Looking for breakthrough ideas for innovation challenges? Try Patsnap Eureka!

Systems and methods of blockchain platform for intermediaries and passwordless login

a blockchain and intermediary technology, applied in the field of cloud computing, can solve the problems of system susceptible to single point failure, permanent loss of data, and no mechanism known in the industry that allows flexible user control to proxy reencryption,

Inactive Publication Date: 2020-10-01
0CHAIN LLC
View PDF0 Cites 25 Cited by
  • Summary
  • Abstract
  • Description
  • Claims
  • Application Information

AI Technical Summary

Benefits of technology

The present invention is related to systems and methods on a blockchain platform for one or more intermediaries. The technical effects of the patent text include: receiving a ciphertext from a user with condition parameters that has been encrypted with a dynamically selected encryption algorithm, receiving a re-encryption key for another user, identifying whether the ciphertext is valid, re-encrypting the ciphertext, and outputting the re-encrypted ciphertext only if the ciphertext is valid. The system and method for intermediaries do not have the ability to decrypt the received ciphertext. Additionally, the patent text describes a mechanism for enforcing security policies for stored encrypted files on the blockchain platform, and a system for authenticating clients without a password.

Problems solved by technology

There are no mechanisms known in the industry that allow flexible user control to proxy reencryption.
The current model of cloud storage is operated through centralized authorities, which makes such a system susceptible to single point failures and permanent loss of data.
When the service provided by the dApp is not directly from the dApp owner itself but from other third parties, it brings up additional challenges.
While there are policies in the industry that provide end-to-end user flexibility in securing content from authoring to distribution, none of them offer flexibility in a blockchain setup where there is no single entity on the cloud controlling access.
While most systems offer securing content, they may fall short of providing an independently verifiable audit capability.
In a world of increasing cyber crime and digital fraud, when something goes wrong, it requires a lot of time and effort to do digital forensic investigation.
In such a situation, the entity smart wallet authentication system is vulnerable if passwords are shared by two or more people.
Such a vulnerability could also exist for a smart wallet associated with a household that has two or more members with access privileges.
Some even prevent reusing the previous 10 passwords, making it extremely painful to employees.
While this improves the security, it imposes unnecessary burden on the employees.
There is no simple, seamless and effortless method to provide access without compromising on the level of security provided.

Method used

the structure of the environmentally friendly knitted fabric provided by the present invention; figure 2 Flow chart of the yarn wrapping machine for environmentally friendly knitted fabrics and storage devices; image 3 Is the parameter map of the yarn covering machine
View more

Image

Smart Image Click on the blue labels to locate them in the text.
Viewing Examples
Smart Image
  • Systems and methods of blockchain platform for intermediaries and passwordless login
  • Systems and methods of blockchain platform for intermediaries and passwordless login
  • Systems and methods of blockchain platform for intermediaries and passwordless login

Examples

Experimental program
Comparison scheme
Effect test

Embodiment Construction

[0033]The systems and methods on a blockchain platform for intermediaries and passwordless login allow for intermediary proxy re-encryption, independent audits, secure multiple persons controlled smart contract or smart wallet, and split-keys short-range wireless device-based and passwordless client authentication. One or more entities (or service providers) that help or manage the self-regulation on the blockchain platform are miners. A client is an end-user with two or more computing devices who initiates the requests and wants to commit transactions on the blockchain platform. An intermediary may be a blobber or a sharder who uses a computing device that processes the applications on the blockchain platform.

[0034]Different embodiments described herein include components or structures to perform the described functionality. A “component” or a “module” as used in this invention disclosure, includes a dedicated or shared processor and, typically, firmware or software modules execute...

the structure of the environmentally friendly knitted fabric provided by the present invention; figure 2 Flow chart of the yarn wrapping machine for environmentally friendly knitted fabrics and storage devices; image 3 Is the parameter map of the yarn covering machine
Login to View More

PUM

No PUM Login to View More

Abstract

The systems and methods on a blockchain platform for one or more intermediaries for services including proxy re-encryption, independent audit, multiple-signatures based smart wallet associated with a smart contract and split-key authentication to achieve secure passwordless login. Proxy re-encryption by receiving a ciphertext from a first user with condition parameters that has been encrypted with a dynamically selected encryption algorithm. Audit service receiving an encrypted file from a user for storage on the blockchain platform; enforcing the security policy parameters for all access requests to the file on the blockchain platform; and optionally providing audit report of the encrypted file storage and access. A smart wallet with a group key using multiple signatures based on receipt of a threshold number of signatures. Split-key authentication by splitting the private key into two or more parts; and assigning the split private key part to two or more client devices.

Description

[0001]If an Application Data Sheet (ADS) has been filed on the filing date of this application, it is incorporated by reference herein. Any applications claimed on the ADS for priority under 35 U.S.C. §§ 119, 120, 121, or 365(c), and any and all parent, grandparent, great-grandparent, etc. applications of such applications, are also incorporated by reference, including any priority claims made in those applications and any material incorporated by reference, to the extent such subject matter is not inconsistent herewith.CROSS-REFERENCE TO RELATED APPLICATIONS[0002]The present application is related to and / or claims the benefit of the earliest available effective filing date(s) from the following listed application(s) (the “Priority Applications”), if any, listed below (e.g., claims earliest available priority dates for other than provisional patent applications or claims benefits under 35 USC § 119(e) for provisional patent applications, for any and all parent, grandparent, great-gr...

Claims

the structure of the environmentally friendly knitted fabric provided by the present invention; figure 2 Flow chart of the yarn wrapping machine for environmentally friendly knitted fabrics and storage devices; image 3 Is the parameter map of the yarn covering machine
Login to View More

Application Information

Patent Timeline
no application Login to View More
IPC IPC(8): H04L9/06H04L9/08H04L29/06G06F21/62G06F21/60H04L9/30H04L9/32G06Q20/38G06Q20/36
CPCG06Q20/36G06Q2220/00G06F21/602H04L9/3271G06Q20/3829G06Q20/389H04L9/0891G06F21/6218H04L9/0637H04L63/1458H04L2209/38H04L9/3073H04L63/0478H04L9/085H04L63/065H04L63/0823H04L9/3239H04L9/3255G06F21/64G06Q20/3674G06Q20/3825G06Q20/02G06Q20/4014G06Q20/38215H04L9/50H04W4/80H04W76/10H04L9/3247G06F21/6209G06F2221/2101H04L9/0643H04L63/20
Inventor BASU, SASWATADIRISALA, SIVA
Owner 0CHAIN LLC
Who we serve
  • R&D Engineer
  • R&D Manager
  • IP Professional
Why Patsnap Eureka
  • Industry Leading Data Capabilities
  • Powerful AI technology
  • Patent DNA Extraction
Social media
Patsnap Eureka Blog
Learn More
PatSnap group products