摘要:
본 발명은 해시 기반 서명 기법을 적용한 블록체인 시스템 및 방법에 관한 것으로, 블록체인 시스템의 각 노드는 해시 기반 서명 기법을 이용해 트랜잭션에 대한 서명인 트랜잭션 서명을 생성하고, 트랜잭션 서명을 트랜잭션에 저장하는 트랜잭션 서명 생성부와, 블록에 포함될 트랜잭션 각각에 대응하는 머클 서명을 생성하고, 머클 서명이 저장된 트랜잭션들을 포함하는 블록을 생성하는 블록 생성부와 검증하고자 하는 트랜잭션의 트랜잭션 서명을 검증하고, 검증하고자 하는 트랜잭션의 머클 서명의 검증을 통해서 트랜잭션을 검증하는 트랜잭션 검증부를 포함하여 블록체인 서비스를 제공할 수 있다.
摘要:
Example embodiments relate to combining hashes of data blocks. The examples disclosed herein calculate a hash value for each data block in a sequence of data blocks. The hash values are combined into a combined value, where the combined value has the same sequence as the sequence of data blocks. A master hash value is then calculated for the combined value.
摘要:
A Trustonic DRM Plug-in is provided that can be downloaded and operate in conjunction with an Android framework. The solution also includes a PVP with the downloadable DRM. The system includes components that can be added by Trustonic based on the Android 4.3 Framework in addition to current t-base 300 that can be used by any DRM vendor. The system enables the DRM to be downloaded in the field since all DRMs could use the standard API services of the Android 4.3 OS. With a codec component employed like H.264 or HEVC that can use the PVP with the downloaded DRM component, the Android video player can use the component to satisfy HD content security requirements.
摘要:
Cryptographic hashing circuitry such as mining circuitry used to mine digital currency may be formed on an integrated circuit. The hashing circuitry may include sequential rounds of register and logic circuitry that perform operations of a cryptographic protocol. A final hash value output by the hashing circuitry may include hash values stored at previous rounds of the cryptographic hashing circuitry. The hashing circuitry may be formed with only two registers per round, thereby optimizing chip area consumption. The hashing circuitry may perform sequential rounds of cryptographic hashing based on an initial hash value and multiple message words. One or more message registers may store the message words. Control circuitry may selectively route the message words from the message register to the hashing circuitry using pointers. If desired, the message registers may be replaced by one or more arrays of memory elements read using row and column pointers.
摘要:
Techniques for HTTP header compression are described herein. In an implementation, an electronic device may be configured to enable compression/decompression of HTTP messages, including compression/decompression of information in the headers of the messages. A HTTP message is generated that contains at least a header and a body. The HTTP message is reformatted to place at least some of the header information into the body. Then, the body of the reformatted message having the header information is compressed to form a compressed HTTP message. Decompression may be applied by a recipient of the compressed HTTP message to reconstruct the original HTTP message.
摘要:
Systems, methods, and apparatus are provided for generating verification data that may be used for validation of a wireless transmit-receive unit (WTRU). The verification data may be generated using a tree structure having protected registers, represented as root nodes, and component measurements, represented as leaf nodes. The verification data may be used to validate the WTRU. The validation may be performed using split-validation, which is a form of validation described that distributes validation tasks between two or more network entities. Subtree certification is also described, wherein a subtree of the tree structure may be certified by a third party.
摘要:
A method is provided for creating an encrypted data file (700) from a data file having a sample entry box and a media data box. The sample entry box has description information therein. The media data box includes media data therein. The method includes: receiving the data file; encrypting the media data within the media data box with an encryption key; replacing the sample entry box with an encoded box (302); creating a sinf box (702) within the encoded box (302); creating a frma box (306) within the sinf box (702); and creating an schm box (704) within the sinf box (702). The schm box (704) indicates the type of formatting of the encrypted media data. The encoded box (302) does not include an initial counter that may be used to decrypt the encrypted media data.
摘要:
A method is described for defining a reserved pattern of symbols, receiving in a crypto-module an input stream including sequential input symbols, applying a cipher to the input stream in the crypto-module so as to generate an intermediate stream including sequential output symbols corresponding respectively to the input symbols, and converting the intermediate stream to an output stream from the crypto-module by comparing successive groups of the input symbols and the corresponding output symbols to the reserved pattern and, upon finding a match to the reserved pattern in a given group, substituting the input symbols in the group into the intermediate stream in place of the corresponding output symbols. Related hardware and systems are also described.
摘要:
A system and method for securely storing and transmitting digital information Includes a computing device connected to at least one of a network device or a storage device or both. The system and method also includes a communication network connected to the at least one of a network device or the at least one of a storage device, or both. The system and method may include the computing device being configured to receive and receiving at least a portion of one or more first bit streams from an input device, being configured to parse and parsing the at least a portion of the one or more bit streams to form one or more first datasets, being configured to compress and compressing the one or more first datasets to form one or more second datasets, being configured to encrypt and cryptographically modifying the one or more second data sets to form one or more third datasets, being configured to assemble and assembling the one or snore third datasets to form at least one second bit stream; and being configured to disperse and dispersing the at least one second bit stream into multiple portions in such a manner that any minim urn number of the total number of dispersed portions contains a complete second bit stream, and being configured to output and outputting die total number of dispersed portions to one or more of local and remote data storage devices.