H04L63/0442

Blockchain-based system and method for peer-to-peer online advertising auction
11538070 · 2022-12-27 · ·

Method for online advertising auction on a peer-to-peer network includes: deploying a smart contract to publish a need from a consumer; receiving encrypted ad bids by the smart contract; storing the received ad bids in a hash function; reducing a number of ads that can be displayed by the consumer; transmitting the ad price to the consumer via the peer-to-peer computer network, when the hashed verification code is received from the consumer verifying that the consumer has viewed the ad content within an ad-viewing period of time; transmitting a difference between the advance payment and the ad price to the advertiser, by the smart contract via the peer-to-peer network; and ending the online advertising auction.

Authentication scheme in a virtual private network

A method in a virtual private network (VPN) environment, the method including determining, by a VPN server, an encrypted authentication packet based at least in part on utilizing an encryption key and a nonce to encrypt one or more fields of an initial authentication packet; transmitting, by the VPN server to an authentication server, the encrypted authentication packet to enable VPN authentication of a device requesting VPN services from the VPN server; determining, by the authentication server, a response regarding the VPN authentication based at least in part on decrypting the one or more fields utilizing a decryption key and the nonce; and transmitting, by the authentication server to the VPN server, the response regarding the VPN authentication. Various other aspects are contemplated.

FILE STORAGE METHOD, TERMINAL, AND STORAGE MEDIUM
20220407725 · 2022-12-22 ·

Embodiments of the present disclosure disclose a file storage method, terminal, and storage medium. The file storage method includes: obtaining a to-be-stored file, performing splitting processing on the to-be-stored file to obtain N sub-files corresponding to the to-be-stored file, wherein N is an integer greater than or equal to 1; sending the N sub-files to an IPFS, and receiving M pieces of address information corresponding to the N sub-files returned by the IPFS, wherein M is an integer greater than or equal to 1 and less than or equal to N; generating an address set corresponding to the to-be-stored file according to the M pieces of address information, and encrypting the address set to obtain an address set ciphertext; sending the address set ciphertext to a blockchain network and receiving a target index value returned by the blockchain network, wherein the target index value is used to identify the address set ciphertext.

KEY INFORMATION SYNCHRONIZATION METHOD AND SYSTEM, AND DEVICE
20220408247 · 2022-12-22 ·

This application provides a key information synchronization method and system, and a device, and relates to the field of communications technologies. The method includes: A terminal sends a first public key of the terminal to an IoT device; the terminal obtains a second public key of the IoT device from the IoT device; the terminal sends first key information to a hub device, where the first key information includes a first private key of the terminal, the first public key, and the second public key; the hub device uses the first private key and the first public key in the first key information as a key pair of the hub device; and the hub device performs encrypted interaction with the IoT device by using the first key information.

SYSTEMS AND METHODS FOR CONTACTLESS CARD COMMUNICATION AND KEY PAIR CRYPTOGRAPHIC AUTHENTICATION USING DISTRIBUTED STORAGE
20220405766 · 2022-12-22 ·

Systems and methods for authentication may include an authentication server. The authentication server may include a processor and a memory. The processor may be configured to receive an authentication request. The processor may be configured to transmit a notification. The processor may be configured to receive a response that is responsive to the notification, the response comprising a ciphertext and input data. The processor may be configured to generate a Fast Identity Online (FIDO) key pair including a FIDO public key and a FIDO private key. The processor may be configured to encrypt a challenge using the FIDO private key. The processor may be configured to transmit the FIDO public key to decrypt the challenge so as to complete the authentication request.

SYSTEM AND METHOD FOR GENERATING AND DISTRIBUTING WEB FORM FOR COLLECTING DATA

The present disclosure describes method and system for generating and distributing a web form for securely collecting data. The system provides an interactive and visualized tool to add, edit, distribute web form and collect and analyze one or more response to the web form. Users of the system may edit the forms in a way that what you see is what you get. The system also automatically generates the data structure that can be easily transferred to and stored in the database, which only require minimal input from the user in terms of the data structure. The stored web form and the received responses are encrypted so as to be only available to the user. In some aspects, the system manages all the projects and workflow and allows for real time monitoring of this process through dashboard.

Automated Lightweight Database Access Protocol Secure/Multipurpose Internet Mail Extensions Key Server
20220407888 · 2022-12-22 ·

A Secure/Multipurpose Internet Mail Extensions (S/MIME) key material publication system that converts cryptographic material extracted from digitally signed and validated S/MIME messages it receives into key material formats suitable for populating email address books. Publication of the address book contents both internal and external to an organization is done using the standard address book lightweight database access protocol (LDAP). The wide availability and coordination of such automated address books distributing key material across the Internet allows the large installed base of S/MIME email clients to immediately send secure encrypted email across organizational boundaries. The system serves the role of public key server thus removing a barrier to ubiquitous secure encrypted email by simplifying global key management.

RESOURCE CONNECTIVITY FOR MULTIPLE DEVICES

Methods for improving resource connectivity for users' various computing devices are disclosed. An example method may include establishing a local connection with a sending device, receiving device status information and task status information from the sending device using the local connection, the task status information identifying at least one media content, and generating a user interface that includes a graphical representation of the device status information and a first control that, when selected, executes the at least one media content in an application on the receiving device. Another example method may include detecting an interaction with a UI element that sets a network sharing status to an on state, identifying a locally stored network as shareable, generating an instance of a network data type for the locally stored network, and associating the instance with the user account so that the locally stored network is shared with the user's other devices.

Securing sensitive historian configuration information

Systems and methods for securing configuration information for cloud-based services. A system comprises a data store and data sets including plant process information and configuration information. A memory device stores computer-executable instructions. When executed by a processor coupled to the cloud service, the instructions receive configuration information, store it in a data file, apply a generated certificate to the file, and deploy the resulting protected configuration data file to the cloud-based service. In addition, the protected configuration data file is made available by obtaining the file from the cloud-based service.

Method for role-based data transmission using physically unclonable function (PUF)-based keys

A method includes encrypting a first message that contains a first public key of a first peer, by using a second public key of a second peer; and decrypting a second message sent from the second peer by using a first private key paired with the first public key. The second message includes a write command and is encrypted at the second peer by using the first public key, and contains an encrypted data encrypted by the second peer using the second public key and hashed by using a secret key of the first peer. The first public key, the second public key, the first private key and the secret key are physically unclonable function (PUF)-based keys.