MEDIA CONTENT CONTROL
    1.
    发明申请

    公开(公告)号:US20210349967A1

    公开(公告)日:2021-11-11

    申请号:US17278169

    申请日:2019-09-19

    Abstract: According to an example aspect of the present invention, there is provided a method, comprising: receiving a cryptographic proof of use indicative of decoding of a first media content element by a user device (400), receiving a cryptographic first expected proof of use value (410), and controlling access to an encrypted second media content element associated with the first media content element on the basis of verification of the received cryptographic proof of use and the first expected proof of use value (420).

    Method and apparatus for trusted computing

    公开(公告)号:US11115205B2

    公开(公告)日:2021-09-07

    申请号:US16337574

    申请日:2016-09-29

    Abstract: Apparatus, method, computer program product and computer readable medium are disclosed for trusted computing. A method includes, at an isolated processor including a trusted execution environment and an isolated storage, receiving data encrypted with a first public key; decrypting the encrypted data with a first private key; performing calculation on the decrypted data by using an approved program; and providing the calculation result, wherein the approved program is authorized by a smart contract, a unique identifier of the smart contract is stored in the isolated processor, both the approved program and the isolated processor are verified by at least one participant of the smart contract, and the first public key and the first private key are generated by the isolated processor.

    Management of cryptographic transactions

    公开(公告)号:US10990704B2

    公开(公告)日:2021-04-27

    申请号:US16086643

    申请日:2016-03-23

    Abstract: According to an example aspect of the present invention, there is provided an apparatus comprising at least one processing core, at least one memory including computer program code, the at least one memory and the computer program code being configured to, with the at least one processing core, cause the apparatus at least to compile a set of transactions in a block chain based resource management system that have taken place after the most recent block was established, establish a new block in the block chain, and in establishing the new block, for transactions associated with verification accept messages and lacking sufficient resources, cause transferring of the lacking resources from verification nodes having sent the verification accept messages.

    METHOD AND APPARATUS FOR TRUSTED COMPUTING
    4.
    发明申请

    公开(公告)号:US20200036519A1

    公开(公告)日:2020-01-30

    申请号:US16337574

    申请日:2016-09-29

    Abstract: Apparatus, method, computer program product and computer readable medium are disclosed for trusted computing. A method comprising: at an isolated processor comprising a trusted execution environment and an isolated storage, receiving data encrypted with a first public key; decrypting the encrypted data with a first private key; performing calculation on the decrypted data by using an approved program; and providing the calculation result, wherein the approved program is authorized by a smart contract, a unique identifier of the smart contract is stored in the isolated processor, both the approved program and the isolated processor are verified by at least one participant of the smart contract, and the first public key and the first private key are generated by the isolated processor.

    Distributed data storage
    5.
    发明授权

    公开(公告)号:US11558179B2

    公开(公告)日:2023-01-17

    申请号:US16534514

    申请日:2019-08-07

    Abstract: According to an example aspect of the present invention, there is provided a method, comprising: receiving an input ordered set of transactions after a genesis block or a preceding compressed block in a chain of blocks, generating a compressed block on the basis of the input ordered set of transactions, wherein processing of the compressed block results to an equivalent final state as processing of the input ordered set of transactions, and providing the compressed block to a distributed network for establishing a new chain epoch and replacing a set of uncompressed blocks associated with the input ordered set of transactions.

    Secure de-centralized domain name system

    公开(公告)号:US11196573B2

    公开(公告)日:2021-12-07

    申请号:US16491053

    申请日:2017-03-06

    Abstract: A computer-implemented method for secure de-centralized domain name system, the method comprising: recording a domain registration transaction to a blockchain, the domain registration transaction comprising a domain name, a domain primary key corresponding to a domain public key and domain certificate information for a server node; recording a domain security transaction, comprising the domain public key, to the blockchain to generate a domain name record comprising the domain name, an associated IP address, the domain public key and the domain certificate information, wherein the domain security transaction being signed using the domain primary key; transmitting, by a client node, a domain name request to a domain name node; receiving, by the client node, a domain name response from the domain name node, the domain name response comprising the domain public key, the domain certificate information and the associated IP address retrieved from the domain name record of the blockchain; and initiating a secure communication between the client node and the server node using at least one of the domain public key and the domain certificate information.

    Positioning Information Verification
    7.
    发明申请

    公开(公告)号:US20200177393A1

    公开(公告)日:2020-06-04

    申请号:US16617855

    申请日:2018-05-16

    Abstract: According to an example aspect of the present invention, there is provided a method, comprising: receiving, by a positioning information receiver, an authentication information element from a positioning information source, requesting verification of authenticity of the positioning information source on the basis of the authentication information element and a distributed ledger of verified positioning information sources, and establishing a cryptographic session with the positioning information source for receiving positioning information in response to receiving an indication of verification of authenticity of the positioning information source.

Patent Agency Ranking