WO2019227225A1 - Systèmes et procédés pour établir des communications par le biais d'une chaîne de blocs - Google Patents

Systèmes et procédés pour établir des communications par le biais d'une chaîne de blocs Download PDF

Info

Publication number
WO2019227225A1
WO2019227225A1 PCT/CA2019/050750 CA2019050750W WO2019227225A1 WO 2019227225 A1 WO2019227225 A1 WO 2019227225A1 CA 2019050750 W CA2019050750 W CA 2019050750W WO 2019227225 A1 WO2019227225 A1 WO 2019227225A1
Authority
WO
WIPO (PCT)
Prior art keywords
users
blockchain
consensus
recipient
user
Prior art date
Application number
PCT/CA2019/050750
Other languages
English (en)
Inventor
David LIFSON
Mikhail BEREZOVSKIY
Michael DABYDEEN
Dan Yi LIN
Mauricio BERTANHA
Original Assignee
Skrumble Technologies Inc.
Priority date (The priority date is an assumption and is not a legal conclusion. Google has not performed a legal analysis and makes no representation as to the accuracy of the date listed.)
Filing date
Publication date
Application filed by Skrumble Technologies Inc. filed Critical Skrumble Technologies Inc.
Publication of WO2019227225A1 publication Critical patent/WO2019227225A1/fr

Links

Classifications

    • HELECTRICITY
    • H04ELECTRIC COMMUNICATION TECHNIQUE
    • H04LTRANSMISSION OF DIGITAL INFORMATION, e.g. TELEGRAPHIC COMMUNICATION
    • H04L9/00Cryptographic mechanisms or cryptographic arrangements for secret or secure communications; Network security protocols
    • H04L9/50Cryptographic mechanisms or cryptographic arrangements for secret or secure communications; Network security protocols using hash chains, e.g. blockchains or hash trees
    • GPHYSICS
    • G06COMPUTING; CALCULATING OR COUNTING
    • G06FELECTRIC DIGITAL DATA PROCESSING
    • G06F16/00Information retrieval; Database structures therefor; File system structures therefor
    • G06F16/20Information retrieval; Database structures therefor; File system structures therefor of structured data, e.g. relational data
    • G06F16/27Replication, distribution or synchronisation of data between databases or within a distributed database system; Distributed database system architectures therefor
    • HELECTRICITY
    • H04ELECTRIC COMMUNICATION TECHNIQUE
    • H04LTRANSMISSION OF DIGITAL INFORMATION, e.g. TELEGRAPHIC COMMUNICATION
    • H04L12/00Data switching networks
    • H04L12/02Details
    • H04L12/16Arrangements for providing special services to substations
    • H04L12/18Arrangements for providing special services to substations for broadcast or conference, e.g. multicast
    • H04L12/1813Arrangements for providing special services to substations for broadcast or conference, e.g. multicast for computer conferences, e.g. chat rooms
    • H04L12/1818Conference organisation arrangements, e.g. handling schedules, setting up parameters needed by nodes to attend a conference, booking network resources, notifying involved parties
    • HELECTRICITY
    • H04ELECTRIC COMMUNICATION TECHNIQUE
    • H04LTRANSMISSION OF DIGITAL INFORMATION, e.g. TELEGRAPHIC COMMUNICATION
    • H04L9/00Cryptographic mechanisms or cryptographic arrangements for secret or secure communications; Network security protocols
    • H04L9/32Cryptographic mechanisms or cryptographic arrangements for secret or secure communications; Network security protocols including means for verifying the identity or authority of a user of the system or for message authentication, e.g. authorization, entity authentication, data integrity or data verification, non-repudiation, key authentication or verification of credentials
    • H04L9/3236Cryptographic mechanisms or cryptographic arrangements for secret or secure communications; Network security protocols including means for verifying the identity or authority of a user of the system or for message authentication, e.g. authorization, entity authentication, data integrity or data verification, non-repudiation, key authentication or verification of credentials using cryptographic hash functions
    • H04L9/3239Cryptographic mechanisms or cryptographic arrangements for secret or secure communications; Network security protocols including means for verifying the identity or authority of a user of the system or for message authentication, e.g. authorization, entity authentication, data integrity or data verification, non-repudiation, key authentication or verification of credentials using cryptographic hash functions involving non-keyed hash functions, e.g. modification detection codes [MDCs], MD5, SHA or RIPEMD

