JASMYcoin Patent Breakdown- Document # JP,2022-120111,A
Before I begin, please keep in mind that Hyperledger Fabric enables virtual blockchains to run on top of physical blockchains. Hyperledger Fabric also enables channels, which are a private subnet of communication between two or more specific network members, for the purpose of conducting private and confidential transactions. Here is the translated patent, with my comments after each section:
Document # JP,2022-120111,A
Application # JP,2022-094608
PROBLEM TO BE SOLVED: To provide a terminal device and a program that enables recording to the blockchain using a different idea than before.
SOLUTION: In an information processing system including a plurality of terminal devices 100 and an information processing device 300 capable of communicating with the terminal devices 100, the terminal device 100 includes a storage unit 190 that stores a first key, and a reading recording unit 160 that creates a second key using the first key and creation information, and records transaction information encrypted using the second key in a blockchain.
Don’t get too hung up on the terminology:
100 terminal unit (a device like a phone or smart watch)
A 110 terminal control unit (control unit)
160 read-out recording part (reads/writes data into blockchain data)
190 terminal storage unit (storage unit on the device)
300 information processing apparatus (server or multiple servers)
Recently, efforts have been made to utilize block chains. As an example, in Patent Document 1, a privileged node and a plurality of normal nodes are provided, and a normal node is a transaction input unit that accepts input of transaction data and a transaction transmission unit that transmits transaction data. A transaction management part which manages a transaction history as a block chain and a block reception part which has a block reception part which receives a block from a privilege node, and which receives transaction data from a normal node, and a block generation part which generates a signature value based on the secret key and generates a block as a data set including the transaction data and the signature value ; A mode has been proposed in which a block transmission unit for transmitting a block is provided, and a block chain is linked to a block chain on condition that a transaction management unit of a normal node has confirmed the authenticity of a signature value of a block received from a privilege node using a public key.
This is an introduction leading into the invention, don’t bother making your eyes bleed.
In the invention described in Patent Document 1, it is only intended to stabilize and smooth transactions in a block chain.
To provide a terminal device and a program capable of recording a block chain using an idea different from an idea conventionally used in Patent Document 1.
Stating Problems to be solved
A storage part storing a first key
A read / record part for creating a 2 key using the first key and the information for creation and recording the transaction information encrypted using the 2 key in a block chain
Think of “1 key” as “1st key” and “2 key” as “2nd key”
The storage unit stores a plurality of software.
The read / write unit creates a plurality of 2 type keys using the first key and different creation information.
So there are multiple “2nd keys” generated from your “1st key” and KYC information
Each of the 2 type keys is associated with a predetermined information of one designated software.
Each “2nd key” is generated to interact with different software
When recording information about a designated software, the read / record unit may record information in a block chain using a 2 type key associated with predetermined information of the specified software.
The read/write unit uses “2nd keys” to write blockchain data for its respective software
The read / write unit may record information in the designated software for each predetermined block chain or blocks.
The storage unit stores general-purpose software.
When recording information about the general-purpose software, the read / write unit may record information in a block chain using the first key.
The read/write unit uses your “1st key” to write about general-purpose software, like a word processor
The creation information may include user identification information or terminal identification information.
user identification information = KYC = Know Your Customer
terminal identification information = KYM = Know Your Machine
When information encrypted using a predetermined secret key is written into a block chain from the outside, the read / record unit may decode information written in the block chain using a predetermined public key corresponding to the predetermined secret key, and may be controlled according to the information.
Your public keys are generated from your secret keys. Your device is encrypting data with your secret key, but you can see it with your public key at the same time.
Information relating to the use of the designated software encrypted using a predetermined private key is written in the block chain from the outside. When the specified software is used, the read / write unit may decode information written in the block chain using a predetermined public key corresponding to the predetermined private key, and may be controlled according to the information.
Similar to above, but when running designated software, it refers to private keys instead of secret keys. Keys are explained further as we read on.
The apparatus may further include a control unit that restricts an operation when the information for writing into the block chain or the information for writing out into the memory unit is stored in the memory unit at a predetermined capacity or more.
