H04L9/38

Certificate based security using post quantum cryptography

Establishing secure communications by sending a server certificate message, the certificate message including a first certificate associated with a first encryption algorithm and a second certificate associated with a second encryption algorithm, the first certificate and second certificate bound to each other, signing a first message associated with client-server communications using a first private key, the first private key associated with the first certificate, signing a second message associated with the client-server communications using a second private key, the second private key associated with the second certificate, the second message including the signed first message, and sending a server certificate verify message, the server certificate verify message comprising the signed first message and the signed second message.

Medical Data Authentication System, Medical Data Authentication Method, and Computer Program Product Thereof
20220345317 · 2022-10-27 ·

A medical data authentication system, a medical data authentication method, and a computer program product thereof are disclosed, The medical data authentication system includes a data establishment module, a signature module, a blockchain establishment module, and an authorization code generation module. The data establishment module is used for establishing a medical data. The signature module is used for receiving the medical data to obtain a medical digital signature. The blockchain establishment module is used for uploading the medical digital signature to a medical blockchain. The authorization code generation module is used for obtaining the medical digital signature from the medical blockchain to generate a corresponding authentication authorization code.

Computer network systems for cryptographically-secured, token-based operations and methods of use thereof

Systems and methods of the present disclosure enable reversible blockchain operations. An operation-reverse operation pair specifies an operation for exchange of a first token for a second token, and a reverse operation for return of the second token for the first token upon at least one condition being satisfied. A self-executing software container (SESC) executes the operation-reverse operation pair according to the condition by detecting a transfer of the first token into a first segregated data structure, and a transfer of the second token from a second token storage to a first token storage. The SESC initiates a transfer of the first token from the first segregated data structure to a second segregated data structure in response to the transfer of the second token. Upon detecting a reverse operation matching the condition, the SESC initiates a transfer of the first token back to the first segregated data structure.

Blockchain based vehicle control

A vehicle control method of starting and shutting down an engine, in which a processor receives a blockchain update comprising a first transaction with instructions to perform an engine startup or shutdown; the blockchain update is validated; an engine startup or shutdown is performed based on the validated blockchain update; where the engine startup or shutdown is delayed based on validating a predetermined number of subsequent blockchain updates, including a second transaction with instructions to perform the engine startup or shutdown.

Blockchain based vehicle control

A vehicle control method of starting and shutting down an engine, in which a processor receives a blockchain update comprising a first transaction with instructions to perform an engine startup or shutdown; the blockchain update is validated; an engine startup or shutdown is performed based on the validated blockchain update; where the engine startup or shutdown is delayed based on validating a predetermined number of subsequent blockchain updates, including a second transaction with instructions to perform the engine startup or shutdown.

COMPUTER PROGRAM, NON-TRANSITORY MACHINE-READABLE MEDIUM, APPARATUS, AND METHODS FOR ELECTRONIC ELECTION

Embodiments of the present disclosure provide a computer program, a non-transitory machine-readable medium, an apparatus, and methods for electronic election. In particular, embodiments provide a method for electronic election, the method comprising generating, by a trusted execution environment (TEE), a symmetric key for at least one user and based on a seed. Also, the method comprises providing, by the TEE, the symmetric key to a first data processing circuit of the user for encrypting the user's vote with the symmetric key and entering the encrypted vote in a distributed ledger database. Further, the method comprises providing, by the TEE, the seed to at least one second data processing circuit and obtaining, by the second data processing circuit, the user's vote from the distributed ledger database using the seed.

NEURAL NETWORK PROCESSING METHOD AND SERVER AND ELECTRICAL DEVICE THEREFOR

A neural network (NN) processing method is provided. An AI (artificial intelligence) compiler code of an AI compiler is transformed to a garbled circuit code by performing following steps. A circuit graph of a garbled circuit having logic gates corresponding to the garbled circuit code is sent to an electrical device by a server. Key codebooks for candidate gates corresponding to each logic gate are creating by the electrical device. Garbled truth tables for the candidate gates corresponding to each logic pate are generated and transmitted to the server by the electrical device through using OT (Oblivious Transfer) protocol. A target garbled truth table of each logic gate is generated by the server. Afterward, an NN model is encrypted according to the key codebooks by the electrical device and a compiled NN model of an encrypted NN model are generated by the server.

ENERGY-EFFICIENT CRYPTOCURRENCY MINING HARDWARE ACCELERATOR WITH SPATIALLY SHARED MESSAGE SCHEDULER

Methods and apparatus relating to techniques for an energy-efficient cryptocurrency (e.g., Bitcoin) mining hardware accelerator with a spatially shared message scheduler are described. In an embodiment, a plurality of mining engines perform one or more operations for a cryptocurrency. A single scheduler processes a first portion of a message for two or more mining engines of the plurality of mining engines and pre-computation logic circuitry processes a second portion of the message for the two or more mining engines. Other embodiments are also disclosed and claimed.

COMPUTER NETWORK SYSTEMS FOR CRYPTOGRAPHICALLY-SECURED, TOKEN-BASED OPERATIONS AND METHODS OF USE THEREOF

Systems and methods of the present disclosure enable reversible blockchain operations. An operation-reverse operation pair specifies an operation for exchange of a first token for a second token, and a reverse operation for return of the second token for the first token upon at least one condition being satisfied. A self-executing software container (SESC) executes the operation-reverse operation pair according to the condition by detecting a transfer of the first token into a first segregated data structure, and a transfer of the second token from a second token storage to a first token storage. The SESC initiates a transfer of the first token from the first segregated data structure to a second segregated data structure in response to the transfer of the second token. Upon detecting a reverse operation matching the condition, the SESC initiates a transfer of the first token back to the first segregated data structure.

Apparatus and methods for authenticating cyber secure control system configurations using distributed ledgers

Control systems and methods for securely authenticating and validating a control system. The control system may include a plurality of dependent control nodes and master control nodes. Each dependent control node is communicatively coupled to one or more peripheral devices. Each control node maintains a unit level distributed ledger, where each unit level distributed ledger includes information from corresponding peripheral devices. Each control node may transmit a portion of the unit level distributed ledger to a master control node. Each master control node may maintain a system level distributed ledger that includes information from the corresponding unit level distributed ledgers. Each master node may transmit a portion of the system level distributed ledger to a central node that maintains a separate secure distributed ledger. The master node may authenticate the control system based on the received portion of the system level distributed ledgers and the secure distributed ledgers.