Method and system for securing computer software using a distributed hash table and a blockchain

    公开(公告)号:US11455378B2

    公开(公告)日:2022-09-27

    申请号:US16079074

    申请日:2017-02-14

    摘要: A computer-implemented method (100) and system (1) for determining a metadata M for securing a controlled digital resource such as computer software using a distributed hash table (13) and a peer-to-peer distributed ledger (14). This is a blockchain such as the Bitcoin blockchain. The method includes determining (110) a data associated with the computer software and determining (120) a first hash value based on the computer software. A second hash value based on the data and the computer software may be determined (130). The method further includes sending 140, over a communications network (5), the data, the first hash value and the second hash value to an entry for storage in a distributed hash table (13). The second hash value may be a key of a key-value pair. The data and the first hash value may be a value in the key-value pair. A metadata (M) that is based on the second hash value may be determined (150) for storage on the peer-to-peer distributed ledger (14).

    Method and system for verifying integrity of a digital asset using a distributed hash table and a peer-to-peer distributed ledger

    公开(公告)号:US11366882B2

    公开(公告)日:2022-06-21

    申请号:US16806835

    申请日:2020-03-02

    摘要: A computer-implemented method and system for encrypting an executable of a computer software for installation using a distributed hash table and a peer-to-peer distributed ledger. This may be the Bitcoin blockchain or an alternative implementation. The method may include determining a generator value. The method may include determining a generator value (GV), determining a second user public key (PU2) associated with a second user (U2) from a transaction record stored on the peer-to-peer distributed ledger, determining a second user second public key (P2U2) based on the second user public key (PU2) and the generator value (GV), wherein the second user second public key (P2U2) forms a cryptographic pair with a second user second private key (V2U2), determining a first user second private key (V2U1) based on a first user private key (VU1) and the generator value (GV), wherein a first user second public key (P2U1) forms a cryptographic pair with the first user second private key (V2U1), determining a common secret (CS) based on the second user second public key (P2U2) and the first user second private key (V2U1), encrypting the executable of the computer software with the common secret (CS) to generate an encrypted executable of the computer software, and making the encrypted executable of the computer software available, to another computing entity, in the storage location.

    Personal device security using cryptocurrency wallets

    公开(公告)号:US11356280B2

    公开(公告)日:2022-06-07

    申请号:US16926583

    申请日:2020-07-10

    摘要: A method of encrypting data at an electronic device where the electronic device is associated with a key device. Each device is associated with an asymmetric cryptography pair, each pair including a first private key and a first public key. Respective second private and public keys may be determined based on the first private key, first public key and a deterministic key. A secret may be determined based on the second private and public keys. The data at the electronic device may be encrypted using the determined secret or an encryption key that is based on the secret. Information indicative of the deterministic key may be sent to the key device where the information may be stored.

    COMPUTER IMPLEMENTED SYSTEMS AND METHODS FOR STORING, RETRIEVING AND COMMUNICATION DATA VIA A PEER-TO-PEER NETWORK

    公开(公告)号:US20220027491A1

    公开(公告)日:2022-01-27

    申请号:US17296949

    申请日:2019-11-14

    IPC分类号: G06F21/62 H04L9/08

    摘要: The invention provides a system for searching a blockchain (e.g. Bitcoin) for data/content stored in one or more blockchain transactions, and accessing that data/content. It may be used in conjunction with a protocol for searching the blockchain. An embodiment of the invention can be arranged to enable a user to search for, access, view, write and/or retrieve a portion of data provided in at least one blockchain transaction (Tx), and also arranged to identify the at least one transaction (Tx) based on a transaction index (TXindex) comprising a transaction ID and a public key associated with the transaction (Tx). The system may comprise a search facility which is either provided within the blockchain search system; or arranged to interface and/or communicate with the blockchain search system. It may also comprise at least one cryptocurrency wallet.

