Patent classifications
H04L63/12
METHOD FOR SUPPORTING SHARING OF TRAVEL HISTORY OF TRAVELERS IN AIRPORTS
A method for supporting sharing of travel history of travelers in airports includes receiving, by a trusted entity of the distributed ledger system, a registration request from a traveler via a traveler application. The registration request provides personal information of the traveler to the trusted entity. The method further includes generating, by the trusted entity, a public key for the traveler using an identity-based encryption mechanism and sending, from the trusted entity to the global identity blockchain, a registration transaction with respect to the traveler. The registration transaction comprises the public key of the traveler. The method further includes recording a travel history that includes all travel tickets of the traveler, wherein a Merkle tree of all the travel tickets of the traveler is generated. The Merkle tree has a Merkle root, and the Merkle root of the Merkle tree is stored in the global identity blockchain.
METHOD, APPARATUS, ADAPTER AND SYSTEM FOR CROSS-CHAIN DATA ACCESS OF BLOCKCHAIN
Disclosed are a method and a system for cross-chain data access of blockchain. According to the technical solution, an adapter is added between a service blockchain and a witness blockchain, a cross-chain initiation event and a cross-chain response event on a local service blockchain are registered to the witness blockchain by using the adapter, so as to provide query and push services of cross-chain events to other nodes on the local service blockchain, and trigger related operations on the local service blockchain according to the cross-chain events of the witness blockchain.
METHOD FOR TRACKING AND MANAGING A POWER SUPPLYING DEVICE VIA A BLOCKCHAIN-BASED SYSTEM
The present invention provides a method for tracking and managing power supplying devices and a blockchain-based system to perform such tracking and monitoring. The method comprises the steps of retrieving recorded characteristic data that is associated with an existing product identification from a blockchain, verifying such recorded characteristic data, generating a new product identification that is connected to the existing product identification and recording the new product identification and new characteristic data in the blockchain. The system comprises a blockchain and a middleware computer to perform the above-mentioned steps. Also provided herein is a blockchain-based system for monitoring and renting a power supplying device.
NON-FUNGIBLE TOKEN AUTHENTICATION
Disclosed are systems and methods that authenticate non-fungible tokens (“NFT”) and/or digital data represented by or pointed to by an NFT. In some implementations, authentication may be with respect to an existing NFT. In other implementations, authentication may be with respect to an NFT that is being created. The disclosed implementations may compare a candidate and/or candidate NFT data with existing NFTs and/or existing NFT data to determine if the candidate NFT and/or candidate NFT data is similar to other NFTs and/or other NFT data of another NFT, which may exist on any of many different blockchains.
Secure and transparent pruning for blockchains
A method for enabling pruning of a blockchain of a blockchain network includes creating an active blocks commitments Merkle tree from hashes of active blocks and creating an active smart contracts commitments Merkle tree from hashes of active smart contracts. The Merkle trees are created after an amount of blocks created in the blockchain has reached a threshold set by a pruning threshold parameter stored in the blockchain network. Hashes of the roots of the Merkle trees are stored in a header of a new block as a new genesis block. The new genesis block is broadcast to the blockchain network. A set of the active blocks and active smart contracts used respectively to create the active blocks commitments Merkle tree and the active smart contracts commitments Merkle tree are committed to upon the blockchain network reaching consensus on the new genesis block.
On-board communication system, switching device, verification method, and verification program
An on-vehicle communication system includes: a plurality of function units; and one or a plurality of switch devices, each switch device being configured to perform a relay process of relaying communication data between the function units. When unauthorized communication by a function unit has been detected, the switch device performs a validation process of validating a function unit other than an unauthorized-communication function unit that is the function unit for which the unauthorized communication has been detected.
Scalable runtime validation for on-device design rule checks
An apparatus to facilitate scalable runtime validation for on-device design rule checks is disclosed. The apparatus includes a memory to store a contention set, one or more multiplexors, and a validator communicably coupled to the memory. In one implementation, the validator is to: receive design rule information for the one or more multiplexers, the design rule information referencing the contention set; analyze, using the design rule information, a user bitstream against the contention set at a programming time of the apparatus, the user bitstream for programming the one or more multiplexors; and provide an error indication responsive to identifying a match between the user bitstream and the contention set.
Network watermark
A network communications method utilizing a network watermark for providing security in the communications includes creating a verifiable network communications path of nodes through a network for the transfer of information from a first end node to a second end node; verifying the network communications path of nodes, by the first end node, before communicating by the first end node information intended for receipt by the second end node; and once the network communications path of nodes is verified by the first end node, communicating by the first end node, via the verified communications path of nodes, the information intended for receipt by the second end node; wherein the network watermark represents the verifiable network communications path of nodes.
Management Method and Apparatus for System Configuration Independent of Smart Contract for Blockchain
A management method and apparatus for a system configuration independent of a smart contract for a blockchain is provided. The method includes that: a blockchain node receives a new proposal, where the new proposal includes at least one transaction; the blockchain node determines whether a special transaction exists in the at least one transaction, where the special transaction is used for storing system configuration content without service logic; the blockchain node verifies the special transaction according to a preset verification rule to obtain a verification result in response to determining that the special transaction exists in the at least one transaction; and the blockchain node performs, in response to the verification result indicating that the special transaction passes verification, update management on a current system configuration according to the system configuration content.
Secure transfer of service identity for information handling systems
Systems and procedures are provided for transferring a service identifier for use by an IHS (Information Handling System), where technical support is provided to the IHS based on the service identifier. During factory provisioning of the IHS, a signed inventory certificate is uploaded to the IHS that includes an inventory identifying factory installed components of the IHS. Upon deployment of the IHS, a hardware component is removed, where the service identifier of the IHS is associated to the removed component. Upon installing a replacement hardware component, a request is initiated to transfer the association of the service identifier from the removed hardware component to the replacement hardware component. In response to the request to transfer the service identifier, an updated inventory certificate is generated that associates the service identifier to the replacement hardware component, wherein the replacement inventory certificate maintains the inventory of factory installed hardware components of the IHS.