H04L9/007

Pyramid construct with trusted score validation
11522670 · 2022-12-06 · ·

Disclosed herein are systems and methods for decentralized data distribution by a database network system comprising a hierarchical blockchain model. The hierarchical blockchain model may comprise a quantum pyramid consensus to distribute data throughout the database network system in a decentralized and secure manner. The hierarchical construct may be built according to trusted scores calculated for the nodes of the network over their lifetime at the network.

Information processing apparatus, communication device, and information processing system

According to one embodiment, an information processing apparatus includes one or more processors. The processors store a first public key certificate and second public key certificates in storage. The first public key certificate includes a first validity period, a signature, and a public key. Each of the second public key certificates including a signature and a second validity period that is within the first validity period and shorter than the first validity period. The second validity periods included in the second public key certificates are mutually different. The processors receive specific information of the first public key certificate. The processors transmit one of the plurality of second public key certificate including the second validity period in which a start time of the second validity period is before a current time and generated from the first public key certificate specified by the received specific information to a transmission source of the specific information.

COMPUTER IMPLEMENTED METHOD AND SYSTEM FOR STORING CERTIFIED DATA ON A BLOCKCHAIN

A method of storing certified data on a blockchain is disclosed. The method comprises generating a first blockchain transaction (Tx1) having a first output (Output 3) containing a first public key of a first private/public key pair, comprising a first private key and a first public key, of a cryptography system, first data related to the first public key, and a first digital signature applied, by means of a second private key of a second private/public key pair, comprising a second private key and a second public key, of a cryptography system, to the first data and to the first public key. The first blockchain transaction is broadcast to the blockchain.

Uniquely identifying and securely communicating with an appliance in an uncontrolled network

A service consumer that utilizes a cloud-based access service provided by a service provider has associated therewith a network that is not capable of being controlled by the service provider. An enterprise connector is supported in this uncontrolled network, preferably as an appliance-based solution. According to this disclosure, the enterprise configures an appliance and then deploys it in the uncontrolled network. To this end, an appliance is required to proceed through a multi-stage approval protocol before it is accepted as a “connector” and is thus enabled for secure communication with the service provider. The multiple stages include a “first contact” (back to the service) stage, an undergoing approval stage, a re-generating identity material stage, and a final approved and configured stage. Unless the appliance passes through these stages, the appliance is not permitted to interact with the service as a connector. As an additional aspect, the service provides various protections for addressing scenarios wherein entities masquerade as approved appliances.

Secure provisioning and management of devices

Systems, methods and devices are provided for provisioning a computerized device. The system may include a distributor computer that is connected to the computerized device and is operable to receive a first digital asset and transmit it to the computerized device, and a server that is connected to the distributor computer, and that transmits the first digital asset to the distributor computer when a first authorizing condition is met, the first digital asset being configured to cause the computerized device to become partially provisioned, wherein the server transmits a second digital asset to the computerized device, and the computerized device is functional after the second digital asset is transmitted to the computerized device.

Method for creating a hierarchical threshold signature digital asset wallet
11637708 · 2023-04-25 ·

A method for creating a hierarchical threshold signature digital asset wallet using a hierarchical distributed key generator (DKG) and a signature protocol includes steps of generating a public key by users and the digital asset wallet service platform, securing and controlling a portion of shares, sending a transaction signing request, validating the transaction signing request, creating a signature of the signed transaction, and uploading the signed transaction to the corresponding digital asset blockchain network and monitoring the execution of the signed transaction.

SYSTEMS AND METHODS FOR SECURING ACCESS RIGHTS TO RESOURCES USING CRYPTOGRAPHY AND THE BLOCKCHAIN
20230066838 · 2023-03-02 ·

The present disclosure generally relates to securing access to resource and access rights using cryptography and the blockchain. Certain embodiments of the present disclosure generally relate to systems and methods that enhance the security of resource access using hierarchical deterministic (HD) cryptography and the blockchain. Certain embodiments of the present disclosure relate to systems and methods that securely and anonymously represent the identity of a user and the user's access code data on a distributed ledger represented across the blockchain.

Secure deterministic tokens for encrypting electronic communications

A computer implemented method includes generating, by a processor associated with a first client computer, a request message; generating, by the processor, a first public token based on a first private token; augmenting, by the processor, the electronic data transaction request message with the first public token; transmitting, by the processor, the augmented electronic data transaction request message to a second client computer; generating, by the processor, a second public token based on the first public token; identifying, by the processor, from a database of result messages, a result message labeled with the second public token, the identified result message including encrypted confidential information; generating, by the processor, a second private token corresponding to the second public token used to identify the result message; and decrypting, by the processor, the encrypted confidential information with the second private token.

Uniquely identifying and securely communicating with an appliance in an uncontrolled network

A service consumer that utilizes a cloud-based access service provided by a service provider has associated therewith a network that is not capable of being controlled by the service provider. An enterprise connector is supported in this uncontrolled network, preferably as an appliance-based solution. According to this disclosure, the enterprise configures an appliance and then deploys it in the uncontrolled network. To this end, an appliance is required to proceed through a multi-stage approval protocol before it is accepted as a “connector” and is thus enabled for secure communication with the service provider. The multiple stages include a “first contact” (back to the service) stage, an undergoing approval stage, a re-generating identity material stage, and a final approved and configured stage. Unless the appliance passes through these stages, the appliance is not permitted to interact with the service as a connector. As an additional aspect, the service provides various protections for addressing scenarios wherein entities masquerade as approved appliances.

Software distribution in a wireless ad hoc network for ad-hoc data processing on a source node
11683249 · 2023-06-20 · ·

A method of acquiring software by a source node in a wireless ad hoc network. The method includes the source node executing application software from which a need to process a particular modality of data is identified, and making a determination that the source node is incapable of processing the particular modality of data. Responsive to the determination, the source node searches a local module repository (MR) of the source node for a software module usable to process the particular modality of data, and responsive to the source node failing to locate the software module in the local MR, broadcasts a request for the software module to neighbor nodes of the plurality of nodes in radio range of the source node. The source node receives the software module from the neighbor node, and uses the software module to process the particular modality of data.