Abstract: A secure computer drive system includes an application programming interface, a graphical user, and a distributed computer system. The application programming interface provides a plurality of functions associated with a computer interface that are accessible to a computer application. The graphical user interface is coupled to the application programming interface, drives a computer display to display contents of the secure computer drive system, and receives user inputs for changing the contents using an operating system file explorer. The distributed computer system is implemented using an event actor architecture that maintains a chain-of-events consensus algorithm.
Abstract: A method includes logging into a server and sending geolocation information to the server by a first device. The first device requests rights to decrypt a secure data file, and in response, the server sends a machine-readable optical label to the first device. The first device displays the machine-readable optical label. A second device logs into the server, and scans the machine-readable optical label displayed by the first device to create a scanned image. The second device decodes data from the scanned image to form decoded data. Geolocation information of the second device and the decoded data are submitted to the server. The decoded data and the geolocation information are validated by the server, and in response to successfully validating the geolocation information, a link completion status indicator is sent to the second device, and information to decrypt the secure data file is sent to the first device.
Abstract: Methods are described for a data creator to securely send a data payload to another device in a transient symmetric key technology (TSKT) system, and for the other device to securely receive the payload data. One method includes receiving a first seed and a formula from a command and control server. A second seed is generated, and the first seed and the second seed are combined using the formula to create a data seed. A first key is generated using the first seed, and the second seed is encrypted using the first key to form an encrypted second seed. A second key is generated using the data seed, and the data payload is encrypted using the second key to form an encrypted data payload. The encrypted data payload and the encrypted second seed are combined in a secure container, and subsequently all keys and seeds and the formula are destroyed.
Abstract: A method for processing transactions for a decentralized application of a computing system includes receiving a transaction having associated data by the computing system. The transaction is processed using an event actor architecture. A first block related to said transaction is received, wherein the first block includes a cryptographic signature. The transaction is cryptographically processed using a chain-of-events blockchain, wherein the chain-of-events blockchain includes a ledger of blocks cryptographically linked by events. The transaction is rejected if the transaction accesses a second block not linked to the first block in a correct chain-of-events.