Patent classifications
H04L9/0637
Method and system for state associated device identification for digital payments using blockchain technology
A method for maintaining state and event information for all of a user's devices associated in a common location using a blockchain where each block includes an event block and a device block within it, where each event and device block refers to an earlier block of the respective type, resulting in a blockchain-in-a-blockchain architecture. The device and event blocks store data regarding each device associated with a user and events related to the devices/user, respectively. Any time a new event occurs, or a device is registered or removed, a new set of blocks is created, where submissions regarding device changes or events can be made by any participant due to the decentralized and public nature of a blockchain. The result is a system where all data regarding a user's registered devices and events is kept in a common location in a manner that is auditable and verifiable.
Management of virtual goods in a blockchain-ledger based gaming architecture
Various embodiments provide management of virtual goods. In some embodiments, a gaming platform can be used to provide a secure ledger system for recording money transfer, play action, bets, analytics, gaming statistics, and the like, which are associated with virtual goods. Non-limiting examples of virtual goods comprise: characters; badges/icons; gameplay attributes; virtual money; cryptocurrencies; tokens; digital gifts; gameplay levels/add-ons; and prizes, among other examples. In some examples, gaming systems can directly interact with the distributed multi-ledger architecture for secure and transparent transactions which can also be accessed by auditors, tax authorities, partners, and/or other entities. Some examples may use private and/or public blockchains as part of the distributed multi-ledger gaming architecture. For instance, multiple distributed network nodes may be utilized to manage transaction records.
Data certification system and process for centralized user file encapsulation, encryption, notarization, and verification using a blockchain
A process for centralized user file encapsulation, encryption, notarization and verification using a blockchain and a system that certifies data in a proprietary “capsule” file format, with tamper-proof blockchain are disclosed. By utilizing a hybridization of both cloud and blockchain storage mechanisms, the present invention allows for the performant and cost-effective certification of large amounts of data. Furthermore, the generation of the capsule allows for users to store both the data payload and its digital notarization. The system then allows for users to share the capsule with others (by way of permissions enforced by the notary system) and upload it for verification of authenticity at a later point in time.
Storage architecture providing improved modification of access rights for stored data
A storage architecture and associated usage techniques are described for providing efficient modification and use of access rights for stored data. The access rights may be associated with data stored on blockchain storage, and a separate ledger storage system may be used to provide improvements for modifying access rights for such stored data. For example, groups of data may be created and stored on blockchain storage before access to the stored data groups is made available to end users, and additional information related to those stored data groups (e.g., about their access rights) may be stored in a separate ledger storage system. When a particular user later requests access rights for one of those previously stored data groups, corresponding modifications may be quickly made to the separate ledger storage system to provide the user with substantially immediate access to that stored data group.
Securing system-on-chip (SoC) using incremental cryptography
Various examples are provided related to software and hardware architectures that enable a lightweight incremental encryption scheme that is implemented on a System-on-chip (SoC) resource such as a network interface. In one example, among others, a method for incremental encryption includes obtaining, by a network interface (NI) of a sender intellectual property (IP) core in a network-on-chip (NoC) based system-on-chip (SoC) architecture, a payload for communication to a receiver intellectual property (IP) core; identifying, by the NI, one or more different blocks between the payload and a payload of a previous packet communicated between the sender IP core and the receiver IP core; and encrypting, by the NI, the one or more different blocks to create encrypted blocks of an encrypted payload.
Evidence oracles
Systems and methods are disclosed with respect to using a blockchain for managing the subrogation claim process related to a vehicle collision, in particular, utilizing evidence oracles as part of the subrogation process. An exemplary embodiment includes receiving recorded data from one or more connected devices at a geographic location; analyzing the recorded data, wherein analyzing the recorded data includes determining that an collision has occurred involving one or more vehicles; generating a transaction including the data indicative of the collision based upon the analysis; and transmitting the transaction to at least one other participant in the distributed ledger network.
Adaptive, multi-layer enterprise data protection and resiliency platform
A system for data protection includes a first computing device comprising a security module; and a storage device coupled to the first computing device via a network interface. The security module comprises at least one of Software Root of Trust (SRoT) and Hardware Root of Trust (HRoT). The security module is further configured to: establish a trust channel between the first computing device and the storage device or storage service; monitor the first computing device and the storage device; create and enforce multi-dimensional data access control by tightly binding data access and permissions to authorized computing devices, users, applications, system services, networks, locations, and access time windows; and take over control of the storage device or storage service in response to a security risk to the system.
Digital identity network interface system
There is a provided a digital identity network interface system that may include a communications module and a processor. The processor may be configured to receive a signal representing a digital identity request, the digital identity request defining one or more scopes associated with the request, at least one of the scopes identifying a data type associated with the request, generate a query based on the scopes by translating at least one of the scopes into a query having a query format associated with a digital identity network, the digital identity network storing data associated with a plurality of users, send a signal representing the query to the digital identity network, send a link to an authorization device, after successful authentication, obtain data associated with the digital identity request from the digital identity network, and release at least some of the data.
METHOD AND SYSTEM FOR ENCRYPTING DATA
A method for encrypting data based on all-or-nothing encryption includes: providing, by an encryption system, data to be encrypted and an encryption key; dividing, by the encryption system, the data into an odd number of blocks, wherein each of the blocks has the same size; encrypting, by the encryption system, the blocks with the encryption key to obtain an intermediate ciphertext c′ comprising intermediate ciphertext blocks c.sub.0′, . . . , c.sub.N′, wherein c0′ corresponds to a random seed and c.sub.1′, . . . , c.sub.N′ corresponds to the encrypted blocks; and obtaining, by the encryption system, a final ciphertext c using the intermediate ciphertext c′. An intermediate overall ciphertext t is obtained based on XOR'ing the intermediate ciphertext blocks c.sub.0′, . . . , c.sub.N′; and obtaining a plurality of final ciphertext blocks c1, . . . cN by XOR'ing respective intermediate ciphertext blocks c.sub.1′, . . . , c.sub.N′ with the intermediate overall ciphertext t.
System and methods for computation, storage, and consensus in distributed systems
From the enterprise cloud to robot swarms, distributed systems are everywhere. However, because these systems are realized through the careful coupling of disparate technologies (e.g., databases, messaging systems, and application runtimes), they are difficult to create and maintain—even for experienced engineers. This is a problem because the engineers of these systems have to work harder, be better trained, and thus cost more to employ, making it harder to create new products and inventions. A solution herein is a Data Backbone that provides a single medium for processing, storing, and sharing data in near-real-time. By combining these features into a single medium, the Data Backbone consolidates the functionality of several disparate tools into one system.