“Hey, my memory is full, I’m going to stop recording until you upload my blockchain data”
The first key may be installed at the time of manufacturing the terminal device and associated with the terminal device.
Did somebody say BORQS?
In the case where the mode of recording the transaction information on the block chain is used, a new 2 key can be created in the terminal device and written into the block chain chain using the 2 key, so that a wide range of applications can be expected.
Embodiment
Getting into more detail. The Diagrams aren’t that helpful, so I’ve omitted them.
In this embodiment, there is provided not only a terminal device, a program, but also a recording medium including a USB memory for recording a program, an information processing system including a information processing apparatus, a information processing apparatus and a terminal device, and an information processing method using the same. In this embodiment, “or” and “or” also include the meanings of “and” and “and”. In other words, for example, in this embodiment, “A or B” means any of “A, B, and A and B”.
So there’s a mobile device, a program, a recording medium with USB memory, and an information processing apparatus.
As shown in FIG. 1, the information processing system of the present embodiment may include a plurality of terminal devices 100 and a information processing apparatus 300 capable of communicating with the terminal devices 100. The terminal 100 is typically a smartphone, a tablet, a personal computer, or the like. Information processing apparatus 300 is typically a server. The information processing apparatus 300 of the present embodiment may be composed of a single device or a plurality of devices. In addition, when the information processing apparatus 300 is configured from a plurality of devices, it is not necessary for each device to be provided in the same space such as the same room, and may be provided in a different room, a different building, a different area, or the like, or may be different from each other. A typical example in which a information processing apparatus 300 is composed of a plurality of devices is when a distributed server is used as the information processing apparatus 300.
It sounds like “information processing apparatus 300” is the Secure PC Network & Proprietary Nodes.
As shown in FIG. 1 and FIG. 2, the terminal device 100 may include an operation unit 121 for inputting various information, a display unit 122 for displaying various information, a terminal transmission unit (transmission unit) 131 for transmitting data, and a terminal reception unit (reception unit) 132 for receiving data. The terminal device 100 is typically a personal computer, but may be a tablet terminal, a smartphone, or the like. In the terminal device 100, the display unit 122 and the operation unit 121 may be integrated into an operation display unit 120. Typically, when the terminal device 100 is composed of a smartphone, a tablet, or the like, a touch panel is used, and this operation display unit 120 is employed.
New component numbers for modules within the device.
The terminal device 100 includes a user terminal 100 a used by a user such as an operator, and a management terminal 100 b used by an administrator. One or more of the user terminal 100 a and the management terminal 100 b may be provided.
More Secure PC vibes.
As shown in FIG. 1, the terminal device 100 includes a terminal storage unit (storage unit) 190 that stores a first key (first key information) K 1. It is also possible to have a read / write unit 160 which reads the first key K 2, creates a 2 key using the first key K 1 and the creation information, and records the transaction information encrypted using the first key in the block chain (see FIGS. 1 and 4). The first key K 1 has a secret key (first secret key) and a public key (first public key). The 2 key has a secret key (2 secret key) and a public key (2 public key). The first secret key may be encrypted and stored in the terminal storage unit 190. Only the read / write unit 160 of the terminal device 100 may decrypt the first secret key. Then, the 2 key may be created by the read / write unit 160 using the decrypted first secret key. An encrypted first secret key may be stored in the CPU/TPM/BIOS EC or the like. The function of the read / write unit 160 may be realized by executing a predetermined program. In the embodiment shown in FIG. 3, a mode is shown in which the read / write unit 160 connects the encrypted first secret key, the first public key, the device information ( Machine ID ), the application 1, and the application 2, and writes the encrypted first secret key and the first public key to the block chain. The first public key may be plaintext.
Getting back into the Keys! So the “1st key” and “2nd key” both have secret and private keys. The “2nd keys” are made from the “1st keys” and only the read/write unit can decrypt the “1st secret key” (which is stored on the device).
Think of your “1st keys” as your “hardware keys” and your “2nd keys” as “software keys”.