    COMPUTER IMPLEMENTED SYSTEM AND METHOD FOR SHARING A COMMON SECRET

    公开(公告)号:US20210367772A1

    公开(公告)日:2021-11-25

    申请号:US17278198

    申请日:2019-09-11

    IPC分类号: H04L9/08 H04L9/30

    摘要: A method of sharing a first common secret among a plurality of nodes (A, B, C) for enabling secure communication for blockchain transactions such as on the Bitcoin blockchain is disclosed. The method comprises determining, for at least one first node (A) a plurality of second common secrets (SAPC, SAPB), wherein each second common secret is common to the first node and a respective second node (B), is determined at the first node on the basis of a first private key of the first node (SA) and a first public key of the second node (PC, PB) and is determined at the second node on the basis of the first private key of the second node (SB, SC) and the first public key of the first node (PA). A third common secret (SBPC, SCPB) common to the second node (B) and a third node (C) is determined for the second node. The method comprises encrypting, at the first node, shares of the first common secret known to the first node, and sending the encrypted shares to the second nodes. The method further comprises receiving, at the first node, from the second node, encrypted shares of the first common secret to enable each of the plurality of nodes to reach a threshold number of shares of the first common secret to access the first common secret.

    Registry and automated management method for blockchain-enforced smart contracts

    公开(公告)号:US11120437B2

    公开(公告)日:2021-09-14

    申请号:US16078605

    申请日:2017-02-16

    摘要: The invention relates to the fields of tokenisation, blockchain and smart contract technologies. It provides a technical arrangement which simplifies the automated management of contracts. The invention comprises a method and system which use a computer-based repository for storage of the contract. The contract is then represented by a transaction on the blockchain. Metadata within the transaction's script includes a hash of the contract and a means of identifying its location within the repository. The transaction also includes an unspent output (UTXO) which indicates its status as an open (ie not terminated) contract. The contract is terminated by spending the output at a later point in time, for example, using n Lock Time+Check Lock Time Verify (CLTV). By combining this concept with other techniques and computing components, the invention can provide a powerful mechanism for implementing various tasks such as renewing or rolling over the contract, or dividing it into sub-contracts or conditions. Furthermore, as the status and existence of the contract is evidence via the blockchain, this provides a permanent, publicly visible and non-alterable record of the contract.

    IMPLEMENTING LOGIC GATE FUNCTIONALITY USING A BLOCKCHAIN

    公开(公告)号:US20190139031A1

    公开(公告)日:2019-05-09

    申请号:US16097516

    申请日:2017-04-28

    摘要: The invention presents a solution in which blockchain Transactions are created to implement the functionality of a logic gate. The invention may be implemented on the Bitcoin platform or an alternative blockchain platform. The transaction includes a locking script which comprises instructions selected so as to implement the functionality of a logic gate, such as the XOR gate. When the script is executed (because a second transaction is attempting to spend the output associated with the locking script) the inputs will be processed by the conditional instructions to provide an output of TRUE or FALSE. The inputs are pre-processed by one or more computing agents so that they are evaluated to TRUE or FASLE prior to being used as inputs to the script. The second transaction is transmitted to the blockchain network for validation and, if determined to be valid, it will be written to the blockchain. Validation of the second transaction can be interpreted as a TRUE output. Thus, the locking script of the first transaction provides the functionality of the desired logic gate. The invention provides numerous advantages and can be used in a wide variety of applications, such as for the implementation of control systems and unit.

    IMPLEMENTING LOGIC GATE FUNCTIONALITY USING A BLOCKCHAIN

    公开(公告)号:US20190116024A1

    公开(公告)日:2019-04-18

    申请号:US16097218

    申请日:2017-04-28

    IPC分类号: H04L9/06 H04L9/30 G06Q20/36

    摘要: The invention presents a solution in which blockchain Transactions are created to implement the functionality of a logic gate. The invention may be implemented on the Bitcoin platform or an alternative blockchain platform. The transaction includes a locking script which comprises instructions selected so as to implement the functionality of a logic gate such as OR, AND, XOR, NOT and so on. In some examples, the instructions may be provided in a hashed form. When the script is executed (because a second transaction is attempting to spend the output associated with the locking script) the inputs will be processed by the conditional instructions to provide an output of TRUE or FALSE. The second transaction is transmitted to the blockchain network for validation and, if determined to be valid, it will be written to the blockchain. Validation of the second transaction can be interpreted as a TRUE output. Thus, the locking script of the first transaction provides the functionality of the desired logic gate. The invention provides numerous advantages and can be used in a wide variety of applications, such as for the implementation of control systems and processes.