H04L9/3252

COMPUTER IMPLEMENTED METHOD AND SYSTEM FOR STORING CERTIFIED DATA ON A BLOCKCHAIN

A method of storing certified data on a blockchain is disclosed. The method comprises generating a first blockchain transaction (Tx1) having a first output (Output 3) containing a first public key of a first private/public key pair, comprising a first private key and a first public key, of a cryptography system, first data related to the first public key, and a first digital signature applied, by means of a second private key of a second private/public key pair, comprising a second private key and a second public key, of a cryptography system, to the first data and to the first public key. The first blockchain transaction is broadcast to the blockchain.

SYSTEM AND METHOD FOR A DISTRIBUTED LEDGER TRACKING ANIMALS
20230055736 · 2023-02-23 · ·

Disclosed are a system and method for using a distributed ledger for the tracking of animals. The system and method make use of blockchain and NFTs to track living animals throughout their lives. These animals can include livestock, including cattle, pigs, chicken, horses, oxen, mules, etc., as well as for, e.g., verified tracking of wildlife such as deer, elk, bear, moose, birds, antelope. Animals may be tagged with a Bluetooth or other tracking device, and their information may be stored on a distributed ledger. An NFT for the animals may be used as proof of ownership.

Methods and systems for PKI-based authentication

Methods, systems, and devices are provided for authenticating API messages using PKI-based authentication techniques. A client system can generate a private/public key pair associated with the client system and sign an API message using the private key of the private/public key pair and a PKI-based cryptographic algorithm, before sending the signed API message to a server system. The server system (e.g., operated by a service provider) can authenticate the incoming signed API message using a proxy authenticator located in less trusted zone (e.g., a perimeter network) of the server system. In particular, the proxy authenticator can be configured to verify the signature of the signed API message using the public key corresponding to the private key and the same cryptographic algorithm. The authenticated API message can then be forwarded to a more trusted zone (e.g., an internal network) of the server system for further processing.

Homogenous atomic pattern for double, add, and subtract operations for digital authentication using elliptic curve cryptography

A method of performing finite field addition and doubling operations in an elliptic curve cryptography (ECC) authentication scheme as a countermeasure to side-channel attack. The addition and doubling operations are executed using atomic patterns that involve the same sequence and number of operation types, so that the noise consumption and electromagnetic emanation profile of circuitry performing the operations is identical regardless of operation. A subtraction operation using such an atomic pattern is also disclosed.

System and method for electronic conference verification and management
11575506 · 2023-02-07 · ·

Methods and systems for creating and managing electronic communications are disclosed. Exemplary methods can compress and encrypt meeting information and encode the compressed and encrypted meeting information into a uniform resource locator (URL) for transmission between one or more devices and a conferencing server.

SECURE HIGH-SPEED COMMUNICATION INTERFACE BETWEEN A BASIC INPUT AND OUTPUT SYSTEM AND A SERVICE PROCESSOR
20230034670 · 2023-02-02 ·

An information handling system includes a BIOS and a service processor. The BIOS may generate, during a POST, a secret key that includes a symmetric key and a HMAC key and transmits the secret key to the service processor via an high-speed communication interface. After the POST, the BIOS transmits an SMI message that includes an encrypted message and a first hash value of the encrypted message. The encrypted message is encrypted using the symmetric key and the first hash value of the encrypted message is calculated using the HMAC key. The service processor calculate a second hash value of encrypted message based on the HMAC key and verify the encrypted message by comparing the first hash value and the second hash value. After a successful verification, the service processor decrypts the encrypted message and transmits a response to the BIOS.

TRUSTLESS DETERMINISTIC STATE MACHINE
20230092477 · 2023-03-23 ·

The invention relates to distributed ledge technologies such as consensus-based blockchains. Computer-implemented methods for a trustless, deterministic state machine are described. The invention is implemented using a blockchain network, which may be, for example, a Bitcoin blockchain. A first transaction validate is received at a node in a blockchain network. The first transaction includes a first script that, as a result of being executed, causes the node to at least obtain a first set of field values of the first transaction, a second set of field values of a second transaction, and an input. The second transaction is obtained. The second transaction includes a second script that includes a set of rules and, as a result of being executed, causes the node to at least verify that the second script matches a third script embedded in the first set of field values, determine, based at least in part on the second set of field values, a current state, and determine, based at least in part on the current state, the input, and the set of rules, a next state. The first transaction is validated as a result of execution of the first script and the second script.

MODULUS REDUCTION FOR CRYPTOGRAPHY
20230087297 · 2023-03-23 · ·

Modulus reduction for cryptography is described. An example of an apparatus includes multiplier circuitry to perform integer multiplication; and modulus reduction circuitry to perform modulus reduction based on a prime modulus, wherein the modulus reduction circuitry is to receive a product value, the product value resulting from multiplying a first n-bit value by a second n-bit value to generate the product value and perform modulus reduction to reduce the product value to a result within the prime modulus; and wherein the modulus reduction circuitry is based on shift and add operations.

Systems and Methods for Token Content Unlocking, Biometric Authentication using Privacy-Protecting Tokens, Ownership-Based Limitations of Content Access, Policy-Based Time Capsule Technology, and Content Lock Mechanisms
20230086191 · 2023-03-23 · ·

Non-fungible token (NFT) platforms in accordance with various embodiments of the invention are described. In an embodiment of the NFT includes receiving, at a server system, a notification request associated with at least one NFT from a user device, the notification request including a label data-field and an address data field, determining an occurrence of at least one event associated with the NFT that is recorded on a blockchain, obtaining a record associated with the notification request based on the label data-field, the record stored in a repository and including data to unlock at least one content portion several content portions of the NFT, generating a notification using the address data field included in the notification request, the notification including the data to unlock the at least one content portion of the NFT, and transmitting, based on the address data field, the notification to at least one device.

Secure blockchain-based consensus
11483338 · 2022-10-25 · ·

There may be provided a computer-implemented method. The computer-implemented method includes: i) broadcasting a transaction, by a node in a blockchain network, to a congress pool to join a congress formed of a group of nodes; ii) after the congress has accepted a request from a requester to activate a script, preparing, by the node, a blockchain transaction cryptographically locked with a public key associated with the congress; iii) cooperatively generating, by the node in cooperating with other nodes of the group, a valid cryptographic signature for the transaction to spend the transaction; iv) after the blockchain transaction has been unlocked, receiving data from the plurality of information providing systems; v) determining a centre point for the data received from the plurality of information providing systems; and vi) activating, by the node in cooperation with other nodes of the congress, the script based on the centre point.