(1) When encrypting the first secret key, a common key encryption algorithm may be used. As an example, 1. ” jasmyblockchainpc1 ” 1> and 2. ” 1cpniahckcolbymsaj ” 2>. (2) Next, a key is generated for encryption. For example:
Lathe #1> is hashed by “SHA-256”, < CK#1:256bit > is generated, and it is about <passphrase #2>.
Hash is generated by “SHA-1″ to generate ” CK#2:256bit > 256″. The length of the key is 2 using SHA – 256.
Although it may be unified with 256 bits, the present invention is not limited to such an embodiment, and a different hash function such as RIPMD – 160 may be used to make the lengths of the 2 keys different. (3) Encryption using 2 keys generated by using triple DES (DES-EDEDE 2) or other type of encryption ;
The algorithm may be combined and encrypted in 2 steps. By using a common key encryption algorithm, a bit string of an arbitrary length can be encrypted. It is to be noted that the passphrase may be any character string because it is used only for hashing and generating 2 keys.
This example reveals that the JASMY Network can upgrade it’s hashing algorithm. It also shows a passphrase being used in generation.
In block chains, a transaction is recorded by linking blocks of transactions (transaction information) in a chain. The transaction information may be hashed and written into a block chain, where a hashing is performed, e.g., by the SHA-1 ( Secure Hash Algorithm 256 bit) – 256 described above. By writing in the block chain, it is possible to prevent falsification and also to realize tamper resistance. If it is desired to perform an electronic signature (digital signature) using a block chain, data obtained by encrypting the original data and data obtained by hashing the original data using the private key and the public key corresponding to the private key may be recorded in the block chain. When reading a block chain,
By confirming that the data obtained by hashing the original data matches the data decrypted using the public key, it is possible to confirm that the person who has recorded the data has signed the data.
They just described how the blockchain verifies that the data is valid.
As a block chain, any of a public type, a consortium type, a private type, and the like may be used. When a public type is used, mining is performed. On the other hand, if a consortium type is used, no mining is performed, and an agreement will be made in a consensus between individuals. Even when a private type is used, no mining is performed, and an agreement is caused by an organization approval. Note that, when a consortium type is used, a manager of a block chain is present, but is advantageous in that it is not centralized. When a consortium type is used, for example, a Hyperledger Fabric may be used.
We know JASMY’s Consortium Chain is built on Hyperledger Fabric, utilizing the PLUGnet Toolkit & License as a reference.
The first key K 1 may be associated with the terminal device 100 and may be installed, for example, at a factory manufacturing stage. When such an embodiment is adopted, a log from the moment when the power of the terminal device 100 is turned on can be written into the block chain. In pre-installing, device information such as a Machine ID may be stored in the terminal storage unit 190, and a general-purpose software or a predetermined specification software may be pre-installed and stored in the terminal storage unit 190. When the first key K 1 is associated with the terminal device 100, device information such as a first key K 1 and a Machine ID may be associated. The general-purpose software and the designated software may be installed after purchasing the terminal device 100.
Your “1st key” is tied to your Machine ID (Know Your Machine) and is embedded during the manufacturing process.
When recording in a block chain, a 2 secret key may be used or a 2 public key may be used. However, when recording is performed in the block chain using the 2 secret key, since the content can be confirmed from the outside, the read recording unit 160 may record the information on the block chain with the 2 public key.
Your “2nd keys” are generated from your “1st keys” and Machine ID, so both your public and private “2nd keys” will work in recording to the blockchain
When the 2 key is created using the first key K 2 and the creation information, and recording is performed on the block chain using the first key, it is possible to record the block chain using the unique 2 key. Therefore, even when the same terminal device is used, it is possible to record information in a block chain using different 2 keys by using different creation information. The creation information may include terminal identification information such as device information. The 2 key (2 key information) may be generated by applying the first key (first key information) K 1 and the creation information to a predetermined formula (formula) having a predetermined variable. Although the predetermined variable and the predetermined formula may be managed by the same administrator, the predetermined variable may be different from the first administrator managing the predetermined variable and the 2 administrator managing the predetermined formula. When such an embodiment is adopted, it is possible to further enhance safety. Also, even when such an embodiment is adopted, a predetermined expression having a predetermined variable can be restored by cooperation of the first manager and the 2 administrator. Therefore, even if the transaction information is encrypted with the first public key, the first secret key can be restored by the first key K 2 and the predetermined expression having the predetermined variable, and the transaction information can be grasped. For example, in the management terminal 100 b, the first key K 1 and the creation information are used.
