Distributed data authentication and validation using blockchain

    公开(公告)号:US11140177B2

    公开(公告)日:2021-10-05

    申请号:US16118699

    申请日:2018-08-31

    Abstract: An electronic device of a content producer generates a chunk of data, associates a location-independent name with the chunk of data, generates a signature for the chunk of data, attaches the signature to the chunk of data, and transmits the chunk of data, with the signature attached, to one or more user devices in response to respective requests. The signature is generated based on the data in the chunk, using a private key of the electronic device. The electronic device also stores information, including a specification of a public key associated with the private key, in a first ledger entry of a blockchain, to provide the one or more user devices with access to the public key. A user device may obtain the public key and use it to verify the chunk of data.

    Realtime communication architecture over hybrid ICN and realtime information centric transport protocol

    公开(公告)号:US11095702B2

    公开(公告)日:2021-08-17

    申请号:US16405154

    申请日:2019-05-07

    Abstract: A consumer sends to a producer Interests to request data packets of a data stream that are generated at a production rate. Each data packet includes a name of the data stream, a segment of data, and a current segment number that identifies the data packet in the data stream and that increments as the data packets are generated. The Interests include the name and segment numbers of segments requested by the Interests. The consumer synchronizes the segment numbers with the current segment numbers and a rate for sending the Interests to the production rate. The consumer sends to the producer the Interests at the rate and with the segment numbers as synchronized, in order to minimize a delay time between when the data packets are generated and when the data packets are received at the consumer. The consumer receives from the producer data packets satisfying the Interests.

    TRANSPORT LAYER SECURITY EXTENSION FOR HYBRID INFORMATION CENTRIC NETWORKING

    公开(公告)号:US20210120038A1

    公开(公告)日:2021-04-22

    申请号:US16656621

    申请日:2019-10-18

    Abstract: Presented herein is a solution in which a Producer that provides Transport Layer Security (TLS) over a hybrid Information Centric Network (hICN) announces two different hICN prefixes or namespaces. One hICN prefix is for performing a TLS handshake (also called a handshake prefix or handshake namespace) and another hICN prefix (also called a secure prefix or secure namespace) is to publish content in a secure, and confidential manner with a Consumer that correctly performs a TLS handshake. While the handshake prefix is public and shared by multiple Consumers, a secure prefix is uniquely assigned to a Consumer after the TLS handshake successfully terminates. Content published under the secure prefix is encrypted with the encryption key established during the TLS handshake. Names used in the secure namespace are private, meaning only the Consumer and Producer that perform the handshake can infer any information about a content by looking on the name.

    Reusable acknowledgments
    16.
    发明授权

    公开(公告)号:US10911207B1

    公开(公告)日:2021-02-02

    申请号:US16721717

    申请日:2019-12-19

    Abstract: This disclosure describes techniques for employing a reusable acknowledgment in communications among network devices. The techniques include generating a reusable negative acknowledgment (NACK) in response to a request for data that are unavailable. The reusable NACK may be sent as a response for at least some additional requests for unavailable data, rather than generating a new NACK for each request. As such, the reusable NACK may help decrease the computational load for a network device. In some cases, the use of a reusable NACK may help lessen the impacts of denial-of-service type attacks across a network.

    LIGHTWEIGHT NAMING SCHEME FOR AGGREGATING REQUESTS IN INFORMATION-CENTRIC NETWORKING

    公开(公告)号:US20190306233A1

    公开(公告)日:2019-10-03

    申请号:US15943775

    申请日:2018-04-03

    Abstract: In one embodiment, a device in a network receives an interest request for one or more pieces of content data available in the network. The interest request specifies the one or more pieces of content data via one or more bits sets in a content request bitmap of the interest request, each bit of the content request bitmap being associated with a different piece of content data. The device compares the content request bitmap to a content availability bitmap in a forwarding information base (FIB) of the device that is associated with a particular interface of the device and each bit of the content availability bitmap indicates whether a particular piece of content data is available via the particular interface. The device forwards the interest request via the particular interface, based on the comparison between the content request bitmap and the content availability bitmap in the FIB of the device.

    IAAS-AIDED ACCESS CONTROL FOR INFORMATION CENTRIC NETWORKING WITH INTERNET-OF-THINGS

    公开(公告)号:US20190297063A1

    公开(公告)日:2019-09-26

    申请号:US15928265

    申请日:2018-03-22

    Abstract: A producer communicates over a network with a user application in an infrastructure-as-a-service (IaaS) and an IaaS node. The producer encrypts content with first encryption using a first key and second encryption using a second key, to produce twice encrypted content. The producer encrypts the second key with attribute-based encryption and symmetric encryption using an IaaS key, to produce a twice encrypted second key. The producer provides to the user application the twice encrypted content, the twice encrypted second key, and key information configured to remove the first encryption from the twice encrypted content. The producer provides to the IaaS node the IaaS key to enable the IaaS node to remove the symmetric encryption from the twice encrypted second key, such that the user application and the IaaS node are constrained to exchange with each other key-related information and intermediate decryption results in order to recover the content.

Patent Agency Ranking