H04L9/3234

BLOCKCHAIN-BASED SUPERVISION SYSTEM OF HAZARDOUS CHEMICAL PRODUCTION
20230125955 · 2023-04-27 ·

A blockchain-based supervision system of hazardous chemical production includes: a collection layer, for collecting production data information, wherein a collection device in the collection layer sets a TEE to encrypt or hash the collected production data information; a data layer, for uplinking a hash certificate of the production data information through an alliance chain, wherein the collection layer communicates with the data layer; a blockchain, for deploying a file uplink contract and encrypting and storing a file on a privacy computing server after the file is connected to the trusted environment; and a privacy computing system, for forming a metadata market of the data from file description information, recording the metadata information of the collected data. A data user applies for the right of use to a production enterprise that produces the data, and after obtaining authorization, the data user performs various applications on the privacy computing system.

COMMUNICATION APPARATUS, METHOD FOR CONTROLLING COMMUNICATION APPARATUS, AND STORAGE MEDIUM
20230069912 · 2023-03-09 ·

A communication apparatus includes a generation unit configured to generate a new pair of a public key and a secret key paired with the public key in a case where a predetermined condition is satisfied, a provision unit configured to externally provide information including at least the public key generated by the generation unit, a first reception unit configured to receive, from an external apparatus after the information is provided by the provision unit, an authentication request including information generated using at least the public key, a transmission unit configured to transmit, to the external apparatus, an authentication response as a response to the authentication request in a case where the authentication request is received, and a second reception unit configured to receive, from the external apparatus after the authentication response is transmitted to the external apparatus, configuration information including a communication parameter.

SYSTEM AND METHOD FOR INTERNAL ETCHING SURFACES OFTRANSPARENT MATERIALS WITH INFORMATION PERTAINING TO ABLOCKCHAIN
20230128931 · 2023-04-27 · ·

In one embodiment, a system including a tangible token comprising a single integrated transparent gemstone produced by fusing together a first transparent gemstone and a second transparent gemstone, a first internal side of the first transparent gemstone is etched with information pertaining to a blockchain, and the information comprises at least a private key, a public key, and an address, the first internal side of the first transparent gemstone is aligned with a second internal side of the second transparent gemstone, and the aligning encapsulates the information within a perimeter of the second internal side such that the information does not extend beyond the perimeter. The system includes a computing device that executes instructions to: read the information, validate, via a network and the address, the public key and private key are associated with the blockchain, and present an indication of whether or not the information is validated.

SYSTEM AND METHOD FOR PROVIDING ACCESS TO SECURED CONTENT FIELD
20230131790 · 2023-04-27 ·

A computer-implemented system and method for providing access to secured content on a provisioning entity system are disclosed, the method may include: receiving, from a requesting entity system, a plurality of user requests to access the secured content stored at the provisioning entity system; determining, for each of the plurality of user requests, a respective user ID; generating, for each of the plurality of user requests, a respective trusted token based on the respective user request, the trusted token comprising at least a variable term different for each of the trusted tokens generated for the plurality of user requests; adding a proof of authentication to each of the trusted tokens to enable the provisioning entity system to validate the respective trusted token; and transmitting at least one of the trusted tokens to the requesting entity system.

External Activation of Quiescent Device

After installation, a device may be not yet powered. It may be awakened by receiving a flash of light of sufficient frequency and amplitude. After waking, the device decodes the message to determine its next action, and, upon request sends an authentication message. This enables a single user action to wake the device up and set it up with networking credentials. The same process may be used to wake the device outside of a normal sleep-wake cycle.

System and Method for Authentication Using Non-Fungible Tokens
20230128790 · 2023-04-27 ·

In an example, a non-transitory machine-readable storage medium includes stored instructions. The store instructions, when executed by one or more processors, cause the one or more processors to: receive a unique identifier of a tagged physical good; receive a public key stored in a Non-Fungible Token (NFT) corresponding to the unique identifier; encrypt a first passphrase using the public key to obtain an encrypted passphrase; compare a second passphrase to the first passphrase; and generate an output indication in response to comparing the second passphrase to the first passphrase. The second passphrase is generated by decrypting the encrypted passphrase using a private key stored on an electronic tag device embedded in the tagged physical good.

COMPONENT TRACKING FOR INFORMATION HANDLING SYSTEMS

Systems and procedures are provided for tracking hardware components of an IHS (Information Handling System). During factory provisioning of an IHS, an inventory certificate to the IHS is stored to the IHS that includes an inventory identifying factory-installed hardware components of the IHS. Also during the factory provisioning, a record is stored in a component datastore of the factory-installed hardware specified in the inventory certificate. Upon initialization of the delivered IHS, a pre-boot validation environment is initialized on the IHS and the stored inventory certificate is retrieved and used to validate the detected hardware components of the IHS. The results of the validation are then reported to a component datastore, where they are used to identify any transfer of a factory-installed hardware component. The factory datastore is updated in subsequent validations to reflect any detected modifications to the IHS in tracking genuine components.

GENERATING AN INVENTORY CERTIFICATE FOR VALIDATION OF INFORMATION HANDLING SYSTEMS

Systems and procedures are provided for provisioning an IHS (Information Handling System) to support validation of hardware components of the IHS. As part of manufacture of the IHS, an inventory of factory-installed hardware components of the IHS is generated. During factory provisioning, cryptographic capabilities of the IHS are used to generate a keypair, with the generated private key stored to a protected memory of the IHS. The inventory of factory-installed hardware components is signed using the private key. A trusted component of the IHS generates a certificate signing request (CSR) including the public key of the generated keypair, the digitally signed inventory and extensions identifying the factory-installed hardware components. A signed identity certificate is generated that attests to the digitally signed inventory, ownership of the private key corresponding to the public key from the CSR, and the extensions identifying the factory-installed hardware components of the IHS.

Recognizing assigned passengers for autonomous vehicles

Aspects of the disclosure provide systems and methods for recognizing an assigned passenger. For instance, dispatching instructions to pick up a passenger at a pickup location are received. The instructions include authentication information for authenticating a client computing device associated with the passenger. A vehicle is maneuvered in an autonomous driving mode towards the pickup location. The client device is then authenticated. After authentication, a set of pedestrians within a predetermined distance of the vehicle are identified from sensor information generated by a sensor of the vehicle and location information is received over a period of time from the client device. The received location information is used to estimate a velocity of the passenger. This estimated velocity is used to identify a subset of set of pedestrians that is likely to be the passenger. The vehicle is stopped to allow the passenger to enter the vehicle based on the subset.

Methods and apparatus for implementing a secure database using programmable integrated circuits with dynamic partial reconfigurability
11475145 · 2022-10-18 · ·

A programmable logic device that is interposed between a client device and a database server is provided. The client device may issue read and write queries to the programmable logic device. The programmable logic device may serve as a cache. For read queries, confidential data that is stored locally on the programmable device or retrieved from the database server may be encrypted before sending it back to the client device. Non-confidential data may be left unencrypted and can be sent back to the client device in unencrypted form. The programmable logic device may be partially reconfigured during runtime to update database securities settings without causing unnecessary downtime for the overall system.