Definitions

  • the present disclosure relates generally to blockchain technology and more particularly to improved systems and methods of establishing, supporting and securing peer-to-peer (“P2P”) communications via blockchain systems and infrastructure.
  • P2P peer-to-peer
  • the Internet has revolutionized the way people communicate and connect. Video chats are possible with the click of a button, businesses can operate and collaborate internationally, banks facilitate international transfers of trillions of dollars, and reaching out to the president of a country is just a tweet away. With e-commerce, an item could be manufactured in Guangzhou, and sold by a company in New York to a woman in Sydney. Social media has changed the face of communication, news reporting and entertainment. The Internet has succeeded in connecting nearly everyone on its network, but its use also raises concerns regarding privacy and data security.
  • Communication applications are used to manage massive amounts of data traffic every day. However, these extremely high volumes of data are typically routed through a centralized server with one main point of contact. In this kind of centralized system, breaching a single point of contact is easier and could give malicious parties access to a mass amount of the network’s data. This would allow hackers to steal and tamper with information.
  • Constant apprehension and data insecurity inhibit users from creating sustainable online communities and sharing meaningful information in conversations.
  • a challenge of online engagement is developing relationships while protecting user identity, creating comfort, security, and developing actionable activities.
  • People need untethered access to public forums and platforms to exercise their fundamental human right to speak freely, and not feel concerned with intermediaries and unknown third parties having access to their private information.
  • Simply discussing common interests, sharing stories and networking helps to bring people together. When people are connected, they feel unguarded and comfortable enough to share genuine and honest ideas, personal information and establish meaningful relationships.
  • Peer to peer communications are extremely common; however, there is a need for a blockchain that can carry the information required to establish a communications session.
  • “communications” as discussed herein are not necessarily limited to, for example, text, audio and video but may, in some instances, also include financial and other discourse and/or other P2P exchanges.
  • Blockchain in a broad conception may address some security concerns, but there are significant technical limitations regarding data storage and connection speeds which must also be addressed to meet user requirements regarding speed and overall quality of user experience.
  • Figure 1A is a block diagrams showing steps in an exemplary method
  • Figure 1B is a schematic representation of key derivation and transmission in methods disclosed herein;
  • Figure 2 is a schematic representation of an exemplary file separation an storage in methods disclosed herein;
  • Figure 3 is a block diagram showing steps in a method of communications initiation;
  • Figure 4 is a block diagram showing steps in a method of communications acceptance
  • Figure 5 is a block diagram showing steps in a further method of communications acceptance.
  • FIG. 6 is a schematic representation of systems and methods of communications disclosed herein.
  • Figure 7 is a schematic and block diagrammatic representation of a further embodiments of systems disclosed herein.
  • the method includes determining if a transaction request was sent;
  • the method further comprises generating a transaction ID before determining if a request was sent.
  • the initiating a P2P connection process comprises opening a stream for transmission of communication between the initiator and the recipient.
  • the opening comprises establishing a connection wherein an IP address of the initiator and the recipient is revealed to the other and a secure web socket connection is established therebetween.
  • the socket connection comprises a high-capacity rich communication bridge.
  • the method further comprises encryption of the transmission, comprising separation of the transmission into a plurality of pieces and distributing and storing the pieces on disparate servers.
  • the method further comprises retrieval of the pieces from the servers and reassembly thereof into the transmission based on a positive result of a key authentication process.
  • a length of time to store the transmission and permissible size thereof are dictated by a usage level of the sender and/or the recipient.
  • the method further comprises storage of the transmission, comprising storage on a cloud-based server limited access.
  • the storage of the transmission is initiated by an administrator.
  • the method further comprises distributing to the users rewards comprising tokens, based on the users meeting criteria.
  • the criteria comprises one or more of minimum threshold numbers or volumes of initialized transmissions, promoted initialization by others, mining activities, authentication activities.
  • the transmission comprises one or more of messaging, audio, images, voice calls, video calls, file transfers, group conferencing, screen sharing, instructions for internet of things devices, video devices, audio devices, home and other automation devices.
  • the transmission further comprises a contract engagement and payment for services rendered thereunder.
  • the method further comprises establishing one or more P2P and/or group interaction points through which one or more of the users may broadcast media and/or send and/or receive payments.
  • the determining if consensus has been achieved further comprises: receiving a communication request comprising a data payload from a first user intended to reach a communications device of the intended recipient; reviewing the data payload to determine any next actions; sending a notification to acknowledge the transaction.
  • the determining further comprises mining consensus authentication and validation.
  • the mining further comprises providing incentives to one or more master node server hosts and/or mining community partners to speed the determining.
  • the methods further comprise sending a notification by: determining a transaction type; determining an intended party; assembling a notification payload; sending a notification to the intended party.
  • the determining a transaction type comprises reading details of a blockchain transaction and/or a transaction request.
  • the determining an intended party comprises querying a correlation database to assess correlation between a device ID and a public key.
  • the assembling comprises compiling data to be provided to intended party, wherein the data comprises one or more of initiating party device ID, intended party public key, matching server address, and hash increment.
  • the method further comprises reading a notification payload to determine next action(s) and based on the payload.
  • the method further comprises conducting an application polling process.
  • the P2P connection process comprises deriving a key based on one or more traits of the initiator and/or the intended recipient.
  • the method further comprises deriving a plurality of keys from a master key, comprising: collecting from each of the users elements comprising: public key to a wallet where the users hold network tokens, a secure passcode, a pseudonym, creating from the elements a derivative and generating from the derivative a unique private network user identification and a public identification for each of the users, encrypting communications between the users based on a further derivative of the network user identification of each of the users participating in the communications, the further derivative comprising a seed key for the encrypting.
  • computer readable media containing instructions for performing the steps of the methods described above.
  • the computer readable media are provided in a format for use as a component of or adjunct to one or more third-party software applications.
  • a non-transitory computer-readable storage medium containing instructions for causing a processor to: determine if a transaction request was sent by a user; populating a blockchain data packet based on the request; initiate a mining process; determine if consensus has been achieved amongst the user and a recipient; send the user an error message if there is no consensus, or sending an incoming message notification to the recipient if there is consensus; determine availability of the recipient; send the user a notification of unavailability if the recipient is unavailable or generating an encryption key and initiating a P2P connection process if the recipient is available.
  • the authentication further comprises separating internal traffic between peer and validating node functions, and further comprises assembling an audit trail comprising details of all authorized and unauthorized connection attempts to the blockchain.
  • the encrypting comprises: defining a first set of cryptographic transforms and enabling definition of at least a second set of cryptographic transforms comprising an additive stream cipher for encryption, a keyed-hash based function for message authentication, and an implicit index for sequencing/synchronization based on an RTP sequence number.
