H04L63/12

SYSTEM AND METHOD FOR DYNAMICALLY ORCHESTRATING APPLICATION PROGRAM INTERFACE TRUST
20230047485 · 2023-02-16 ·

A system includes a purchase portal configured to receive a purchase order from a customer, wherein the purchase order includes a service from each of a plurality of service providers. When receipt of the purchase order is detected, a processor determines first and second ones of the service providers associated with the purchase order; and establishes a trust relationship between the first service provider and the second service provider in a context of the customer. The processor also sends a first request for a first trust artifact to the first service provider and a second request for a second trust artifact to the second service provider; receives the first trust artifact from the first service provider, receives the second trust artifact from the second service provider, sends the first trust artifact to the second service provider, and sends the second trust artifact to the first service provider.

MAPPING KEYS TO A BLOCKCHAIN OVERLAY NETWORK
20230046315 · 2023-02-16 ·

A method of managing an overlay network overlaid on data-storage transactions of a blockchain, whereby data content of the overlay network is stored in payloads of the data-storage transactions and overlay-layer links are defined between the data-storage transactions. The method comprises identifying a graph structure of the overlay network, wherein nodes corresponds to different ones of the data-storage transactions and edges correspond to the links. Each node is associated with a respective first key for signing an input of a child data-storage transaction to authorise writing the child to the blockchain. The method further comprises using a child key derivation, CKD, function to determine a hierarchical set of second keys having the same graph structure as the overlay network, wherein the second keys enable an additional function other than signing inputs of the data-storage transactions.

DIGITAL SIGNATURE SYSTEM USING RELIABLE SERVERS
20230048174 · 2023-02-16 ·

Methods and systems are disclosed for a digital signature system using scalable and reliable servers. The system includes multiple frontend servers that are each in communication with multiple backend servers. A remote application server sends a signature request to one of the front end servers. The signature request includes at least two public keys that each have a different server identifier embedded in them. The backend server extracts one of the server identifiers and tries the signature generating process with the corresponding back end server. If that that backend server does not respond, then the frontend server extracts the server identifier from another public key and initiates the signature generation process with that backend server. In some systems, the remote application server has a predefined relationship with multiple frontend servers so that if one frontend server is down, the application server can communicate with a backup frontend server.

Deploying physical diamond tokens on a blockchain
11580536 · 2023-02-14 · ·

A diamond asset comprising one or more diamonds and an encryption chip is used to asset-back a cryptographic token that can be used to conduct transactions. The cryptographic token is written to a blockchain using a smart contract that is configured to enable a transaction associated with the token in response to two or more of: a signature by the encryption chip, a signature by the owner of the diamond asset, and a validation of a visual layout of the diamond asset.

Decentralized robot cooperation platform

Systems and methods of the present disclosure leverage distributed ledger technology (DLT) to provide decentralized control of cooperative tasks performed by a plurality of robots. Characteristics of the plurality of robots may be stored in a distribute ledger, which may be provided by a blockchain or a distributed database system. When a service request is received, a set of tasks may be identified for providing the requested service and the robot characteristics recorded to the distributed ledger may be used to identify a list of candidate robots possessing characteristics corresponding to the set of tasks may be identified. A smart contract may be utilized to select one or more candidate robots for performing the task and to verify the selected robot(s) successfully completed the task. State information associated with operation of the selected robot(s) may be monitored to verify task completion.

System and method for cryptographic choice mechanisms
11580808 · 2023-02-14 · ·

The present invention provides an improved system and method for using cryptography to secure computer-implemented choice mechanisms. In several preferred embodiments, a process is provided for securing participants' submissions while simultaneously providing the capability of validating their submissions. This is referred to as a random permutation. In several other preferred embodiments, a process is provided for securing participants' advance instructions while simultaneously providing the capability of validating their advance instructions. This is referred to as a secure advance instruction. Applications include voting mechanisms, school choice mechanisms, and auction mechanisms.

Methods and systems for smart contracts for security and filtering
11580540 · 2023-02-14 · ·

A blockchain value transfer method including receiving a transfer request, executing a first smart contract function to perform data analytics on the transfer request and a second smart contract function to implement a security response responsive to compliance with a security criterion, and recording a result of execution of the second smart contract function to at least one of a relational database, a non-relational database, and an analytics service.

Systems and methods for verifying a watermark of an AI model for a data processing accelerator

Embodiments of the disclosure relate to verifying a watermark of an artificial intelligence (AI) model for a data processing (DP) accelerator. In one embodiment, a system receives an inference request from an application. The system extracts the watermark from an AI model having the watermark. The system verifies the extracted watermark based on a policy. The system applies the AI model having a watermark to a set of inference inputs to generate inference results. The system sends a verification proof and the inference results to the application.

Secure and private cloud based broadcast identification
11582575 · 2023-02-14 · ·

In one embodiment, a method includes storing, by a tracking server, a hash value for each of one or more tracking devices associated with the tracking server. The method includes receiving, at the tracking server from a user device, a hash value associated with a tracking device, the hash value computed based on a static value uniquely associated with the tracking device and a dynamic value maintained by the tracking device. The method includes identifying, by the tracking server, the tracking device based on a comparison between one of the stored hash values and the received hash value. The method includes updating, by the tracking server, one or more records associated with the identified tracking device based on the receiving the hash value.

Vehicle information communication system

A vehicle information communication system includes a center apparatus and a vehicle apparatus that includes a group of electronic control units (ECUs) and that sends vehicle configuration information including configuration information on the group of ECUs mounted in the vehicle to the center apparatus via wireless communications. The center apparatus performs a first determination of whether the vehicle configuration information received from the vehicle apparatus matches approved-configuration information registered in an approved-configuration database, and performs a second determination of whether software update data for at least one ECU of the group of ECUs mounted in the vehicle exists in an update database. When both the first and second determinations are true, the center apparatus sends the software update data for at least one ECU of the group of ECUs mounted in the vehicle to the vehicle apparatus via the wireless communications.