Abstract: Automatic rotation of materials such as cryptographic materials prevents downtime in computer systems through a method in which the business logic of a DLN, such as a smart contract, receives a request from a given machine to access a resource such as a stream of chained identifiers. The logic checks the stream for a status marker that says the materials need rotation. If so, the business logic replies that rotation is required. When the marker is not there, the logic retrieves the expiry information on the cryptographic material and calculates how long until expiration. If the remaining validity is not enough, the business logic forces a rotation of the cryptographic material by storing the status marker in the stream and notifying the machine. The machine responds by working with the business logic to do the rotation.
Type:
Grant
Filed:
July 5, 2022
Date of Patent:
November 12, 2024
Assignee:
Corsha Inc.
Inventors:
Anusha R. Iyer, David Mazary, Russell Bodine, Christopher Simkins
Abstract: Automatic rotation of materials such as cryptographic materials prevents downtime in computer systems through a method in which the business logic of a DLN, such as a smart contract, receives a request from a given machine to access a resource such as a stream of chained identifiers. The logic checks the stream for a status marker that says the materials need rotation. If so, the business logic replies that rotation is required. When the marker is not there, the logic retrieves the expiry information on the cryptographic material and calculates how long until expiration. If the remaining validity is not enough, the business logic forces a rotation of the cryptographic material by storing the status marker in the stream and notifying the machine. The machine responds by working with the business logic to do the rotation.
Type:
Application
Filed:
July 5, 2022
Publication date:
January 5, 2023
Applicant:
Corsha Inc.
Inventors:
Anusha R. IYER, David Mazary, Russell Bodine, Christopher Simkins
Abstract: A system for providing dynamic, multi-factor authentication for machine-to-machine connections using unique authentication streams of chained, cryptographic blocks or codes by generating and managing a root authentication stream of chained cryptographic blocks representing an enterprise. The root authentication stream may be utilized by deployed machine instances to instantiate the unique authentication streams for each of the deployed machine instances, thereby enabling secure and continuous authentication for the machine-to-machine connections.
Abstract: An apparatus, intended for use in an authentication event, having a hardware processor, a memory, a receiver/transmitter unit, a stream block generation module adapted to enable the hardware processor to generate and store a plurality of stream blocks including at least a stream block and a first preceding stream block; a stream block streaming module adapted to enable the hardware processor to control the receiver/transmitter unit to output the stream block; and a moving window module adapted to enable the hardware processor to control the receiver/transmitter unit to output, as a stream proof, at least one of a moving window of the plurality of stream blocks in connection with an authentication event.