H04L9/3247

ESTABLISHING COLLABORATIVE BREEDING PARAMETERS AND OWNERSHIP RIGHTS VIA UNIQUE IDENTITY ASSET MARKERS, AND RELATED SOFTWARE, METHODS, AND SYSTEMS
20230045080 · 2023-02-09 ·

A method of establishing collaborative breeding parameters using blockchain technology is provided. The method may include providing a first user and a second user. The first user may own a first UIAM (unique identity asset marker) token corresponding to a first genomic asset and the second user may own a second UIAM token corresponding to a second genomic asset. The method may further include providing the first and second UIAM tokens and receiving a Ricardian contract with terms governing ownership rights for offspring. The Ricardian contract may be digitally executed and published on at least one blockchain. The method may further include minting a third UIAM token corresponding to a first offspring of the first and second genomic assets to the at least one blockchain. The third UIAM token may reflect the terms of the Ricardian contract and may evidence lineage of both the first and the second UIAM tokens.

Hands free interaction system and method

A method is disclosed. The method includes receiving a broadcast signal from a beacon device, the broadcast signal encoding a first credential associated with a first entity. In response to receipt of the broadcast signal, the mobile communication device transmits the received first credential to an authentication system. The authentication system determines if the first entity associated with the broadcast signal is authentic and generates a confirmation message confirming the authenticity of the first entity. The mobile communication device then receives the confirmation message indicating that the first entity is authentic. The mobile communication thereafter receives and transmits a second credential for the mobile communication device to the beacon device, which transmits the second credential to the authentication system. The authentication system then confirms the authenticity of the mobile communication device. Then, the beacon device can initiate an interaction process with the user of the mobile communication device.

Integrated secure device manager systems and methods for cyber-physical vehicles

Systems and methods are described for a cyber-physical vehicle management system generated by an Integrated Secure Device Manager (ISDM) Authority configured to manage licensing and approval of Cyber-Physical Vehicle (CPV)s, a public/private key pair and a unique ID for the Authority, create a self-signed Authority token signed by the private key, send the Authority token to a plurality of ISDM Node device configured to verify Module device authenticity and in communication with the Authority, store, by each Node, the Authority token, and mark, by each Node, the Authority token as trusted.

Cryptographic data communication apparatus

In one embodiment, data communication apparatus includes a network interface for connection to a network and configured to receive a sequence of data packets from a remote device over the network, the sequence including data blocks, ones of the data blocks having block boundaries that are not aligned with payload boundaries of the packets, and packet processing circuitry to cryptographically process the data blocks using a block cipher so as to write corresponding cryptographically processed data blocks to a memory, while holding segments of respective ones of the received data blocks in the memory, such that the packet processing circuitry stores a first segment of a data block of a first packet in the memory until a second packet is received, and then cryptographically processes the first and second segments together so as to write a corresponding cryptographically processed data block to the memory.

Unlocking a data storage device

Disclosed herein is a data storage device comprising a data path and an access controller. The data path comprises a data port configured to transmit data between a host computer and the data storage device. The data storage device is configured to register with the host computer as a block data storage device. A non-volatile storage medium stores encrypted user content data and a cryptography engine is connected between the data port and the storage medium and uses a cryptographic key to decrypt the encrypted user content data. The access controller generates a challenge for an authorized device; sends the challenge to the authorized device; receives a response to the challenge from the authorized device over the communication channel; calculates the cryptographic key based on the response; and provides the cryptographic key to the cryptography engine to decrypt the encrypted user content data stored on the storage medium.

Internet data usage control system
11556959 · 2023-01-17 · ·

A method for seamlessly and automatically granting tailored permission for use and transference of internet data between databases with comprehensive consent is described. The method employs a graph language such as JSON-LD to integrate and employ cryptographically signed Information Sharing Agreements (ISA) between parties. Data is serialized to be easily transferred between databases when appropriate permission is obtained. Granular data exchange under usage control contacts can be automated among any number of parties on the internet. As such, the method provides a means by which users may control not only what may be done with their data, but to what entity or entities the data may be transferred. Advertisements may then be served to the user according to his or her preferences as defined within a web or desktop app, which is then applied to all related ad publishers publishing to the domains visited by the user.

Electric vehicle charger and related methods

An electric vehicle charger includes a power supply and a controller. The power supply is for supplying electric power over a charging connection to an electric vehicle. The charging connection employs charging conductors to supply electric power from the power supply to the electric vehicle for charging. The power supply is adapted to send data to and receive data from the electric vehicle over the charging conductors according to a power-line communications protocol. The controller coupled to the power supply to control supply of electric power to the electric vehicle, The controller is adapted to, prior to initiating supply of electric power by the power supply to the electric vehicle for charging, communicate with the electric vehicle to identify a payment method associated with the electric vehicle and with the payment network to authorize the payment method for payment for electric power supplied to the electric vehicle for charging.

Blockchain enabled service request system

Systems and methods for establishing and fulfilling a smart contract between users and service providers are disclosed. A method includes creating, by one or more nodes in a computer network, a smart contract in response to a request from a user for services and providing the smart contract to a blockchain. The method then includes notifying service providers of the smart contract and receiving responses to the notifications from the service providers. Then the method includes identifying one or more service providers that can complete the service. The method then includes updating the smart contract to include data about the identified service providers. The updated smart contract includes account information for a user account of the user, and account information for service provider accounts of the identified service providers. Then a value interaction is initiated that pushes value from the user account to the service provider accounts.

Universal payment channels

Systems and methods for transferring value. A method includes posting, by a user device to a blockchain, a deposit transaction comprising a deposit value and conditions and updating, by the user device, a state according to a transaction amount. The method also includes transmitting, by the user device, a state update of the state to a server computer and responsive to transmitting the state update, and receiving, by the user device, a payment complete message comprising a tuple from the server computer. The method also includes verifying, by the user device, the conditions and processing, by the user device, a server deposit transaction on the blockchain in response to verifying.

Method and system to facilitate assessment, authorization, and monitoring of policy documents related to an organization
11558182 · 2023-01-17 ·

A method for facilitating assessment, authorization, and monitoring of policy documents in organizations for cyber security. The method includes a process of receiving indications of policy documents related to an organization from a user, thus, allowing the user to manager cyber security controls of written policy documents in accordance with regulations and standards. The method also includes retrieving regulations from external databases. Further, the method includes analysis of policy documents against regulations and generating insights. Subsequently, the method transmits the generated insights and/or reports to the user. Further, the method includes receiving monitoring data related to the organization from one or more user's PC devices. Further, the method uses a MD5 (Message Digest algorithm 5) hashing function to ensure that a document has not been tampered with and may include a time-based trigger utilizing a standard green/yellow/red light chart for ongoing authorizations and monitoring.