H04L67/1065

Access control and ownership transfer of digital content using a decentralized content fabric and ledger
11606291 · 2023-03-14 · ·

Disclosed are examples of systems, apparatus, devices, computer program products, and methods implementing aspects of a decentralized content fabric. In some implementations, one or more processors are configured to provide fabric nodes of an overlay network, including one or more fabric nodes that receive a client's request to access digital content on the overlay network. The request includes an authorization token digitally signed by or on behalf of a user of the client. The fabric node(s) extract a user identifier (ID) from the authorization token, then determine that one or more rules maintained on the overlay network are satisfied. The one or more rules condition access to the digital content upon the extracted user ID matching an ID associated with an owner of a digital instrument. The digital instrument, which can be a non-fungible token, is stored in a blockchain ledger as a unique representation of the digital content.

System, method, and computer program for blockchain-based entity group management

As described herein, a system, method, and computer program are provided for blockchain-based entity group management. An instance of a blockchain is maintained for each entity group of a plurality of defined entity groups. Further, the instance of the blockchain maintained for each entity group of the plurality of defined entity groups is utilized to manage group membership for the entity group, and control access by members of the entity group to a plurality of services having functionality configured for the plurality of defined entity groups.

Matching methods, apparatuses, and devices based on trusted asset data

Embodiments of the present specification disclose matching methods, apparatuses, and devices based on trusted asset data. One method comprises: analyzing trusted asset data of a first entity to obtain asset description information of the first entity, wherein the trusted asset data is stored on a trusted device; obtaining service information of a plurality of second entities; determining target service information that matches the first entity based on the asset description information and the service information; and sending the target service information to the first entity.

Privacy protection for proxy auto-configuration files
11652873 · 2023-05-16 ·

A method may include generating a proxy auto-configuration file including a function and a hash value associated with a resource. The hash value may be determined based on an identifier of the resource. The proxy auto-configuration file may include the hash value instead of a plaintext value of the identifier to obscure the plaintext value of the identifier. The proxy auto-configuration file including the function and the hash value may be sent to at least enable the function to be invoked by a web browser at one or more clients. The function may be configured to respond to being invoked by the web browser by determining, based on the hash value, whether to bypass a proxy server when accessing the resource. Related systems and computer program products are also provided.

Method and system for establishing trust between nodes in a network based on recommendations

Techniques described herein relate to a method for managing nodes. The method may include sending, by a first node of nodes, a node information request to a social manager, where the node information request specifies a portion of a service to be provided to the first node; obtaining node information associated with a portion of the nodes from the social manager, where the portion of the plurality of nodes previously expressed node capability information and node configuration information associated with the portion of the service; identifying a second node of the portion of the nodes based on the node information to perform the portion of the service; and performing the service using the second node, where the second node performs the portion of the service.

VISIBILITY OF DIGITAL ASSETS AT CHANNEL LEVEL
20230208911 · 2023-06-29 ·

The processor may collect, from a first peer, a first data set associated with a channel. The channel may include one or more assets associated with a first peer. The channel may link the first peer to a second peer. The processor may analyze the first data set to determine a first status for the one or more assets. The processor may provide the first status of the one or more assets in a viewable channel to the blockchain network.

METHOD AND APPARATUS FOR INFORMATION MANAGEMENT
20170359416 · 2017-12-14 · ·

An information management apparatus manages systems each storing key-data pairs, each including a key obtained by applying a predetermined function and data associated with the key, so as to be distributed among nodes, and includes a storing unit for storing a management table that stores information on an identifier common to systems, a key assigned to the identifier, and nodes assigned to the identifier; and a control unit for extracting, from a node pool housing nodes unassigned to any of the systems, as many nodes as the number of systems when the number of nodes in the node pool is equal to or larger than that of systems, assigning, in association with an identifier common to the systems, each of the extracted nodes to the individual systems, assigning a key to the identifier, and updating the management table according to the node and key assignment.

DEVICE FOR USE IN A DYNAMIC NETWORK, AND DYNAMIC NETWORK
20170353558 · 2017-12-07 ·

The invention relates to embodiments of a device for use in a dynamic network. Said device (100) comprises a network interface (102) for integration into an overlay network topology. A data processing unit (104) is connected to the network interface (102) and is designed to transmit and/or receive data via the network interface (102). A functional unit (106) is coupled to the data processing unit (104).

METHOD AND SYSTEM FOR VERIFYING OWNERSHIP OF A DIGITAL ASSET USING A DISTRIBUTED HASH TABLE AND A PEER-TO-PEER DISTRIBUTED LEDGER
20220366020 · 2022-11-17 ·

A computer-implemented method (600) and system (1) for verifying ownership of a computer software after installation and prior to execution using a distributed hash table (13) and a peer-to-peer distributed ledger (14). This may be the Bitcoin blockchain or an alternative implementation. The method includes determining (610) a second user public key associated with a second user (24) from a transaction record stored on the peer-to-peer distributed ledger (14). A second public key associated with the second user may be determined (620) from an entry on the distributed hash table (13). The method further includes comparing (630) the second user public key and the second public key, and verifying (640) the ownership of the computer software based on the comparing of the second user public key and the second public key.

Self-forming network
09825836 · 2017-11-21 · ·

A connected computer may be operated as node by inspecting communications from other nodes that pass through that node. From the communications, two or more pointers may be determined for the given node. These pointers may include a first pointer identified by a default designation that links the given node to a first node in the network, and a second pointer to another node. The second pointer may be identified by a determination that a designated criteria has been satisfied after the given node is placed on the network.