  • a payload of information from a first group of users to a second group of users to establish a secure peer-to-peer (P2P) communication, a plurality of nodes adapted to communicate with one another via a hashed messaging protocol, wherein the nodes comprise peer nodes and validating nodes, wherein the peer nodes are adapted to broadcast, receive and transfer blocks of transaction data, and the validating nodes are adapted to create blocks of transaction data
  • the protocol comprises a hashing algorithm comprises incrementation of a first identifier field comprising a version identification (VID) which indicates to other users what version of the application is being used, and a second identifier field comprising an incrementation identification (IID) which indicates to other legs of the communications which hashing algorithm to use.
  • VIP version identification
  • IID incrementation identification
  • Decentralized networks like the blockchain do not store information in one central location, which makes it almost virtually impossible for cybercriminals to hack. As soon as information is recorded in a blockchain’s distributed ledger it cannot be erased, changed, relocated or tampered with in any way. Attacking one central server is no longer enough to gain control over the entire system. This consensus- based immutability of a decentralized network creates a transparent and secure framework with vast implications.
  • Trust has always been a fundamental currency of both communication and commerce. Every second new online transactions occur between strangers around the world, usually through a third party enabling the communication transaction, and trust needs to be manufactured between the user and host to complete the operation. Whether a message is sent, or a payment is made, the sender has no choice but to trust that the intermediary will deliver the transaction to the intended recipient safely.
  • a distributed blockchain ledger users can securely and directly connect and perform transactions with each other, without having to rely on an intermediary or worry about protecting their privacy.
  • Blockchain and decentralized networks offer a way to confidently operate in a trust-less environment using its distributed ledger to create transparency and consensus -driven, tamper-proof logs of transactions. Every transactional‘block’ is verified by the entire network and then immutably linked to the‘chain’ to provide unparalleled security and accountability. Additionally, there is an overwhelming need to improve identity management protocols on the web. The need to verify one’s identity is now essential for numerous online accounts and transactions, including, for example, your personal home address, contact information, financial information and more.
  • Distributed ledgers offer enhanced methods for verifying identity, without having to share contact details, along with the possibility to digitize personal information.
  • the dual -encryption mechanism on a blockchain with public and private keys enables applications to digitally verify the identity of the people using them and eliminates the risk of false key propagation and data tampering or theft.
  • a decentralized communication solution will mean users can securely and directly connect and transact with one another, without having to worry about their privacy.
  • the method 100 includes determining if a transaction request was sent 106, after generating a transaction identification or ID; populating a blockchain data packet 108; initiating a mining process 110; determining if consensus 112 has been achieved amongst a plurality of users. If no consensus has been reached, the initiator will be sent an error message 114 if there is no consensus, or an incoming message notification 116 will be sent to a recipient if there is consensus.
  • Determining if consensus has been achieved 112 includes receiving a communication request comprising a data payload 108 from the user (sender) 102 intended to reach a communications device of the intended recipient 126.
  • the data payload 108 is reviewed to determine next actions and a notification may be sent to acknowledge the transaction (e.g, 116).
  • the determining 112 may also include mining consensus authentication and validation. Mining may also include providing incentives to one or more master node server hosts and/or mining community partners to speed the determining 112.
  • Availability of intended recipient will be determined 118, and the initiator 102 sent a notification of unavailability 120 if the intended recipient is unavailable. If the recipient is available, an encryption key will be generated and a P2P connection process initiated 124.
  • initiating the connection process 124 includes opening a stream 136 for transmission of communication between the initiator 102 and the recipient 126.
  • the transmission may include, for example, one or more of messaging, audio, images, voice calls, video calls, file transfers, group conferencing, screen sharing, instructions for internet of things devices, video devices, audio devices, home and other automation devices.
  • the transmission may also include a contract engagement and payment for services rendered thereunder, or establishment od one or more P2P and/or group interaction points through which one or more of the users may broadcast media and/or send and/or receive payments.
  • the opening 136 comprises establishing a connection wherein an IP address of the initiator 102 and the recipient 126 is revealed to the other and a secure web socket connection 136 is established therebetween.
  • the connection comprises a high-capacity rich communication bridge 136.
  • the method may also comprise encryption of the transmission. For example, by separation 146 of the transmission into a plurality of pieces 150 and distributing and storing the pieces on disparate servers 152.
  • the method may further comprise retrieval of the pieces 150 from the servers 152 and reassembly thereof into the transmission based on a positive result of a key authentication process.
  • a length of time to store the transmission and permissible size thereof may be dictated by a usage level of the sender and/or the recipient and graduated permission /privilege levels related to such usage.
  • the method 100 may also include storage of the transmission, including, for example, storage on a cloud- based server with access limited to users with key-based permissions. Storage of the transmission may, in some embodiments, be initiated by an administrator so empowered.
  • the method may also include distributing to the users 102, 126 rewards comprising tokens, based on the users meeting criteria, which may include usage thresholds, volumes of initialized transmissions, promoted initialization by others, mining activities, authentication activities.
  • the methods 100 may also include sending a notification 116 by, for example, determining a transaction type 204 (in Figure 7), determining an intended party; assembling a notification payload; and sending a notification to the intended party.
  • Determining a transaction type may include reading details of a related blockchain transaction and/or a transaction request.
  • Determining an intended party comprises querying a correlation database 218 to assess correlation between a device ID and a public key.
  • Assembling a notification payload 108 include compiling data to be provided to intended party, wherein the data comprises one or more of initiating party device ID, intended party public key, matching server address, and hash increment.
  • the notification payload may be read to determine next action(s) and based on the payload. If there is no consensus, the method further comprises conducting an application polling process 1 l4b (see Figure 3).
  • the P2P connection process includes deriving a key based on one or more traits of the initiator and/or the intended recipient. This may includes deriving a plurality of keys from a master key. This includes collecting from each of the users’ elements including a public key to access a wallet where the users hold network tokens, as well as a secure passcode and a pseudonym. From the elements, a derivative is created from which there is derived a unique private network user identification and a public identification for each of the users. These identifications are used to encrypt communications between the users based on a further derivative of the network user identification of each of the users participating in the
  • the further derivative comprising a seed key for the encrypting.
  • systems and methods 100 of providing a secure, communication-centric blockchain including decentralized communication application, as well as, in some embodiments, a communication layer for developers to add into any application.
  • the disclosed systems and methods 100 allow for open, global private communication and transactions that are truly community owned and operated. This is accomplished via systems and methods 100 disclosed herein which facilitate rich multimedia, quick transaction times, security and, for example, in-app financial exchanges.
  • the disclosed systems 100 and methods 100 function to carry a payload 108 of information that is required to establish a peer-to-peer (P2P) communication, or financial transaction ledger data.
  • P2P peer-to-peer
  • An aim of the disclosed systems 100 and methods 100 is to achieve required consensus as quickly as possible. Although transactions per second (“TPS”) is critical, disclosed systems 100 may be scaled to an eventual 1000 TPS or beyond.
