Patent classifications
H04L9/3221
SYSTEMS AND METHODS FOR ENSURING CORRECT EXECUTION OF COMPUTER PROGRAM USING A MEDIATOR COMPUTER SYSTEM
In a distributed system, a first computer system may require computationally verifiable assurances of the authenticity and integrity of computations (e.g., performed as part of the execution of a program) performed by a second computer system. Methods described herein may be utilized to enforce and/or ensure the correct execution of a program. The first computer system may delegate execution of a program to a second computer system and a protocol may be employed to constrain the second computer system to perform a correct execution of the program. The protocol may include mitigation and correction routines that mitigate and/or correct the incorrect execution of a program. In various systems and methods described herein, the protocol may utilize a blockchain network such as a Bitcoin-based blockchain network.
Distributed key secret for rewritable blockchain
A system includes circuitry for rewriting blockchains in a non-tamper-evident or tamper-evident operation using a key secret held in portions by multiple individually untrusted parties. The blockchains may include a series of blocks secured by integrity codes that may prevent non-tamper-evident rewrites by non-trusted parties that are not in possession of the key secret or individually-untrusted parties in possession of only a portion of the key secret. In some cases, multiple individually-untrusted parties may combine their portions into the key secret. As a group, the multiple individually-untrusted parties may perform non-tamper-evident operation with respect to at least one integrity code within the blockchain.
Systems and methods for ensuring correct execution of computer program using a mediator computer system
In a distributed system, a first computer system may require computationally verifiable assurances of the authenticity and integrity of computations (e.g., performed as part of the execution of a program) performed by a second computer system. Methods described herein may be utilized to enforce and/or ensure the correct execution of a program. The first computer system may delegate execution of a program to a second computer system and a protocol may be employed to constrain the second computer system to perform a correct execution of the program. The protocol may include mitigation and correction routines that mitigate and/or correct the incorrect execution of a program. In various systems and methods described herein, the protocol may utilize a blockchain network such as a Bitcoin-based blockchain network.
Data provenance
Methods, systems, and devices for wireless communications are described. Aspects include a device generating data to be sent to a receiving device and determining to provide provenance for the data. The device may generate a data identifier based on an identifier generation key and encrypt the data using an encryption key generated from a key associated with an owner of the device. The device may sign they encrypted data transmission using a signing key where the signing key is based on the encrypted data and the data identifier. In some cases, the device may send the data to a receiving device via one or more proxy devices. In some cases, multiple device may send signed data transmissions to a proxy device and the proxy device may process the multiple data transmission and send the processed data to the receiving device. The receiving device may verify provenance of the data.
Zero-knowledge proof-based virtual cards
Disclosed are various embodiments for issuing virtual cards to client devices. Also disclosed are embodiments for provisioning a transaction terminal to process transactions with virtual cards. A zero-knowledge proof algorithm can be utilized to validate the transactions. A virtual card can be based upon a public key of a client device that is managed by a hardware security module.
GENERATION DEVICE, GENERATION METHOD, AND VERIFICATION DEVICE
The generation device (20) is a generation device for generating certification information used for verification using zero-knowledge proof, and includes a conditional expression generation unit (23a) and a certification information generation unit (23b). The conditional expression generation unit (23a) generates, for different conditions, a plurality of conditional expressions that defines confidential information under one or more conditions. The certification information generation unit (23b) generates, as the certification information, a plurality of proofs based on each of the conditional expressions.
PRIVACY PRESERVING EXPOSURE AND/OR ATTRIBUTION DETERMINATION BY MOBILE DEVICE
For privacy-preserving attribution, the exposure and/or attribution to physical media (e.g., a surface or object) is determined on-board the mobile device. The exposure and/or attribution may be communicated remotely from the mobile device without passing specific locations and/or identifiers of the operator. The attribution information may be used by others without having access to private information, which never leaves the mobile device.
Methods and systems for enhancing privacy and efficiency on distributed ledger-based networks
One or more embodiments described herein disclose methods and systems that are directed at providing enhanced privacy, efficiency and security to distributed ledger-based networks (DLNs) via the implementation of zero-knowledge proofs (ZKPs) in the DLNs. ZKPs allow participants of DLNs to make statements on the DLNs about some private information and to prove the truth of the information without having to necessarily reveal the private information publicly. As such, the disclosed methods and systems directed at the ZKP-enabled DLNs provide privacy and efficiency to participants of the DLNs while still allowing the DLNs to remain as consensus-based networks.
MULTIFACTOR AUTHENTICATION USING BLOCKCHAIN TRANSACTIONS
A method of providing credentials to enable a second party to verify an identity of a first party. The first party is associated with a first public key which is registered with a third party. One or more first credentials are provided to the second party. A request transaction is obtained, which comprises a) an input comprising a signature generated based on a respective private key of the third party, and b) an output locked to a second public key of the first party. The second public key is based on the first public key. A confirmation transaction is generated. The confirmation transaction comprises an input that references the output of the request transaction, and a signature generated based on a private key corresponding to the second public key of the first party. The confirmation transaction is transmitted to nodes of a blockchain network for inclusion in a blockchain.
Systems and methods for distributed control of manufacturing processes
Embodiments of the present disclosure provide systems and methods for controlling a manufacturing process in a manner that protects sensitive information from misuse by different entities involved in the manufacturing process. According to the present disclosure, a blueprint providing information regarding subcomponents of a product to be manufactured may be provided to a synthesizer device. The synthesizer device may engage in two-party computation with IP providers to generate a set of machine commands, which may be encrypted, and then provide a message including the set of machine commands to a manufacturer device. The manufacturer device may obtain authorization from the IP provider(s) based on the message, where the authorization may enable the manufacturer device to configure a manufacturing process in accordance with the set of machine commands to manufacture the subcomponents of the product.