H04L2209/30

SYSTEMS, METHODS, AND APPARATUS FOR DIVIDING AND ENCRYPTING DATA
20230057517 · 2023-02-23 ·

A method for data encryption may include receiving input data, finding a delimiter in the input data, generating, based on a position of the delimiter in the input data, a portion of data using a part of the input data, and encrypting the portion of data. The input data may include a record, the delimiter indicates a boundary of the record, and the portion of data may include the record. The position of the delimiter may be in the part of the input data. Generating the portion of data may include generating the portion of data based on a subset of the part of the input data. The part of the input data may be a first part of the input data, and the position of the delimiter may be in a second part of the input data.

Whitebox computation of keyed message authentication codes

Some embodiments are directed to a keyed message authentication code (MAC) device (100) for computing a keyed MAC for an input message using encoded representations. The keyed MAC device may be configured to apply a sequence of compressions functions, at least one of which takes a state as input in an encoded representation.

Method and apparatus for storing off-chain data

An off-chain data storage method and apparatus for supporting the integrity and capacity scalability of a data object stored in an off-chain storage. The off-chain data storage method includes collecting a plurality of transactions for a plurality of data objects, creating a root transaction on the basis of a Merkle root of a Merkle tree created based on the collected transactions, and storing the root transaction in a blockchain storage.

System and method for electronic conference verification and management
11575506 · 2023-02-07 · ·

Methods and systems for creating and managing electronic communications are disclosed. Exemplary methods can compress and encrypt meeting information and encode the compressed and encrypted meeting information into a uniform resource locator (URL) for transmission between one or more devices and a conferencing server.

Split-key wallet access between blockchains
11637709 · 2023-04-25 · ·

An approach is disclosed for running a first smart contract on a first blockchain platform restricting access to a client's funds appropriated to a second smart contract running on a second blockchain platform. A transaction is received by invoking the first smart contract authorizing the second smart contract. In response to receiving an indication of a successful completion of the first smart contract, a plurality of client's authorization tickets are sent to the second smart contract. The invoked smart contract receives the set of authorization information and records the set of authorization information. After receiving a set of authenticated authorization tickets exceeding a predetermined threshold, the funds are released.

Creating deterministic ciphertext using wide-block encryption

A computer-implemented method according to one embodiment includes compressing an uncompressed instance of data to create a compressed instance of data; encrypting the compressed instance of data utilizing wide-block encryption in response to determining that a size of the compressed instance of data is less than a predetermined threshold; and adding a zero pad to the encrypted compressed instance of data to create a ciphertext string.

Encoding / Decoding System and Method
20230124896 · 2023-04-20 ·

A computer-implemented method, computer program product and computing system for: processing an unencoded data file to identify a plurality of file segments wherein the unencoded data file is a dataset for use with a long-range wireless communication platform; mapping each of the plurality of file segments to a portion of a dictionary file to generate a plurality of mappings, wherein each of the plurality of mappings includes a starting location and a length, thus generating a related encoded data file based, at least in part, upon the plurality of mappings; and transmitting the related encoded data file from a first location to a second location using the long-range wireless communication platform.

System and Method for a Computing Environment for Verifiable Execution of Data-Driven Contracts

A system and method for establishing a verified computing environment for executing data-driven contracts, comprising a cryptographic directed acyclic graph object model of a data-driven contract, wherein at least a subset of the objects in the MDAG correspond to clause state of at least one programmable clause of the data-driven contract; at a computing environment, administrating the data-driven contract in accordance with the MDAG which can include at least one execution instance comprised of: receiving a contract input to contract logic of the data-driven contract, processing the input according to the clause logic, in response to the contract input, generating at least one updated state object and generating at least one output object, and for each generated object, hash-linking the generated object to an object associated with the creation of the generated object.

COMPUTER-IMPLEMENTED SYSTEM AND METHOD FOR MANAGING TRANSACTIONS OVER A BLOCKCHAIN NETWORK

Computer-implemented methods and systems are provided which are suitable for implementation in transaction validation nodes of a blockchain network. Modified blockchain node structures, network architectures, and protocols for handling large numbers of transactions and large transaction blocks are described. The invention is particularly suited, but not limited, to use with the Bitcoin blockchain. A computer-implemented method is provided which includes: (i) receiving transactions from the blockchain network; (ii) validating transactions received from the blockchain network; (iii) maintaining a distributed, decentralized storage of validated transactions with other transaction validation nodes in the blockchain network; and (iv) distributing data corresponding to said validated transactions to the blockchain network for mining.

Secure compression
11468009 · 2022-10-11 · ·

In embodiments, secure compression algorithms are provided that may be employed as a single operation on raw data to produce compressed and encrypted data. In embodiments, the algorithms described herein may be performed using any type of dictionary based encryption. In one embodiment, upon adding a new prefix to a dictionary table, the dictionary table may be permuted to randomize the entries into the table. The randomization may be based upon a permutation value generated by a deterministic pseudo-random generator and/or pseudo-random function. Other embodiments of randomization may be employed to provide secure compression. For example, instead of permuting the entire table upon adding a prefix, the prefix may be randomly added to the table.