  • Systems and methods disclosed 100 herein provide an ability to implement leading decentralized communication features such as group and peer-to-peer messaging, calling, video, file transfers and more with one blockchain network protocol.
  • the systems disclosed herein comprise, in some embodiments, a P2P network structure, in which nodes can communicate with each other through a hashed messaging protocol.
  • nodes can communicate with each other through a hashed messaging protocol.
  • peer nodes there are two different types of nodes: peer nodes and validating nodes.
  • a peer node can broadcast, receive and transfer transactions or blocks, while a validating node can create blocks of data.
  • the systems and methods 100 disclosed herein may comprise, in some embodiments, a communication centric public blockchain. Such embodiments, which benefit all token holders, do not necessarily belong to any single organization or individual and aim to embracing the blockchain token community, to facilitate system growth, adoption and advancement.
  • the systems and methods may also include aspects of enhancing security with communications technology solutions, incorporating a blockchain ledger supporting secure communications transactions; however, one skilled in the art will appreciate that applications of disclosed systems and methods are not necessarily so limited.
  • Disclosed systems and methods include embodiments with applicability well beyond applications for traditional individuals or groups of users. This includes, for example, establishing communications for Internet of things (“iOT”) applications that require a high degree of security. Examples include implementation into body worn cameras for police and first responders.
  • iOT Internet of things
  • the disclosed systems and methods enable real-time, commercial-grade communication with user identities authenticated on the blockchain by providing a secure key that may be a randomized derivative of each participant’s public key. Access to communications would be limited to the actual participants themselves. There is no middle entity in between to censor, block or manipulate any data. This will enable open, substantially global, private communication that is in effect community operated. This creates opportunities for users to add decentralized communication elements into any blockchain ecosystem and/or build applications with decentralized communication features.
  • the disclosed systems and methods may be regulated with, for example, distributed SSL protocol and rich- media WebRTC based communication technologies.
  • the systems disclosed herein provide for use of a unique consensus -based algorithm
  • pseudonymous identification measures where users set their own usernames, users will maintain ownership/control of their information, data and communication transactions. Users will have the opportunity to bring together large groups of people into online communities or have one-on-one conversations with another user and keep that information completely private and secure.
  • the network allows users to interact using seamless messaging, calling, video, file transfers, and more and improve users access to communication, identity management, and unlimited secure communication
  • the disclosed systems 100 and methods 100 incorporate unique and novel security technology to solve and/or substantially mitigate security risks of current Internet-based
  • Features exhibited by systems and methods disclosed herein may in some embodiments include at least messaging, audio calling, video calling, file transfers, group conferencing, screen sharing, user-controlled storage, data encryption, and pseudonymous identification.
  • Systems and methods disclosed herein comprise in some embodiments a blockchain optimized for today’s modem communication needs of rich multimedia, quick transaction times, security and in-app financial exchanges.
  • functions include to carry a payload 108 of information that is required to establish a peer-to-peer (P2P) communication or, for example and without limitation, financial transaction ledger data.
  • P2P peer-to-peer
  • An example of the additional payload requirements are data fields that allow the peer to peer communications to be established. This includes fields that identify the session identification (SID). This field is required and becomes linked to the“b” leg username (see, for example Figure 4). This is used to not only identify the current session but allows the user 102 to see the complete conversation history between the parties.
  • SID session identification
  • Obfuscation of the IP and NAT transversal info is accomplished by using a hashing algorithm that increments. Incrementation of the algorithm (shown schematically in Figure 7) is achieved through two identifier fields. The first is the version identification (VID) which tells the other users what version of the application is being used. The second is the incrementation identification (IID) which alerts the other legs of the communication to which hashing algorithm to use. Hashing algorithms may be updated with each new release of software, as may be appreciated by one skilled in the art. In some embodiments, interactions between users of versions of software that are more than a defined number of releases apart from each other (e.g., two, in some embodiments; but, this separation value may differ in other embodiments) will generate an error. This is done to ensure users have the latest application software and can enjoy the benefits thereof.
  • a hashed download link is also included for embodiments aimed at serving needs of users in geographic locations that might not have access to traditional application stores. This link may constantly change to ensure access for marginalized and/or technologically remote populations. This link will be hashed using the same technique of VID and IID data to further confuse any attempt by third parties (e.g., authorities, hackers) to leam the link destination(s). Additionally, addresses of validating nodes will be hashed in the same way; that is, using the VID and IID.
  • the systems and methods 100 disclosed herein employ user identity management in blockchain services via implemented identity-based end-to-end security which extends from the blockchain client to the blockchain fabric.
  • This approach allows for identity-based network segmentation and traffic separation, which enables multiple users to securely share the same blockchain infrastructure, reduces the risk of DDoS attacks, and enables automated regulatory compliance audits.
  • SKTAC Skrumble Network Transport Access Control
  • SKTAC features include permission control and confidentiality, un-linkable identity privacy for blockchain participants, a modular and easily auditable consensus protocol, and provision for improved scalability.
  • SKTAC features include at least some of the following:
  • SKTAC also provides for identity-based network segmentation and traffic separation, which reduces the risk of cyber-attacks.
  • First Packet Authentication described previously serves to separate internal traffic between peers and validating node functions used in the disclosed systems and methods. Audit trails for all authorized and unauthorized connection attempts to the blockchain are maintained and can be easily audited using software to parse the log contents.
  • an encryption scheme for encoding all aspects of a communication. This includes, for example, voice, video and even the files that might be exchanged and stored.
  • the encryption scheme is derived from the data that is traded anonymously via the blockchain. This ensures the highest level of encryption, privacy and user ownership of the data.
  • Disclosed embodiments may employ, for example, Secure Real-time Transport Protocol (SKRTP), a profile of the Real-time Transport Protocol (RTP), which provides confidentiality, message
  • SKRTP Secure Real-time Transport Protocol
  • RTP Real-time Transport Protocol
  • SKRTP provides a framework for encryption and message authentication of RTP and RTCP streams.
  • SKRTP defines a set of cryptographic transforms, and it allows new transforms to be introduced in the future. With appropriate key management, SKRTP is secure for unicast and multicast RTP applications.
  • SKRTP can achieve high throughput and low packet expansion.
  • SKRTP proves to be a suitable protection for heterogeneous environments (mix of wired and wireless networks).
  • default transforms are described, based on an additive stream cipher for encryption, a keyed-hash based function for message authentication, and an“implicit” index for sequencing/synchronization based on the RTP sequence number for SKRTP and an index number for Secure RTCP (SRTCP).
  • Some security goals of SKRTP are to ensure: (i) confidentiality of the RTP and RTCP payloads; and (ii) integrity of the entire RTP and RTCP packets, together with protection against replayed packets.
  • These security services may, in some embodiments, be optional and independent from each other, except that SRTCP integrity protection is mandatory (malicious or erroneous alteration of RTCP messages could otherwise disrupt the processing of the RTP stream).
  • a low computational cost b.
  • a small footprint i.e., small code size and data memory for keying information and replay lists
  • SKRTP is a suitable protection scheme for RTP/RTCP in both wired and wireless scenarios.
  • SKRTP provides for some additional features that have been introduced to lighten the burden on key management and to further increase security. These features may include:
  • a single“master key” can provide keying material for confidentiality and integrity
