Patent classifications
H04L9/3247
BLOCKCHAIN BASED OWNERSHIP VERIFICATION
A method may include obtaining, by a first entity, a verification key from a second entity to which an asset is to be transferred. The method may also include proving to an administrator of a blockchain that the first entity is a current owner of the asset, the blockchain hosting a token associated with the asset. The method may additionally include providing an updated randomness value and the token to the second entity. The method may also include sending an updated hash value of the token and the updated randomness, a signed indication of the transfer of the asset from the first entity to the second entity, and the verification key of the second entity to an administrator of the blockchain.
Systems, apparatus and methods for backing up and auditing distributed ledger data within a network and securely without using private keys
In some embodiments, a method includes generating, based on distributed ledger data associated with a first distributed ledger-based network (DLN), distributed ledger data associated with a second DLN. The first DLN and the second DLN each is a fork and the distributed ledger data associated with the first DLN include account data associated with a set of accounts. The method includes generating a request to initiate a transaction between a first account and a second account. The method includes authenticating the transaction based on a protocol associated with the second DLN and without using a private cryptographic key of the first account. The method includes sending a signal indicating the transaction was authenticated and storing information associated with the transaction in the distributed ledger data associated with the second DLN.
Blockchain-based decentralized public key management system
A decentralized public key management system for named data networks based on blockchain, which solves the Compromised Certificate Authority (CA) Problem. The system divides the power of an individual CA among multiple Public Key Miners (PKMiners) that maintain the public key blockchains. The majority rule in name-principal validation allows the present invention to tolerate compromised PKMiners without causing any damage.
Permissions from entities to access information
In some examples, in response to a request from a client device for information relating to a transaction stored by a blockchain, a system identifies, using information stored in a distributed storage system that stores data for the blockchain, multiple data owner entities from which permissions are to be obtained for access of the information, and determines an authorization requirement for the information based on a smart contract. The system sends authorization information based on the authorization requirement to trigger a retrieval of authorization tokens from the identified data owner entities for access of the information, and sends the information to the client device in response to receiving the authorization tokens.
Systems, methods, and apparatus for software defined silicon security
Methods, apparatus, systems and articles of manufacture (e.g., physical storage media) for software defined silicon security are disclosed. Example apparatus include a trusted agent determiner to (i) determine respective reputation scores associated with a plurality of agents in a mesh network, the plurality of agents associated with a plurality of semiconductor devices, respective ones of the semiconductor devices including circuitry configurable to provide one or more features, and (ii) select, based on the respective reputation scores, a first agent from the plurality of the agents to transmit a request to activate or deactivate at least one of the one or more features. Example apparatus also include an agent interface to, in response to the request, broadcast an activation or deactivation of the least one of the one or more features to the mesh network to cause the trusted agent determiner to update the reputation score of the first agent.
Storage system communication
A method for authorizing I/O (input/output) commands in a storage cluster is provided. The method includes generating a token responsive to an authority initiating an I/O command, wherein the token is specific to assignment of the authority and a storage node of the storage cluster. The method includes verifying the I/O command using the token, wherein the token includes a signature confirming validity of the token and wherein the token is revocable.
Global resource locator label
A global resource locator (GRL) device can be used to track a physical asset. The GRL device can a semiconductor chip with a processor and a timing device. The semiconductor chip can generate a timing signal. The GRL device can include a blockchain, a communication device, and a memory in logical communication with the processor. The memory can store an identifier, a public key, a private key, and a hash. The communication device can communicate wirelessly with an authenticated radio source, the micro sized timing device, and the blockchain. Each authenticated radio source can be located at a respective reference location. The communication device can receive wireless timing signals from at least three authenticated radio sources. The GRL device can be affixed to a product.
Sales system, server, and processing method for sales system
According to the present invention, there is provided a sales system (10) that includes a plurality of information acquisition units (11-1 to 11-N (N is an integer equal to or greater than 2)) installed for a plurality of respective products, a registration unit (12) that registers a product corresponding to a first information acquisition unit (11-A (A is an integer equal to or greater 1 and equal to or smaller than N)) in association with customer identification information when the customer identification information is input through the first information acquisition unit (11-A), a reception unit (13) that receives a request for a product list associated with the customer identification information from a customer terminal, and a transmission unit (14) that transmits the product list to the customer terminal in response to the request.
Proof-of-approval distributed ledger
A method and system for determining whether a consensus has been achieved for adding a block to a distributed ledger. The system receives a candidate block to add to the distributed ledger and receives block approvals of approving participants for the candidate block. The system calculates a total block approval stake that the approving participants have in the distributed ledger. The system identifies a total stake that participants have in the distributed ledger. When the total block approval stake is at least a threshold fraction of the total skate, the system indicates that the consensus has been achieved for adding the candidate block to the distributed ledger.
Wireless security protocol
This disclosure relates to a data storage device. A data port transmits data between a host computer system and the data storage device over a data channel. The device repeatedly broadcasts advertising packets over a wireless communication channel different from the data channel. Each advertising packet comprises a random value and a message authentication code calculated based on the random value and an identity key. The identity key is readable by a device to be connected and in proximity of the data storage device out of band of the data channel and the communication channel. The identity key enables the device to be connected to verify the message authentication code based on the random value and the identity key to thereby authenticate the data storage device.