol, wherein each secret share of the plurality of data secret shares is assigned to an SMPC compute node of a plurality of SMPC compute nodes and wherein the plurality of SMPC compute nodes may be members of a blockchain network. In some aspects, the method may determine parameters of a message authentication code (MAC) condition based on the data, may generate secret shares of the MAC condition parameters, and may include a plurality of MAC secret shares with the plurality of data secret shares.
Computer implemented method and system for transferring access to a digital asset
A method of transferring access to a digital asset is disclosed. The method comprises receiving a first blockchain transaction (4) from a first participant (6) by each of a plurality of second participants (8), (10). The first participant (6) has a first private key of a first private-public key pair of a cryptography system, and each participant (6), (8), (10) has a respective first share of a second private key of a second private-public key pair of the cryptography system, and the first blockchain transaction is signed with the first private key. Signature of the first blockchain transaction with the first private key is verified by each second participant (8), (10). A respective first share is applied to the first blockchain transaction to generate a respective second share of a second blockchain transaction signed with the second private key. Signature with the second private key is possible by means of a first threshold number of second shares and is inaccessible to less than the first threshold number of second shares. The first threshold number of second shares is combined from the first participant (6) and a plurality of the second participants (8), (10) generate the signature.
ENCRYPTED INFORMATION SHARING WITH LIGHTWEIGHT DEVICES
The disclosure relates to secure communications using cryptography. A method is disclosed that includes receiving a public key of a recipient; generating, by a sender, a symmetric key based on the public key of the recipient; encrypting, by a sender, a message using the symmetric key to generate an encrypted message; and transmitting a second public key of the sender and the encrypted message to the recipient.