  • the key derivation can be configured to periodically refresh the session keys, which limits the amount of ciphertext produced by a fixed key, available for an adversary to crypto -analyze.
  • the encryption defined in the SKRTP map the SKRTP packet index and secret key into a pseudo random keystream segment.
  • Each keystream segment encrypts a single RTP packet.
  • the process of encrypting a packet consists of generating the keystream segment corresponding to the packet, and then bit-wise exclusive that keystream segment onto the payload of the RTP packet to produce the
  • Encrypted Portion of the SKRTP packet In case the payload size is not an integer multiple of n_b bits, the excess (least significant) bits of the keystream are simply discarded. Decryption may be done substantially the same way, except with swapping the roles of the plaintext and ciphertext.
  • the initial octets of each keystream segment may be reserved for use in a message authentication code, in which case the keystream used for encryption starts immediately after the last reserved octet.
  • the initial reserved octets are called the“keystream prefix”, and the remaining octets are called the “keystream suffix”.
  • the number of octets in the keystream prefix is denoted as
  • SKRTP PREFIX LENGTH The keystream prefix is indicated by a positive, non-zero value of SKRTP PREFIX LENGTH. This means that, even if confidentiality is not to be provided, the keystream generator output may still need to be computed for packet authentication, in which case the default keystream generator (mode) shall be used.
  • the cipher is the Advanced Encryption Standard (AES), Segmented Integer Counter Mode AES.
  • AES Advanced Encryption Standard
  • AES consists of encrypting successive integers. The actual definition is somewhat more complicated, to randomize the starting point of the integer sequence.
  • Each packet is encrypted with a distinct keystream segment, which may be computed as provided in the following example:
  • the 128 -bit integer value IV is defined by the SSRC, the SKRTP packet index i, and the SKRTP session salting key k_s, as below:
  • the inclusion of the SSRC allows the use of the same key to protect distinct SKRTP streams within the same RTP session.
  • the SSRC of the first header of the compound packet MUST be used, i SHALL be the 31 -bit SRTCP index and k_e, k_s is replaced by the SRTCP encryption session key and salt.
  • the initial value, IV is fixed for each packet and is formed by“reserving” 16 zeroes in the least significant bits for the purpose of the counter.
  • the number of blocks of keystream generated for any fixed value of IV must not exceed 2 L 16 to avoid keystream re-use, see below.
  • the AES has a block size of 128 bits, so 2 L 16 output blocks are sufficient to generate the 2 L 23 bits of keystream needed to encrypt the largest possible RTP packet. This restriction on the maximum bit-size of the packet that can be encrypted ensures the security of the encryption method by limiting the effectiveness of probabilistic attacks.
  • Key derivation reduces the burden on the key establishment. As many as six different keys may be needed per crypto context (e.g., SKRTP and SRTCP encryption keys and salts, SKRTP and SRTCP
  • the disclosed systems will in some embodiments comprise a blockchain enabled technological ecosystem enabling a decentralized and substantially anonymous communication ecosystem. These systems will utilize real-time communication protocols over peer-to-peer connections using web browsing and other software applications.
  • Security protocols will be delivered through a novel key derivative algorithm using the blockchain technology disclosed herein.
  • users Upon joining the network, users will be asked to enter the public key to the wallet where they hold their network tokens. Additionally, they will be asked to enter a secure passcode and a pseudonym (i.e., private user name).
  • a derivative of these elements will be used to generate their unique private network user ID and a Public ID.
  • a QR code and link will be generated for facilitated sharing of the users’ Public ID.
  • User conversations will be encrypted using a derivative of the private network user ID keys from each participant as the seed key for the encryption.
  • the derivative algorithm will randomly select from the associated Network keys in the session based on the participants involved, such that no two keys will be the same. This ensures an added layer of security as no two conversations will use the same key which makes Network conversations virtually impossible to decrypt using pattern-based
  • the network blockchain When a communication is established between users, the network blockchain will replace the handshake protocol that happens on a traditional communication network.
  • Session Description Protocol (SDP) messages will use the blockchain to establish each session, acting as the handshake and signal for communication to commence, and Real-Time Transport Protocol (RTP) stream for the media (voice, video, message, etc.) to begin transmission.
  • SDP Session Description Protocol
  • RTP Real-Time Transport Protocol
  • IP addresses of the users are revealed only to each other and a secure web socket connection will be established to open an interactive communication session between the users’ devices to exchange real-time session data for messages, file transfers and notifications. This allows for data to be instantly distributed resulting in a low-latency connection.
  • Communications on the network will be P2P and will have the ability to access an ad-hoc high capacity rich communication bridge for voice and video conferencing for larger number of participants.
  • Embodiments of the technology disclosed herein may be built to operate on any modem browser, in addition to functioning as a standalone application for most mobile and tablet devices (e.g., iOSTM and AndroidTM operating systems) and computers (e.g., MacTM and PC systems).
  • the standalone application versions may offer additional functionality over the browser-based version(s).
  • the blockchain may be utilized in several aspects of embodiments of the disclosed application, including to:
  • PBFT Practical Byzantine Fault Tolerance
  • these protocols will incorporate sharding technology to, for example, separate very large databases into smaller, faster, more easily managed parts.
  • data When data is needed, instead of one record loading at a time, data will load as one layered database by pulling up information in pieces from each shard.
  • the disclosed systems and methods will provide decentralized file storage by utilizing an algorithm that uses unique session identification and randomized key data per user to ensure file information is encrypted. With this algorithm, there can be ensured the direct file transfer between users and only users who have participated in the conversations will be permitted access.
  • Suitable methods of hybrid storage strategy may include, for example and without limitation, those disclosed in Applicant’s U.S. Patent Applications, the contents of which are herein incorporated by reference.
  • files may be encrypted using an algorithm that derived from the unique session ID and its seed key. Once encrypted, the individual files will be sliced into several pieces, distributed and stored on disparate servers. These files can only be re-assembled with the appropriate key. Therefore, if any file server is to be compromised, the data obtained will be unintelligible, further providing secure data storage for all users.
  • features such as the length of time to store and file sizes allowed will be determined by the usage level that the user has unlocked based upon the number of tokens in their wallet.
  • anonymous ad-hoc sessions may be established through dedicated bridges that may be situated in key strategic area globally and authenticated via the unique session ID and the derived key.
  • the disclosed systems and methods may use, for example, a scheme of IP tunneling to an address, changing randomly selected from a very large pool, that is only revealed during the secure socket connection made between users once they are connected. Per the protocol for connecting to the bridge, users will verify connectivity. Should connectivity not be reached, the user may increment to the next agreed-upon address.
  • These protocols may allow for larger scale voice and video conferencing, messaging, screen sharing, file transfers and notifications. To unlock features such as the ability to add a greater number of participants or the length of time allowed may be determined by what usage level the user has unlocked based upon the number of tokens in their wallet or by other comparative means.
  • the systems and methods disclosed herein may, in some embodiments, provide the option for group & peer-to-peer messages to be saved and stored.
  • Conversation records may be stored using file servers in the cloud. Only users with the unique conversation key who participated in the original conversation will be permitted to access the saved information.
  • the administrator of that conversation When a group message is created, the administrator of that conversation will be given the option to save the records. Select functionality will be unlocked based, for example, on certain token ownership amounts.
  • participants attempt to enter the conversation, they will first be notified that the administrator has selected to save the conversation. Participants can opt not to partake.
