-
公开(公告)号:US11151261B2
公开(公告)日:2021-10-19
申请号:US16374364
申请日:2019-04-03
Applicant: Cisco Technology, Inc.
Inventor: Jeffrey C. Venable, Sr. , Ramanathan Jagadeesan
Abstract: The present disclosure provides an approach for a blockchain system in which (a) data of past transactions can be removed from the storage of network nodes based on node permissions, and (b) in which data can be made invisible to users based on user-specific or group-specific permissions. The blockchain system stores cryptographic proofs of data on an immutable ledger. The data itself is maintained within the blockchain system such that it can be partially or fully removed, while maintaining the integrity of the ledger.
-
公开(公告)号:US12019762B2
公开(公告)日:2024-06-25
申请号:US17450839
申请日:2021-10-14
Applicant: Cisco Technology, Inc.
Inventor: Jeffrey C. Venable, Sr. , Ramanathan Jagadeesan
CPC classification number: G06F21/602 , G06F16/2379 , G06F21/6218 , H04L9/0637 , H04L9/0643 , H04L9/3218 , H04L9/50
Abstract: The present disclosure provides an approach for a blockchain system in which (a) data of past transactions can be removed from the storage of network nodes based on node permissions, and (b) in which data can be made invisible to users based on user-specific or group-specific permissions. The blockchain system stores cryptographic proofs of data on an immutable ledger. The data itself is maintained within the blockchain system such that it can be partially or fully removed, while maintaining the integrity of the ledger.
-
公开(公告)号:US11228452B2
公开(公告)日:2022-01-18
申请号:US16571981
申请日:2019-09-16
Applicant: Cisco Technology, Inc.
Inventor: Jeffrey C. Venable, Sr.
Abstract: The present disclosure provides an approach for a certificate authority (CA) that is distributed among nodes of a network, such that only a portion of the network nodes are required to sign and issue a digital certificate. Each node of the network includes a partial private key, the partial private key having been obtained by sharding the full private key. The sharding may be performed by a process known in the art, such as Shamir Secret Sharing and Distributed Key Generation. Systems that are inherently distributed may use the techniques herein to create a CA that is not centralized. The techniques herein leverage a database in the form of a distributed blockchain to store issued certificates and status of the certificates.
-
-