CUBE Security Inc. (20240275591). ACCESS CONTROL INTERFACES FOR BLOCKCHAINS simplified abstract

From WikiPatents
Jump to navigation Jump to search

ACCESS CONTROL INTERFACES FOR BLOCKCHAINS

Organization Name

CUBE Security Inc.

Inventor(s)

Attila Marosi-bauer of Üröm (HU)

Einaras Von Gravrock of Hermosa Beach CA (US)

Sean Tiernan of Arroyo Grande CA (US)

Jonas Lekevicius of Vilnius (LT)

ACCESS CONTROL INTERFACES FOR BLOCKCHAINS - A simplified explanation of the abstract

This abstract first appeared for US patent application 20240275591 titled 'ACCESS CONTROL INTERFACES FOR BLOCKCHAINS

The abstract describes a system where an access control server stores a private cryptographic key corresponding to a public cryptographic key stored on a blockchain. The server receives access control settings related to an autonomous program protocol and can review and approve requests for accessing the protocol on the blockchain.

  • The access control server stores a private cryptographic key.
  • The private key corresponds to a public cryptographic key stored on a blockchain.
  • Access control settings related to an autonomous program protocol can be received by the server.
  • The server can review and approve requests for accessing the protocol on the blockchain.
  • A digital signature is created using the private key for approved requests.
  • Successful verification of the digital signature using the public key on the blockchain is required for the protocol to process the request.

Potential Applications: - Secure access control for autonomous program protocols - Enhanced security for blockchain-based systems - Streamlined authorization processes for digital transactions

Problems Solved: - Ensuring secure access to autonomous program protocols - Preventing unauthorized access to blockchain-stored data - Simplifying authentication and authorization procedures

Benefits: - Improved security for sensitive data - Efficient and reliable access control mechanisms - Enhanced trust in blockchain-based systems

Commercial Applications: Title: "Blockchain Access Control System for Secure Protocol Authorization" This technology could be utilized in industries such as finance, healthcare, and supply chain management to ensure secure access to critical data and processes. It could also be integrated into IoT devices to enhance security in connected systems.

Prior Art: Researchers can explore existing patents related to blockchain security, cryptographic key management, and access control systems to understand the evolution of this technology.

Frequently Updated Research: Stay informed about advancements in blockchain security, cryptographic protocols, and access control mechanisms to enhance the efficiency and effectiveness of this technology.

Questions about Blockchain Access Control Systems: 1. How does this technology improve security in blockchain-based systems? - This technology enhances security by providing a secure access control mechanism for autonomous program protocols stored on the blockchain. 2. What are the potential implications of this technology in industries like finance and healthcare? - This technology could revolutionize data security and access control in industries where sensitive information is crucial.


Original Abstract Submitted

an access control server may store a private cryptographic key. the private cryptographic key corresponds to a public cryptographic key. the public cryptographic key is stored on a blockchain as part of an autonomous program protocol. the access control server may receive access control setting related to the autonomous program protocol. the access control server may receive a request for accessing the autonomous program protocol stored on the blockchain. the access control server may review the request. the access control server may determine the request is in compliance with the policies specified in the setting. the access control server may create, using the private cryptographic key, a digital signature for the request and generate a response including the digital signature. a successful verification of the digital signature using the public cryptographic key stored in the autonomous program protocol is required by the autonomous program protocol to process the request.