The patent badge is an abbreviated version of the USPTO patent document. The patent badge does contain a link to the full patent document.

The patent badge is an abbreviated version of the USPTO patent document. The patent badge covers the following: Patent number, Date patent was issued, Date patent was filed, Title of the patent, Applicant, Inventor, Assignee, Attorney firm, Primary examiner, Assistant examiner, CPCs, and Abstract. The patent badge does contain a link to the full patent document (in Adobe Acrobat format, aka pdf). To download or print any patent click here.

Date of Patent:
Apr. 05, 2022

Filed:

Jan. 18, 2019
Applicant:

Red Hat, Inc., Raleigh, NC (US);

Inventors:

Michael H. M. Bursell, Farnborough, GB;

Axel Simon, Paris, FR;

Nathaniel McCallum, Raleigh, NC (US);

Assignee:

Red Hat, Inc., Raleigh, NC (US);

Attorney:
Primary Examiner:
Int. Cl.
CPC ...
H04L 9/08 (2006.01); G06F 21/60 (2013.01); H04L 29/06 (2006.01); G09C 1/00 (2006.01); G06F 16/182 (2019.01);
U.S. Cl.
CPC ...
G06F 21/602 (2013.01); G06F 16/182 (2019.01); G06F 21/604 (2013.01); G09C 1/00 (2013.01); H04L 9/085 (2013.01); H04L 9/0861 (2013.01); H04L 63/0428 (2013.01); H04L 63/166 (2013.01); H04L 2463/062 (2013.01);
Abstract

Providing smart contracts including secrets encrypted with oracle-provided encryption keys using thresholding cryptosystems is disclosed. In one example, a contract creator encrypts sensitive data necessary for executing a smart contract into ciphertext with multiple symmetric cryptographic keys using a threshold cryptosystem, such that a subset of at least size R of the symmetric cryptographic keys are required to decrypt the ciphertext. The symmetric cryptographic keys are encrypted into wrappers using a public cryptographic key of a contract executor. Envelopes are generated using public cryptographic keys of corresponding contract oracles, where the envelopes include the wrappers encrypted using the public cryptographic keys, and policies that specify condition(s) precedent and are authenticated using the public cryptographic keys. The smart contract, including the envelopes, the ciphertext, and R, is then deployed to the contract executor. In this manner, the sensitive data is protected from unauthorized access within the smart contract.


Find Patent Forward Citations

Loading…