  • participating in a conversation with two participants there will be two-party consent requirement. Each participant will need to agree to save the conversation for records to be saved and stored.
  • additional functionalities such as, for example, a unique algorithm and implementation thereof that creates encryption keys based on participants in a discussion, and other factors, to differentiate every conversation.
  • users With the intention of connecting anyone, anywhere in the world, users will be able to easily create large community groups.
  • users To maintain an anonymous protocol, users will preferably operate through pseudonymous identification.
  • the disclosed systems may also provide for users to receive notifications when other users have taken screenshots or otherwise sought to record or copy communications such as, for example, a screen share or video. Users have access to live video groups and encrypted, decentralized file and data transfer.
  • the disclosed systems may preferably work and be provided with open source SDKs to encourage third party developers to build new blockchain technologies and applications to interface with the disclosed systems.
  • advantages of the decentralized, secure and anonymous communication platform include, for example, the following: (a) disclosed systems cannot be blocked by conventional firewalls; (ii) disclosed systems has user-controlled record storage, and once deleted, data will not be stored on any server; and, (iii) superior encryption of every conversation, message and file. There will be no central point to block using a firewall because every user and every conversation is distinctive. This ensures complete anonymity, and unlimited access to the disclosed systems from substantially anywhere in the world. Only jurisdictions where all outside Internet access is blocked will access be limited.
  • SKM is a utility token that may offer a certain class of membership based on the number of tokens owned. These membership privileges may enable access to various features and actions on the systems disclosed herein. Initial usage may be free, and the token may, in some embodiments, serve as means of access to unlock premium features, membership levels or utilize various extra functionalities. Non limiting examples are listed below.
  • Example Use Cases for SKM Utility Token User A in Canada wants to begin a video call with User B in Thailand. Enabling video could be a premium feature. User A and User B would need to possess the set number of SKM utility tokens to perform the requested video call.
  • User A in France wants to send a file to User B in Brazil.
  • the file exceeds the initial allowed file size requirements.
  • User A must possess a certain token amount to send a larger size file than their current access permits.
  • User A in Colombia who wants to select to save a conversation they are about to have with User B in Australia.
  • User Controlled Record Storage could be a premium feature.
  • User B has confirmed they will participate in a saved
  • User A does not want User B to share the file with anyone. User A possesses a certain amount of token and will receive a notification if the file is
  • User A in Finland wants to send a file to User B in Scotland using a gated access key so only User B can access the file.
  • User A owns a certain amount of tokens, User B is sent the file in pieces and only the access key given to User B from User A can unlock the file.
  • users may receive surprise or expected token rewards based on specific criteria. For example, a member who has initialized a certain amount of conversations may receive an extra amount of tokens. There may also be random airdropped rewards for groups to promote community contributors. Further, users helping mine, authenticate and promote the network community may also have opportunities to receive rewards.
  • the disclosed systems and methods may be augmented or otherwise altered to incorporate or, in whole or in part, facilitate the function of freelance marketplace (s) and/or virtual showroom(s) with a view to achieving, for example, a self-sustainable ecosystem.
  • the disclosed systems and methods may also be susceptible of publishing implementations thereof and application program interfaces (APIs) with open access to facilitate creation of add-on products under proscribed terms.
  • APIs application program interfaces
  • the SKM token may be utilized by users across the many different applications within the disclosed ecosystem and those applications built separately on top. These various applications may also be incentivized for offerings through SKM tokens. Therefore, the ecosystem may grow and become sustainable through an innovative platform development, cost and reward system.
  • Systems and methods disclosed herein also provide users with a space to share their own data and send encrypted, secure files.
  • Users may send files using a gated access key, which means files are sent in pieces from one user to another.
  • the user receiving the file will be given a secret access code to unlock the gated content and bring the file back into one piece.
  • Users may also place notifications on the files they send. This is to ensure that if a file the sender does not want downloaded or transferred to another conversation is in fact downloaded or transferred, the necessary user(s) will receive an alert substantially immediately.
  • the SKM tokens will be consumed by all the users across different applications via the Skrumble Network.
  • the various applications will also be incentivized through their offerings through SKM tokens. Therefore, the ecosystem will become sustainable through innovative platform development, cost and reward system.
  • Systems and methods disclosed herein may also further comprise:
  • Networks disclosed herein may include an in conversation end- to-end encrypted payment system. Be it through peer-to-peer money transfers within a conversation, e-commerce payments without leaving the page or simply communication methods like private messages, call and files.
  • Disclosed Networks may include support for a freelance marketplace powered by smart contracts. Interested parties can easily select a freelancer, set the jobs parameters, and the freelancer will be paid accordingly when the requirements of the contract are fulfilled.
  • Smart contracts are vital for conducting transactions and business remotely.
  • the disclosed Networks may also include functionality for users to fill out and sign off on during their conversations and communication transactions. Be it agreeing to terms of service for lawyers and clients, documenting project expectations for remote workers, hiring a freelancer from the above-mentioned freelancer marketplace, or any type of transaction that requires the approval of interested parties.
  • terms would get set, the smart contract in signed in-conversation and when the partnership is fulfilled, each party receives what was promised in contract.
  • the disclosed Networks can provide functionality to include simple P2P or group interaction points. These points of contact may be to provide users a platform to broadcast live video, share talents and receive in-conversation payments for their content.
  • components of the systems disclosed herein may in some embodiments comprise those detailed in Table 1, immediately below:
  • the steps in the exemplary method shown in Figures 1A and 1B represent a defined sequence of events; however, ancillary functions may, in some embodiments, change order. Depending on the particulars of such changes, embodiments exhibiting some but not all listed functions may be provided.
  • the many components of the systems disclosed herein are adaptable and extensible.
  • the storage component be used in a stand-alone fashion.
  • the technology disclosed herein allows for augmented functionality through the use of Virtual and Augmented Reality devices. Additionally, a subset of this technology can be used for devices that require secure communications in the Internet of Things space where a high degree of encryption is needed such as, for example, real-time video from police, military or other security cameras.
  • the words“comprising” (and any form of comprising, such as “comprise” and“comprises”),“having” (and any form of having, such as“have” and“has”),“including” (and any form of including, such as“includes” and“include”) or“containing” (and any form of containing, such as“contains” and“contain”) are inclusive or open-ended and do not exclude additional, un-recited elements or method steps.
  • Methods herein described are exemplary, and performance is intended by software (e.g., stored in memory and/or executed on hardware), hardware, or a combination thereof.
  • Hardware modules may include, for example, a general-purpose processor, and/or analogous equipment.
  • Software modules (executed on hardware) may be expressed in a variety of coded software languages comprising object-oriented, procedural, or other programming language and development tools.
  • Non-transitory computer-readable medium also can be referred to as a non-transitory processor-readable medium or memory
  • the computer-readable medium is non- transitory in the sense that it does not include transitory propagating signals per se (e.g., a propagating electromagnetic wave carrying information on a transmission medium such as space or a cable).
  • the media and computer code also can be referred to as code
  • Examples of non -transitory computer-readable media include, but are not limited to storage media and hardware devices that are specially configured to store and execute program code.

