384 patents in CPC class H04W
This invention relates to distributed systems, and more particularly to methods and systems for event-locked operations in transactions using a blockchain network. The method includes: detecting, by a first node that is a member of a congress comprising a plurality of nodes, malicious activity by a malicious node that is also a member of the congress; providing, by the first node, a partial signature on a confiscation transaction to transfer portion of digital asset(s) deposited by the malicious node to an unspendable address, wherein the digital asset(s) deposited by the malicious node; determining, by a threshold number of members of the congress, that the digital assets of the malicious node should be confiscated, and then confiscating the at least portion of digital asset(s) of the malicious node by generating a valid signature for the confiscation transaction and suspending the malicious node from further participation in the congress.
Groups of devices may be prevented from accessing content by encrypting the content. A plurality of secrets associated with a decryption key may be generated using a secret sharing algorithm. The plurality of secrets may be sent to one or more groups of devices to derive the decryption key. A non-restricted subset of the groups of devices may receive one or more secrets. Devices within the non-restricted subset of the groups may be able to use one or more secrets to determine the decryption key for the content. Groups that do not receive one or more secrets may be unable to determine the decryption key for the content.
A method for sharing key identification (key ID) and public certificate data for access token verification comprises, at a network function (NF) repository function (NRF) including at least one processor, receiving, from a producer NF, an NF registration message including key ID version information. In response to detecting the key ID version information, sending, to the producer NF, an NF registration response message including a current key ID version value, at least one digital certificate, and at least one corresponding public key to the producer NF. The method further includes receiving, from the producer NF, an NF update message that includes the current key ID version value and in response to determining that the current key ID version value in the NF update message does not match an updated key ID version value maintained at the NRF, sending an NF update response message that the updated key ID version value, at least one updated digital certificate, and at least one corresponding updated public key to the producer NF.
A method for positioning a device includes: sending a query instruction to a server, wherein the query instruction is configured to query a target coordinate location of the terminal device. The method also includes receiving a query response from the server. The query response includes the target coordinate location and a target public key digest. The target coordinate location is obtained by encrypting a coordinate location that is positioned for the device. The target coordinate location is sent to the server as well as the target public key digest synchronously. The method also includes determining a target private key based on the target public key digest; and decrypting the target coordinate location using the target private key to obtain the coordinate location located by the device.
Qwyit® Authentication and Encryption Service serves as a direct replacement of Transport Layer Security. Applications can place a small code segment within their communications protocol, resulting in authenticated and encrypted message traffic with the features of TLS while adding additional improvements as set forth herein. QAES provides a direct next generation replication and enhancement of the current, only global secure communications framework. QAES provides the same features, benefits, authentication (embedded) and data security (stream cipher) for communications traffic using the Qwyit® Directory Service key store. The combination of features and properties provide a simple, straightforward way for any application to incorporate secure communications. The unique, superior Qwyit® protocol delivers where TLS fails: embedded security without any need for additional bandwidth, processing power or cumbersome user requirements. QAES shows Qwyit® can provide secure communications within the network tolerances for insecure communications. QAES easily allows any client/server or cloud-based application to add TLS-like authentication and encryption. The present invention includes a Qwyit® Directory Server application that can be run on, or added to, any current communications server (web, file, comms, app, DB, etc.), as well as client code for easy insertion into the communications protocol/processing of a connected device/app.
According to an example aspect of the present invention, there is provided an apparatus configured at least to: receive, from a service communication proxy, a request for an access token which authorizes access to a service at a network function provider, transmit an authorization token to the service communication proxy, the authorization token being specific to the request, and provide the access token to the service communication proxy responsive to determining that a cryptographic signature of a network function consumer on a signed version of the authorization token, received in the apparatus from the service communication proxy, is correct. The apparatus may work in a network serving user equipments, for example.