H04L9/321

Blockchain generation apparatus, blockchain verification apparatus, and program

The blockchain generation apparatus 1 includes: a parameter calculator 122 that identifies a parameter type to be used for linkage of the new block, based on block approval method data 114, and calculates a value for the identified parameter type based on transaction datasets which are related to an identifier of a generating party; a block generation condition checker 125 that determines whether the generating party is qualified to generate the new blockchain data, based on the value calculated by the parameter calculator 122; and a blockchain generator 126 that tries to generate the new blockchain by referring to the shared data when the block generation condition checker 125 determines that the generating party is qualified. An identifier of the blend pattern included in the block approval method data 114 specifies a combination of the plurality of parameter types that conflict with each other.

ACCESS CONTROL APPARATUS, CONTROL METHOD, AND NON-TRANSITORY COMPUTER READABLE MEDIUM
20230024635 · 2023-01-26 · ·

An access control apparatus (2000) acquires a request (20) for access to data stored in a first storage apparatus 30. The access control apparatus (2000) acquires privilege information (70) from a blockchain storage (40). The privilege information (70) represents access privilege pertaining to access to the first storage apparatus (30). The access control apparatus (2000) determines whether requested access is within a range of the access privilege of a target entity (10) being a subject of the request (20), by using the privilege information (70) of the target entity (10). When it is determined that the access is within the range of the access privilege of the target entity (10), the access control apparatus (2000) executes the access.

SYSTEMS, DEVICES AND METHODS FOR USING A CENTRAL SERVER TO PROVIDE MULTI-TIERED ACCESS AND CONTROL OF A COMPUTER DEVICE
20230028528 · 2023-01-26 ·

Systems and methods for controlling and tracking computer devices using a secure communication path between a central server and a machine control-file watchdog program. One or more machine control-files can be generated to control, limit and track a computer device using a machine control-file watchdog program. The system sets limits on the computer device to ensure the user operating the computer device stays within a restricted set of usage limitations. The machine control-file watchdog program protects the one or more machine control-files and additionally can report on all activities performed by the computer device to the central server.

METHOD AND SYSTEM FOR A VERIFIABLE IDENTITY BASED ENCRYPTION (VIBE) USING CERTIFICATE-LESS AUTHENTICATION ENCRYPTION (CLAE)
20230231714 · 2023-07-20 ·

Solutions of verifying a plurality of public parameters from a Trusted Centre (TC) in an identity-based encryption and signature system prior to encrypting a plaintext message by a sender having a sender identity string. The method may include identification of the Trusted Centre by a TC identity string, the Trusted Centre having a master public encryption key based on the TC identity string; determination if the sender has a sender private key and the public parameters for the Trusted Centre including the master public key of the Trusted Centre and a bilinear map; and verification of the public parameters using the TC identity string prior to encrypting the plaintext message into a ciphertext by comparing values of the bilinear map calculated with variables comprising the sender private key and the master public key. The ciphertext may include an authentication component for authenticating the sender once the ciphertext is received and decrypted by the recipient using the identity string of the sender and the private key of the recipient. Enables a signature scheme from the same parameters and private keys, the signature is forged using the private key of the signer, the message and the public parameters, the verification is done using the public parameters, the identity of the signer, the signature and the message.

MECHANISM FOR UNALTERABLE, NONREPUDIABLE CONFIGURATION AUDITING WITHIN CRYPTOGRAPHIC SELECTION SCHEMES

The disclosure provides an approach for auditable cryptographic agility. Embodiments include receiving, by a cryptographic agility system, a request to perform a cryptographic operation related to an application. Embodiments include selecting, by the cryptographic agility system, a cryptographic technique for performing the cryptographic operation based on contextual information associated with the request. Embodiments include performing, by the cryptographic agility system, the cryptographic operation using the cryptographic technique. Embodiments include writing, by the cryptographic agility system, data related to selecting the cryptographic technique to a secure digital ledger.

ANONYMOUS, AUTHENTICATED AND PRIVATE SATELLITE TASKING SYSTEM
20230231699 · 2023-07-20 ·

Systems, methods and devices for implementing cryptographic and security-in-depth techniques on-board spacecrafts or satellites are provided, to allow users to task activities or retrieve satellite data from the satellite system in an anonymous, secure, safe, and private manner, such that no other user sharing the satellite system resources can know what has been tasked or transmitted to the ground. Considerable advantages can be realized by providing spacecraft or satellite systems with a substantial capacity of applying security-in-depth and cryptographic techniques and protocols to data and requests, based on autonomous tasking, allowing a secure, safe and private use of spacecraft or satellite resources.

Blockchain-based Authentication of Artwork
20230229742 · 2023-07-20 · ·

A system and method for linking authentication documents to a piece of artwork using blockchain. The method includes maintaining a blockchain with a plurality of computing devices; obtaining one or more documents comprising data corresponding to a piece of artwork; generating a document hash for each of the one or more documents based on text contained in the respective documents; generating a frequency hash based on a light wave frequency; appending a block instance to the blockchain by generating a block address based on the document hashes for the one or more documents, the frequency hash, and an identification of the piece of artwork; and transmitting instructions to a seal coating device, receipt of the instructions causing the seal coating device to apply a seal coating to the piece of artwork and a certificate containing the document hashes for the one or more documents.

Remote device linkage for secure communications

Embodiments of the present invention provide a system for facilitating a secure way to allow primary users and secondary users to perform interactions remotely via an automated machine, such as an automated teller machine (ATM). In particular, the system may assign exclusive control over an automated device to a primary user via a computing device connected to the same local network or virtual private network as the automated machine, and may allow the primary user to communicate via the automated machine with a secondary user who wishes to complete one or more resource interactions. In some embodiments, the system may invoke one or more auxiliary devices on the same network to complete the interaction.

ARTIFICIAL INTELLIGENCE PIPELINE NON-FUNGIBLE TOKEN AND EXECUTION METHOD THEREOF

The present disclosure relates to a non-transitory storage medium for storing program code and a method of executing an artificial intelligence (AI) pipeline non-fungible token (NFT). The program code is executed by a hardware processor to mint a blockchain-based NFT including ownership information of the AI pipeline, request an execution of the program code performing a predetermined function in an event node executing the AI pipeline according to a request of execution of an NFT owner, connect to at least one worker node to execute a target AI pipeline of the NFT, receive an execution result value of the worker node to record a proof-of-work for the execution result value in the event node, and collect the execution result value of the worker node on which the proof-of-work is performed is performed to change a blockchain state.

METHODS FOR SECURE CRYPTOGRAM GENERATION

A computer-implemented method performed by a user device is provided. The computer-implemented method includes receiving a message including an encrypted credential from a server computer; determining a response shared secret using a private key and a server public key; decrypting the encrypted credential using the response shared secret to determine a credential; obtaining a key derivation parameter from the credential; determining a first cryptogram key using the key derivation parameter; generating a first cryptogram using the first cryptogram key; and sending the first cryptogram to a second computer.