Administrators can manage different predetermined variables and different predetermined formulas, to enhance security.
A case may be considered in which a 2 key is created by creating a 2 key, and when the user terminal 100 a records a block chain using the 2 public key of the 100 key, the management terminal 2 b fails for some reason and cannot use the second secret key. Even in such a case, it is possible to restore the 2 secret key by the first key K 1 and the predetermined expression having these predetermined variables, and to decrypt the information that the user terminal 100 a records in the block chain using the 2 public key.
If there is an error, the system can restore “2nd keys” using “1st keys”.
Further, when the read / write unit 160 writes a log in the user terminal 100 a into a block chain, the administrator can confirm the log. When the log of the terminal device 100 is stored in the terminal device 100, the log of the terminal device 100 is stored in the terminal device 1.
By writing, for example, the administrator can confirm the log of the terminal device 100 from the outside. When the read / write unit 160 records in a block chain with the 2 public key, only those who have the 2 private key can confirm their contents. In this regard, by adopting the mode in which the administrator receives the 2 secret key, in principle, only the holder and the administrator of the terminal device 100 can confirm the log of the terminal device 100.
This is how only the user and administrator can confirm activity on your devices.
For example, when the VDDI (virtual desktop base) is used, the administrator can confirm the contents of the work performed at the user terminal 100 a and manage the contents, but there is a problem that the burden on the user terminal 100 a becomes heavy. On the other hand, by adopting an aspect in which the user terminal 100 a writes a log into a block chain as in this embodiment, a burden on the user terminal 100 a can be lightened.
More Secure PC vibes.
In addition, when a mode in which remote control of the user terminal 100 a is performed is employed, a risk that a remote operation is performed by hacking is increased ; however, as in this mode, a risk of hacking is reduced by using a block chain, and a manager can confirm a log at the terminal device 100. Such management for the user terminal 100 a is useful when introducing a remote work attracting attention recently.
Secure PC
The timing of writing into the block chain of the read / write unit 160 may be performed at a predetermined timing. For example, information such as a log may be written in a block chain at a predetermined timing such as a timing at which an off-chain is intentionally set as an off-chain and a timing at which a predetermined time has elapsed or a timing at which a certain software logs out. Also, in an environment not connected to the Internet, the read / record unit 160 records information for writing into a block chain, and a terminal storage unit (storage unit) 190 stores the information and is connected to the Internet. The read / write unit 160 may read the information stored in the terminal storage unit 190 and record it in the block chain. In addition, a log written into a block chain by the read / write unit 160 may be any log or only a log satisfying a predetermined requirement (see FIG. 8). Information such as a log may be transmitted from the terminal device 100 to the information processing apparatus 300 including the cloud, and the information processing apparatus 300 may write information such as a log into the block chain. The information processing apparatus 300 may include a device control unit 310 for controlling the information processing apparatus 300 and a device storage unit 390 for storing various information including information for writing into the block chain (see FIG. 1).
Your device records information to write into the blockchain, and uploads it when you connect it to the internet. We saw this example in that old JASMY Video where the lady goes out for as run and then connects her watch to that tower at home.
The terminal storage unit 190 may store a plurality of software. Software may include designated software and general purpose software. The read / write unit 160 may create a plurality of 2 type keys K 2 using the creation information different from the first key K 1. As the content of the information for creation changes, a different type of 2 key K 2 is created. As the information for creation, information related to the designated software may be included, and in this case, the 2 type key K2 associated with the designated software may be created by information relating to the first key K1 and the designated software. As the information relating to the designated software to be used as the information to be generated, a designated software key (specified software key information) associated with the designated software is used.
