H04L9/3255

SYSTEMS AND METHODS FOR PROCESSING BLOCKCHAIN TRANSACTIONS
20220407728 · 2022-12-22 · ·

A blockchain system has an identity-based blockchain account including a primary chain, a secondary chain, and at least one key book applying to the account, the at least one key book having a key page. The system includes: a hardware processor; and a memory device storing instructions. When the instructions are executed by the processor, they cause the processor to: record a multi-signature transaction originating from the account in the secondary chain: associate the transaction with the key page of the at least one key book, the key page including (i) a signature-authorization rule, and (ii) a plurality of keys corresponding to a plurality of transaction authorizers; record, in the secondary chain, an authorization of the transaction from a transaction authorizer of the plurality of transaction authorizers; and once a number of authorizations recorded on the secondary chain satisfies the signature-authorization rule, record the transaction on the primary chain for execution.

Information-centric network namespace policy-based content delivery

Systems and techniques for information-centric network namespace policy-based content delivery are described herein. A registration request may be received from a node on an information-centric network (ICN). Credentials of the node may be validated. The node may be registered with the ICN based on results of the validation. A set of content items associated with the node may be registered with the ICN. An interest packet may be received from a consumer node for a content item of the set of content items that includes an interest packet security level for the content item. Compliance of the security level of the node with the interest packet security level may be determined. The content item may be transmitted to the consumer node.

METHOD OF USING A BLOCKCHAIN
20220400020 · 2022-12-15 ·

Contributions to a work by contributors having respective levels in a defined hierarchy are recorded in one or more blockchain transactions. One or more lower-level contributors provide, to a higher-level contributor, one or more lower-level contributions respectively, and the higher-level contributor provides a higher-level contribution responsive to the one or more lower-level contributions. A higher-level contributor transaction comprises one or more inputs, which in turn comprise: one or more pointers to one or more spendable outputs of one or more lower-level contributor transactions and one or more transaction signatures. The transactions contain contributions commitments which, together with the one or more pointers, represent the relationship between the higher-level contributor and the lower-level contributors within the defined hierarchy. The one or more transaction signatures prove that relationship.

TWO-ROUND BYZANTINE FAULT TOLERANT (BFT) STATE MACHINE REPLICATION (SMR) PROTOCOL WITH LINEAR AUTHENTICATOR COMPLEXITY AND OPTIMISTIC RESPONSIVENESS

The present disclosure is directed to a leader-based partially synchronous BFT SMR protocol that improves upon existing protocols by exhibiting two rounds of communication latency, linear authenticator complexity, and optimistic responsiveness. This is achieved through the novel use of an aggregate signature scheme as part of the protocol's view-change procedure.

MULTI-MESSAGE MULTI-USER SIGNATURE AGGREGATION
20220385479 · 2022-12-01 ·

A PQ signature scheme MMSAT that is capable of aggregating and compressing unrelated messages signed individually by different parties. The scheme extends the notion of multi-signatures, which are signatures that support aggregation of signatures on a single message signed by multiple parties.

DEVICE REGISTRATION
20220385480 · 2022-12-01 ·

In an example there is provided a method for a set of registered devices that are registered to participate in an authentication protocol, where each registered device has a share of an authentication key. The method comprises generating share data for a share of the authentication key. The share data is communicated from an authorised subset of the registered devices to a device. The share of the authentication key is generated at the device, on the basis of the share data. The share of the authentication key combines with shares of the registered devices to allow the device to participate in the authentication protocol.

Efficient and secure distributed signing protocol for mobile devices in wireless networks

The techniques described herein may provide an efficient and secure two-party distributed signing protocol for the identity-based signature scheme described in the IEEE P1363 standard. For example, in an embodiment, a method may comprise generating a distributed cryptographic key at a key generation center and a first other device and a second other device and generating a distributed cryptographic signature at the first other device using the second other device.

Methods, systems, and apparatuses for cryptographic wireless detection and authentication of fluids
11516014 · 2022-11-29 · ·

A system for cryptographic wireless detection and authentication of fluids includes a computing device configured to receive, from a transmitter attached to a container, a unique identifier associated with a fluid contained in the container, locate, at an immutable sequential listing, at least an identifier-specific record using the unique identifier, and a lot identifier associated with the unique identifier, retrieve, from the immutable sequential listing, at least a lot-specific record using the lot identifier, capture, from the container, at least a secondary datum describing the container, generate an authenticity probability score as a function of the at least an identifier-specific record, the at least a lot-specific record, and the at least a secondary datum, and display to a user an output based on the authenticity probability score.

PERFORMING TRANSACTIONS USING PRIVATE AND PUBLIC BLOCKCHAINS
20220374886 · 2022-11-24 ·

Among other things, we describe a method of enabling one or more entities of a blockchain system to carry out a series of operations. The blockchain system includes a main chain, a co-chain, wherein the co-chain has a corresponding account on the main chain, an asset owned by the corresponding account on the main chain and owned by an account on the co-chain, and a co-chain account possessing the asset. The operations include posting an authenticated transaction on the co-chain, the authenticated transaction authorizing a transfer of the asset from the co-chain account to an account of the main chain, determining that the authenticated transaction is posted on the co-chain, and posting, on the main chain, a transaction assigning the asset to the account of the main chain.

PROVING TOP LEVEL DOMAIN NAME CONTROL ON A BLOCKCHAIN
20220376925 · 2022-11-24 ·

Systems, methods, and computer products for associating a top level network identifier with a blockchain address on a blockchain enable operations that may include: obtaining, from a root network segment file, an identification of a server that stores network infrastructure records associating network identifiers under the top level network identifier with network addresses and a signature on the identification of the server; obtaining, based on a first network infrastructure record, an association of the top level network identifier with the blockchain address; obtaining information sufficient to validate a trust chain, wherein the trust chain extends from a trusted authority to the association; and sending the association and the information sufficient to validate the trust chain to an executable program on the blockchain. The trust chain may be validatable by the executable program, and the association may be storable on the blockchain by the executable program.