H04L9/3218

MOBILITY DATA STORAGE METHOD AND SYSTEM
20220407705 · 2022-12-22 ·

A mobility data storage method executed by a plurality of vehicles each including a sensor and a processor coupled to the sensor, the processor of each of the plurality of vehicles being configured to store a local blockchain, the method includes, with the processor of the plurality of vehicles, attaching a sensor data pool, a random value that excess a threshold, and a verifiable random function (VRF) proof to a respective candidate block then broadcasting the candidate block to all other vehicles. Then, a particular candidate block whose random value is largest among the broadcasted candidate blocks is selected and verified with the VRF proof prior to be attached to the local blockchain.

CROSS-SESSION ISSUANCE OF VERIFIABLE CREDENTIAL
20220398299 · 2022-12-15 ·

Cross-session acquisition of a verifiable credential. The first session includes generating a user secret known to the first session and to the user, and the generation of an encrypted identity token that includes claims about authentication of the user and the user secrete. In the second session, a second computing system uses the acquired identity token to get a verifiable credential. The user is prompted to prove knowledge of the user secret within the identity token. In response to successful proof of this knowledge and validation of the identity token, the issuer system issues a verifiable credential that relies upon one or more claims that were included within the identity token, and then provides the verifiable credential to the user.

Methods and systems for enhancing privacy and efficiency on distributed ledger-based networks

One or more embodiments described herein disclose methods and systems that are directed at providing enhanced privacy, efficiency and security to distributed ledger-based networks (DLNs) via the implementation of zero-knowledge proofs (ZKPs) in the DLNs. ZKPs allow participants of DLNs to make statements on the DLNs about some private information and to prove the truth of the information without having to necessarily reveal the private information publicly. As such, the disclosed methods and systems directed at the ZKP-enabled DLNs provide privacy and efficiency to participants of the DLNs while still allowing the DLNs to remain as consensus-based networks.

STREAMING FRAUD DETECTION USING BLOCKCHAIN

Systems and methods for detecting fraudulent streaming activity. Streaming activity is posted to a blockchain by one or more DSPs. Blockchain streaming data is extracted from the blockchain and used as input in a machine learning model. The machine learning model takes the extracted blockchain data, along with additional inputs such as DSP trend pool and social pool inputs, and makes a determination regarding potentially fraudulent streaming activity.

FLEXIBLE AUTHENTICATION SERVICE FOR IOT DEVICES ACCOMMODATING NON-IP ENVIRONMENTS

Systems and method for flexible authentication of IoT devices that can accommodate non-IP environments are disclosed. One system includes a plurality of devices, with each device including a universal authentication agent and a verification certificate, wherein each verification certificate includes a proof that is recorded on an entry on a distributed ledger. The verification certificate proof is shared with one or more devices which verify the proof with the entry. A universal authentication service is configured with the universal authentication agent of at least one device to connect the at least one device with the distributed ledger.

CERTIFICATE-BASED REMOTE DYNAMIC ISOLATION OF IOT DEVICES USING DISTRIBUTED LEDGER TECHNOLOGIES

Methods and systems for remote dynamic isolation of IoT devices are provided. One system includes a first IoT device and a second IoT device configured with an active communication channel with the first IoT device and a role certificate. An operator device is configured to interact with a distributed ledger to issue and revoke role certificates for a plurality of devices including the first IoT device and the second IoT device. The first IoT device periodically validates a role certificate proof received from the second IoT device with an entry of the role certificate proof recorded on the distributed ledger.

Decentralized computing with auditability and taxability

A service running on a server includes a method running on a server, for example as a cloud server to provide a decentralized computing solution. The solution includes an audit service, a tax service or a combination thereof. The service includes providing a distributed registry that specifies a plurality of services available to support communications between a user device and a computer related device on a communication network. The pluralities of services specified by the distributed registry are presented to the user device. A request is received from the user device for a particular service from the plurality of services. The request may be made using a zero-knowledge protocol to maintain privacy of a user of the user device. The particular service includes an additional requested service for at least one of an auditability and taxability service. The particular service is provided along with the additional requested service.

Method and system for publicly verifiable proofs of retrievability in blockchains
11522706 · 2022-12-06 · ·

A method for securing a blockchain and incentivizing the storage of blockchain data using a publicly verifiable proof of retrievability (PoR) includes receiving a PoR transaction having a PoR proof, determining whether the PoR proof is a verified PoR proof, and based upon determining that the PoR proof is a verified PoR proof, incorporating, by a block creator node, the PoR transaction into a new block of the blockchain.

Digital credentials for secondary factor authentication
11522713 · 2022-12-06 · ·

The system for credential authentication comprises an interface and a processor. The interface is configured to receive a request from an application for authorization to access, wherein access to the application is requested by a user using a user device. The processor is configured to provide a login request to the user; validate a login response; determine a user authentication device based on the login response; provide a proof request to the user authentication device; receive a proof response; determine that the proof response is valid using a distributed ledger; generate a token; and provide the token to the application authorizing access for the user.

Efficient and secure distributed signing protocol for mobile devices in wireless networks

The techniques described herein may provide an efficient and secure two-party distributed signing protocol for the identity-based signature scheme described in the IEEE P1363 standard. For example, in an embodiment, a method may comprise generating a distributed cryptographic key at a key generation center and a first other device and a second other device and generating a distributed cryptographic signature at the first other device using the second other device.