Each software has its own “2nd key”
It may be. This designated software key may be provided from an administrator or the like. When the 2 type key K 2 associated with the designated software is to be generated in this way, the read / write unit 160 records information in the block chain using the 2 type key K 2 associated with the specified software when the information about the specified software is recorded. For example, when the designated software A is used in the terminal device 100, processing information such as log information is recorded using a 2 type key K 2 a dedicated to the designated software A created from the first key K 1 unique to the terminal device (see FIG. 4). When the designated software B is used in the terminal device 100, a process information such as log information, for example, is recorded using the 2 type key K 2 b dedicated to the designated software B created from the first key K 1 unique to the terminal device.
More detailed explanation of how each software has its own “2nd key”
The 2 type key K 2 has a secret key (a 2 type secret key) and a public key (a 2 type public key). Further, as the creation information, predetermined information of the designated software (e.g., content related to the type of the information) may be included, and, for example, even if the same specification software is used, a different 2 type key K may be created according to the type of the information. In this case, according to the predetermined information of the first key K 1 and the designated software, the 2 type key K 2 associated with the predetermined information of the designated software is generated. Further, the read / write unit 160 may record information in the designated software for each predetermined block chain or blocks. For example, when the same designated software is used as described above, if a different 2 type key K 2 is generated according to the type of information, information may be recorded in different block chains depending on the type of information. In this case, the block chain may be written in units of units such as an application and a library, but the present invention is not limited to such an embodiment, and the block chain may be divided into functional units and distributed in a block chain.
“2nd keys” for some software may generate new “2nd keys” if some input information changes (like changing a user name) and will write onto a different virtual blockchain. They state that their invention has been improved upon and it sounds like they might be talking about sharding.
In this manner, when the read / write unit 160 records information in the block chain using the 2 type key K 2 different for each designated software, information can be recorded in the block chain using the 2 type key K 2 different for each designated software. Thus, information can be recorded separately for each designated software. In the case where the 2 type public key is used to record information in the block chain, the 2 type secret key may be transmitted to an administrator or the like. In this case, the administrator can use the 2 type secret key to confirm the information recorded in the block chain using the 2 type public key. On the other hand, a third party other than the user himself / herself and the administrator cannot confirm the information recorded in the block chain using the 2 type public key, so that the confidentiality can be maintained.
Describes how administrator can privately confirm information with a user’s “2nd secret key”.
While the read / write unit 160 may record information in the same block chain (see FIG. 4), it may record information on a different block chain for each designated software (see FIG. 5). In the above example, when the designated software A is used in the terminal device 100, processing information such as log information is recorded in the unique block chain A corresponding to the designated software A using the 2 type key K 2 a dedicated to the designated software A created from the first key K 1 unique to the terminal device. In addition, when the designated software B is used in the terminal device 100, processing information such as log information is recorded in the unique block chain B corresponding to the designated software B using the 2 type key K 2 b dedicated to the designated software B created from the first key K 1 unique to the terminal device.
Each “2nd key” for software writes data into it’s own designated virtual blockchain.
In the case where the information is recorded in the block chain different for each designated software in this way, a block chain which is organized for each designated software is created, and management of a log or the like for each designated software is facilitated. At the same time, it is advantageous from the viewpoint of security and privacy management, since it is necessary to refer to records of different block chains in order to collate logs of different designated software.
More blockchains for each application results in more security.
To record information on general purpose software such as Windows (registered trademark).]
The read / write unit 160 may record information in a block chain using a first key K 1 (see FIGS. 4 and 5). In this case, a first secret key may be used, or a first public key may be used. However, when recording is performed on the block chain after encrypted with the first secret key, since the content can be confirmed from the outside, the read / recording unit 160 may be configured to record in the block chain after the information is encrypted using the first public key. In this case, by adopting the mode in which the administrator receives the first secret key of the user terminal 100 a, the administrator can confirm the information recorded in the block chain. When the read / write unit 160 records information in a block chain, it may be encrypted using a public key given from an administrator. In this case, only the manager is a private key.
So until now, thew patent has discussed the process of recording information in Designated Software and now we’re moving into General Purpose software (like Windows). This discusses using “1st keys” to write data in general purpose software.