Landscapes

  • Engineering & Computer Science (AREA)
  • Computer Networks & Wireless Communication (AREA)
  • Signal Processing (AREA)
  • Computer Security & Cryptography (AREA)
  • Databases & Information Systems (AREA)
  • General Engineering & Computer Science (AREA)
  • Theoretical Computer Science (AREA)
  • Computing Systems (AREA)
  • Data Mining & Analysis (AREA)
  • Physics & Mathematics (AREA)
  • General Physics & Mathematics (AREA)
  • Multimedia (AREA)
  • Data Exchanges In Wide-Area Networks (AREA)

Abstract

La présente invention concerne des procédés et des systèmes d'établissement de communications en temps réel et de chaîne de blocs de réseaux sociaux P2P, comprenant les étapes consistant à déterminer si une demande de transaction a été envoyée, charger un paquet de données de chaîne de blocs, à initier un processus de minage, déterminer si un consensus a été obtenu parmi une pluralité d'utilisateurs, envoyer un message d'erreur à l'initiateur s'il n'y a pas de consensus, ou envoyer une notification de message entrant à un utilisateur prévu parmi les utilisateurs s'il existe un consensus, déterminer la disponibilité du destinataire prévu, et envoyer à l'initiateur une notification d'indisponibilité si le destinataire prévu n'est pas disponible ou générer une clé de cryptage et initier un processus de connexion P2P si le destinataire prévu est disponible.
PCT/CA2019/050750 2018-05-30 2019-05-30 Systèmes et procédés pour établir des communications par le biais d'une chaîne de blocs WO2019227225A1 (fr)

Applications Claiming Priority (2)

Application Number Priority Date Filing Date Title
US201862678186P 2018-05-30 2018-05-30
US62/678,186 2018-05-30

Publications (1)

Publication Number Publication Date
WO2019227225A1 true WO2019227225A1 (fr) 2019-12-05

Family

ID=68696563

Family Applications (1)

Application Number Title Priority Date Filing Date
PCT/CA2019/050750 WO2019227225A1 (fr) 2018-05-30 2019-05-30 Systèmes et procédés pour établir des communications par le biais d'une chaîne de blocs

Country Status (1)

Country Link
WO (1) WO2019227225A1 (fr)

Cited By (13)

* Cited by examiner, † Cited by third party
Publication number Priority date Publication date Assignee Title
CN112084529A (zh) * 2020-09-09 2020-12-15 清华大学 用于社区的基于区块链技术隐私数据加密访问方法和系统
US11050798B2 (en) * 2019-05-31 2021-06-29 Mitel Networks Corporation Methods for establishing peer-to-peer communications using distributed call ledgers
CN113542231A (zh) * 2021-06-23 2021-10-22 深圳市华海同创科技有限公司 通信方法、电子设备及存储介质
CN114298699A (zh) * 2021-12-28 2022-04-08 北京有竹居网络技术有限公司 非同质化代币的生成方法、获取方法及装置
WO2022105498A1 (fr) * 2020-11-23 2022-05-27 腾讯科技(深圳)有限公司 Procédé et appareil de traitement de données basés sur un réseau de chaînes de blocs, dispositif informatique et support de stockage lisible par ordinateur
CN114666341A (zh) * 2022-03-15 2022-06-24 数界(深圳)科技有限公司 一种去中心化sdp控制器实现方法及计算机存储介质
WO2023023173A1 (fr) * 2021-08-18 2023-02-23 Fortifid, Inc. Fourniture d'un accès à des renseignements chiffrés à l'aide d'enregistrements de renseignements anonymes
WO2023078122A1 (fr) * 2021-11-08 2023-05-11 华为技术有限公司 Procédé et dispositif de communication
CN116260656A (zh) * 2023-05-09 2023-06-13 卓望数码技术(深圳)有限公司 基于区块链的零信任网络中主体可信认证方法和系统
IT202200006878A1 (it) * 2022-04-06 2023-10-06 Francesco Bocchini Sistema e metodo di registrazione e autenticazione di prodotti
US20240037593A1 (en) * 2022-07-29 2024-02-01 Paypal, Inc. On-chain loyalty program management
CN117955737A (zh) * 2024-03-26 2024-04-30 长春汽车工业高等专科学校 车联网数据隐私保护与加密传输方法及系统
US12015702B2 (en) 2021-06-16 2024-06-18 Cisco Technology, Inc. Key sharing for media frames using blockchain

Citations (14)

* Cited by examiner, † Cited by third party
Publication number Priority date Publication date Assignee Title
CA2992458A1 (fr) * 2015-07-14 2017-01-19 Fmr Llc Appareils, procedes et systemes de traitement de transfert, de verification et de recherche informatiquement efficaces
US20170132615A1 (en) * 2015-11-11 2017-05-11 Bank Of America Corporation Block chain alias for person-to-person payments
WO2017145003A1 (fr) * 2016-02-23 2017-08-31 nChain Holdings Limited Échange basé sur une chaîne de blocs avec une segmentation en unités
US20180109541A1 (en) * 2016-10-17 2018-04-19 Arm Ltd. Blockchain mining using trusted nodes
CN108200174A (zh) * 2018-01-04 2018-06-22 成都理工大学 基于区块链分布式的手机保护平台及其实现方法
US20180205725A1 (en) * 2017-01-18 2018-07-19 CertiflD LLC Verifying Party Identities for Secure Transactions
CN108390891A (zh) * 2018-03-28 2018-08-10 电子科技大学天府协同创新中心 基于私有区块链的信息保护方法
WO2018154489A1 (fr) * 2017-02-23 2018-08-30 Scenarex Inc. Procédé et système permettant de fournir une distribution limitée d'un fichier multimédia numérique
CN108923932A (zh) * 2018-07-10 2018-11-30 东北大学 一种去中心化协同验证模型及验证算法
CN109194570A (zh) * 2018-09-25 2019-01-11 武汉配行天下科技有限公司 一种基于区块链的信息签收及存证方法
CN109542863A (zh) * 2018-11-23 2019-03-29 杭州深想科技有限公司 人工智能存储挖矿机系统
US20190140844A1 (en) * 2017-11-08 2019-05-09 Averon Us, Inc. Identity-linked authentication through a user certificate system
US20190163887A1 (en) * 2017-11-30 2019-05-30 Bank Of America Corporation Multicomputer processing for data authentication using a blockchain approach
WO2019119278A1 (fr) * 2017-12-19 2019-06-27 深圳前海达闼云端智能科技有限公司 Appareil et procédé d'acquisition d'un nœud de confiance, et support d'informations et nœud de chaîne de blocs

Patent Citations (14)

