H04L9/3297

METHOD AND SYSTEM FOR UNIQUE, PROCEDURALLY GENERATED DIGITAL OBJECTS VIA FEW-SHOT MODEL
20230222777 · 2023-07-13 ·

Disclosed herein is digital object generator that makes uses a one-way function to generate unique digital objects based on the user specific input. Features of the input are first extracted via a few-shot convolutional neural network model, then evaluated weight and integrated fit. The resulting digital object includes a user decipherable output such as a visual representation, an audio representation, or a multimedia representation that includes recognizable elements from the user specific input.

Methods and arrangements for vehicle-to-vehicle communications

Logic may implement protocols and procedures for vehicle-to-vehicle communications for platooning. Logic may implement a communications topology to distinguish time-critical communications from non-time-critical communications. Logic may sign time-critical communications with a message authentication code (MAC) algorithm with a hash function such as Keccak MAC or a Cipher-based MAC. Logic may generate a MAC based on pairwise, symmetric keys to sign the time-critical communications. Logic may sign non-time-critical communications with a digital signature. Logic may encrypt non-time-critical communications. Logic may append a certificate to non-time-critical communications. Logic may append a header to messages to create data packets and may include a packet type to identify time-critical communications. Logic may decode and verify the time-critical messages with a pairwise symmetric key. And logic may prioritize time-critical communications to meet a specified latency.

Multi-merchant loyalty point partnership

A blockchain-based multi-merchant loyalty point partnership system may include a blockchain API host that receives a request to create a partnership smart contract for a multi-merchant loyalty point partnership. The request may specify various partnership parameters to include in the partnership smart contract. The blockchain API host may create the partnership smart contract and write the partnership smart contract to a blockchain. One or more qualified merchants may join the partnership smart contract to make the partnership active. In response to a customer completing a plurality of purchases that complete the partnership parameters of the partnership smart contract, the system may issue the customer a purchase reward which may include a loyalty point payout.

Secure authorization for sensitive information
11700121 · 2023-07-11 · ·

Techniques for securing access to protected resources are provided. In the method and apparatus, an access key and proof of successful completion of a first authentication is obtained in connection to a request. The proof of completion of the first authentication and the access key are verified. The access key is then used to generate a determination that information in the access key indicates that a second authentication was successfully completed prior to allowing the request to be fulfilled.

Methods and systems for cryptographically secured outputs from telemedicine sessions
11700128 · 2023-07-11 · ·

A system for cryptographically secured outputs from telemedicine sessions includes a computing device at a first location, the computing device configured to initiate a secure communication interface between the computing device and a client device associated with a human subject and at a second location, receive, from at least a remote sensor at the second location, a plurality of current biological data associated with the human subject, input, using the secure communication interface, an identifier of a biochemical element, determine, as a function of the plurality of current biological data, a tolerability of the biochemical element, and generate a digitally signed authorization datum as a function of the determination.

Double wrapping for verification

Methods, systems, and devices for double wrapping for verification are described. In some cases, a memory subsystem can receive a firmware image for the memory subsystem where the firmware image is signed with a first signature according to a first signing procedure. The memory subsystem can then verify an integrity of the firmware image based on the first signing procedure. After verifying the integrity of the firmware image, the memory subsystem can then generate a second signature for the firmware image based on a second signing procedure different from the first signing procedure. The memory subsystem can then write the second signature to the firmware image. The memory subsystem can then perform a verification process to verify the integrity of the firmware image based on one or both of the first signing procedure or the second signing procedure. In this case, a first verification time is associated with the first signing procedure and is greater than a second verification time associated with the second signing procedure.

SYSTEMS AND METHODS FOR ENSURING CORRECT EXECUTION OF COMPUTER PROGRAM USING A MEDIATOR COMPUTER SYSTEM

In a distributed system, a first computer system may require computationally verifiable assurances of the authenticity and integrity of computations (e.g., performed as part of the execution of a program) performed by a second computer system. Methods described herein may be utilized to enforce and/or ensure the correct execution of a program. The first computer system may delegate execution of a program to a second computer system and a protocol may be employed to constrain the second computer system to perform a correct execution of the program. The protocol may include mitigation and correction routines that mitigate and/or correct the incorrect execution of a program. In various systems and methods described herein, the protocol may utilize a blockchain network such as a Bitcoin-based blockchain network.

CRYPTOGRAPHIC SYSTEMS AND METHODS USING DISTRIBUTED LEDGERS
20230216667 · 2023-07-06 · ·

The disclosure relates to, among other things, systems and methods for facilitating the secure recording of assertions made by entities tied to identities. Embodiments of the disclosed systems and methods may allow users to make non-revocable, difficult to forge, cryptographic assertions tied to their identities through the posting of entries in an immutable ledger. In certain embodiments, a user's cryptographic assertions may be preceded by ledger entries which feature certificates from trusted authorities that tie the keys used for making assertions to the user's identity. Further embodiments provide for a mechanism for disabling further entries posted under a user's key, either automatically or at the user's initiation.

DISTRIBUTED LEDGER TRACKING OF EVENT DATA

Techniques including data collection, organization and usage are provided, including in connection with computer-based gaming. Methods and systems are provided for establishing a set of data chronicling at least a portion of a duration of a computer-based gaming event that includes at least one user engaging in gaming using a computer or a computer-based device. Event data is obtained for chronicling chronologically ordered in-game events. Hardware and software related data is obtained that relates to the computer or the computer-based device and is relevant to the chronicling of the portion of the gaming event. Utilizing a distributed ledger technology or blockchain, the event data and the hardware and software related data are recorded in establishing the set of data chronicling at least a portion of the duration of the gaming event.

METHODS FOR EXTENDING A PROOF-OF-SPACE-TIME BLOCKCHAIN
20230214380 · 2023-07-06 ·

A method for extending a blockchain comprises, at a space server: allocating an amount of drive storage for generating proofs-of-space; or accessing a first challenge based on a prior block of the blockchain, the prior block comprising a first proof-of-space and a first proof-of-time; in response to accessing the first challenge, generating a second proof-of-space based on the first challenge and the amount of drive storage, the second proof-of-space indicating allocation of the amount of drive storage; accessing a second proof-of-time based on the prior block and indicating a first time delay elapsed after extension of the blockchain with the prior block; generating a new block comprising the second proof-of-space and the second proof-of-time; and broadcasting the new block over a distributed network.