* Cited by examiner, † Cited by third party
Publication number Priority date Publication date Assignee Title
CA2992458A1 (fr) * 2015-07-14 2017-01-19 Fmr Llc Appareils, procedes et systemes de traitement de transfert, de verification et de recherche informatiquement efficaces
US20170132615A1 (en) * 2015-11-11 2017-05-11 Bank Of America Corporation Block chain alias for person-to-person payments
WO2017145003A1 (fr) * 2016-02-23 2017-08-31 nChain Holdings Limited Échange basé sur une chaîne de blocs avec une segmentation en unités
US20180109541A1 (en) * 2016-10-17 2018-04-19 Arm Ltd. Blockchain mining using trusted nodes
US20180205725A1 (en) * 2017-01-18 2018-07-19 CertiflD LLC Verifying Party Identities for Secure Transactions
WO2018154489A1 (fr) * 2017-02-23 2018-08-30 Scenarex Inc. Procédé et système permettant de fournir une distribution limitée d'un fichier multimédia numérique
US20190140844A1 (en) * 2017-11-08 2019-05-09 Averon Us, Inc. Identity-linked authentication through a user certificate system
US20190163887A1 (en) * 2017-11-30 2019-05-30 Bank Of America Corporation Multicomputer processing for data authentication using a blockchain approach
WO2019119278A1 (fr) * 2017-12-19 2019-06-27 深圳前海达闼云端智能科技有限公司 Appareil et procédé d'acquisition d'un nœud de confiance, et support d'informations et nœud de chaîne de blocs
CN108200174A (zh) * 2018-01-04 2018-06-22 成都理工大学 基于区块链分布式的手机保护平台及其实现方法
CN108390891A (zh) * 2018-03-28 2018-08-10 电子科技大学天府协同创新中心 基于私有区块链的信息保护方法
CN108923932A (zh) * 2018-07-10 2018-11-30 东北大学 一种去中心化协同验证模型及验证算法
CN109194570A (zh) * 2018-09-25 2019-01-11 武汉配行天下科技有限公司 一种基于区块链的信息签收及存证方法
CN109542863A (zh) * 2018-11-23 2019-03-29 杭州深想科技有限公司 人工智能存储挖矿机系统

Cited By (17)

* Cited by examiner, † Cited by third party
Publication number Priority date Publication date Assignee Title
US11050798B2 (en) * 2019-05-31 2021-06-29 Mitel Networks Corporation Methods for establishing peer-to-peer communications using distributed call ledgers
CN112084529A (zh) * 2020-09-09 2020-12-15 清华大学 用于社区的基于区块链技术隐私数据加密访问方法和系统
WO2022105498A1 (fr) * 2020-11-23 2022-05-27 腾讯科技(深圳)有限公司 Procédé et appareil de traitement de données basés sur un réseau de chaînes de blocs, dispositif informatique et support de stockage lisible par ordinateur
US12015702B2 (en) 2021-06-16 2024-06-18 Cisco Technology, Inc. Key sharing for media frames using blockchain
CN113542231A (zh) * 2021-06-23 2021-10-22 深圳市华海同创科技有限公司 通信方法、电子设备及存储介质
WO2023023173A1 (fr) * 2021-08-18 2023-02-23 Fortifid, Inc. Fourniture d'un accès à des renseignements chiffrés à l'aide d'enregistrements de renseignements anonymes
WO2023078122A1 (fr) * 2021-11-08 2023-05-11 华为技术有限公司 Procédé et dispositif de communication
CN114298699A (zh) * 2021-12-28 2022-04-08 北京有竹居网络技术有限公司 非同质化代币的生成方法、获取方法及装置
CN114298699B (zh) * 2021-12-28 2024-05-07 北京有竹居网络技术有限公司 非同质化通证的生成方法、获取方法及装置
CN114666341A (zh) * 2022-03-15 2022-06-24 数界(深圳)科技有限公司 一种去中心化sdp控制器实现方法及计算机存储介质
IT202200006878A1 (it) * 2022-04-06 2023-10-06 Francesco Bocchini Sistema e metodo di registrazione e autenticazione di prodotti
US11893598B1 (en) * 2022-07-29 2024-02-06 Paypal, Inc. On-chain loyalty program management
US20240037593A1 (en) * 2022-07-29 2024-02-01 Paypal, Inc. On-chain loyalty program management
CN116260656B (zh) * 2023-05-09 2023-07-14 卓望数码技术(深圳)有限公司 基于区块链的零信任网络中主体可信认证方法和系统
CN116260656A (zh) * 2023-05-09 2023-06-13 卓望数码技术(深圳)有限公司 基于区块链的零信任网络中主体可信认证方法和系统
CN117955737A (zh) * 2024-03-26 2024-04-30 长春汽车工业高等专科学校 车联网数据隐私保护与加密传输方法及系统
CN117955737B (zh) * 2024-03-26 2024-06-07 长春汽车工业高等专科学校 车联网数据隐私保护与加密传输方法及系统

Similar Documents

Publication Publication Date Title
WO2019227225A1 (fr) Systèmes et procédés pour établir des communications par le biais d'une chaîne de blocs
US9137223B2 (en) Apparatus and method for transmitting data, and recording medium storing program for executing method of the same in computer
US20170033925A1 (en) Methods and apparatus for implementing a communications system secured using one-time pads
Choi et al. Digital forensic analysis of encrypted database files in instant messaging applications on Windows operating systems: Case study with KakaoTalk, NateOn and QQ messenger
EP3205048B1 (fr) Génération d'une clé de cryptage symétrique
CN114448730B (zh) 基于区块链网络的报文转发方法及装置、交易处理方法
US12063213B2 (en) Secure peer-to-peer based communication sessions via network operating system in secure data network
CN111342955B (zh) 一种通信方法及其设备、计算机存储介质
CN111431713A (zh) 一种私钥存储方法、装置和相关设备
Aggarwal et al. Security aspect in instant mobile messaging applications
US20240185191A1 (en) Web3 Decentralized Blockchain Based NFT Framework... Applications
SE1451213A1 (en) Improved system for establishing a secure communication channel
SE1451211A1 (en) Mutual authentication
Liao Design of the secure smart home system based on the blockchain and cloud service
WO2020058577A1 (fr) Contrôle de contenus multimédia
Dimitriadis et al. Uncuffed: A Blockchain-based Secure Messaging System
Maleckas et al. Practically-exploitable Vulnerabilities in the Jitsi Video Conferencing System
Mallick et al. Security aspects of social media applications
Will et al. Anonymous data sharing between organisations with elliptic curve cryptography
Zeydan et al. Enhanced security with quantum key distribution and blockchain for digital identities
Do et al. Privacy-preserving social network for an untrusted server
US20240356916A1 (en) Secure peer-to-peer based communication sessions via network operating system in secure data network
Jin et al. BNRDT: when data transmission meets blockchain
Truong et al. On Using Cryptographic Technologies in Privacy Protection of Online Conferencing Systems
US20240097903A1 (en) Ipcon mcdata session establishment method

Legal Events

Date Code Title Description
121 Ep: the epo has been informed by wipo that ep was designated in this application

Ref document number: 19810985

Country of ref document: EP

Kind code of ref document: A1

NENP Non-entry into the national phase

Ref country code: DE

122 Ep: pct application non-entry in european phase

Ref document number: 19810985

Country of ref document: EP

Kind code of ref document: A1

32PN Ep: public notification in the ep bulletin as address of the adressee cannot be established

Free format text: NOTING OF LOSS OF RIGHTS PURSUANT TO RULE 112(1) EPC (EPO FORM 1205 DATED 08/07/2021)

122 Ep: pct application non-entry in european phase

Ref document number: 19810985

Country of ref document: EP

Kind code of ref document: A1