The information used and enciphered can be restored now. The public key provided by the administrator may be a first public key in the management terminal 100 b, a 2 key generated from the first key and the creation information in the management terminal 100 b, or a key different from these keys.
The general-purpose software may include a plurality of types of software, and the first key K 1 may be used when any software is used, if it is included in the general-purpose software.
It is not limited to this embodiment, and the 2 key or the 2 type key K 2 may be used even when information about general software is recorded. In this embodiment, mainly, the 2 key and the 2 type key K 2 are described using the mode generated from the first key and the creation information, but the present invention is not limited thereto, and the 2 key and the 2 type key K 2 may be provided by a third party (particularly trusted third party).
They discuss flexibility in key issuance from administrators in enabling users to write data in general purpose software.
The creation information may include user identification information such as an employee ID number. In this case, even if the same terminal device 100 is used, if the user is different, a different 2 type key K 2 is generated. Thus, even if an operator, for example, who uses the terminal device 100 has changed, information such as a log can be written into a block chain as a different user.
Different user using the same device, results in a different blockchain being written.
When information related to a specified user is written in a block chain by using a prescribed secret key such as a secret key (administrator secret key) held by an administrator, information relating to the specified software is written in a block chain. The read / record unit 160 of the user terminal 100 a, which is managed or owned by the predetermined user, may read information about the designated software using a predetermined public key such as a manager public key, and may perform an operation with the designated software in accordance with the information on the terminal control unit 110. More specifically, a command (command) for a given user terminal 100 a encrypted with a predetermined secret key, such as an administrator private key, is written into a block chain. The read / write unit 160 of the predetermined user terminal 100 a may decode the command using a predetermined public key such as a manager public key, and the terminal control unit 110 of the predetermined user terminal 100 a may control the predetermined user terminal 100 a according to the command. By employing such an embodiment, the administrator can issue a command to the terminal device 100 from the outside, and can be operated from the outside in accordance with only a command from the administrator as the user terminal 100 a. It should be noted that the above-described electronic signature may be used to confirm whether or not a command is issued from the administrator. Only when a command from an authentic administrator can be confirmed by the read / record unit 160 by an electronic signature, an external command may be received.
Describes how administrators can issue commands to other Secure PCs.
In this way, a mode in which information relating to the designated software is read using a predetermined public key corresponding to a predetermined secret key and an operation is performed by the designated software according to the information is given. In accordance with information such as a command from a predetermined third party such as an administrator, it is possible to externally control the terminal device 100 which is typically composed of the user terminal 100 a. A predetermined secret key
Describes how administrators can perform “remote control” of other Secure PCs.
Since an external command is received according to the information written in the block chain, it is possible to safely receive an external command.
Further, a time period in which the designated software (designated application) can be used is determined in advance (e.g., from 9 am to 5 pm), and information such as a log when the designated software is used may be written in the block chain only at the time. When such an embodiment is employed, a block chain of information such as a log is written in a block chain of information such as a log or the like only at a predetermined time, such as a predetermined working time, but it is possible to prevent a block chain of information, such as a log, from being written in the block chain.
Describes how administrators can deploy time restrictions to Secure PCs
The use of the user equipment 100 a and the use of the user equipment 100 a in the operation can be divided.
The recording of the block chain by the read / recording unit 160 and the reading of the block chain by the read / recording unit 160 may be performed using a predetermined drive (e.g., a D drive, an F drive, or the like).
When an embodiment is adopted in which information related to a manager such as a public key of a predetermined administrator is recorded in transaction information recorded in a block chain, information on a predetermined administrator can be collected on a block chain, and the administrator can also collect information related to the manager. In addition, in the case where the information indicating the designated software is recorded in the transaction information recorded in the block chain, it is possible to collect the information relating to the designated software on the block chain chain, and the administrator can collect the information on the designated software managed by the user. In addition, when an embodiment is adopted in which information indicating a user is recorded in transaction information recorded in a block chain, the administrator can also collect information in a predetermined user. In addition, when the terminal identification information such as device information is recorded in the transaction information recorded in the block chain, the administrator can aggregate the information on the predetermined terminal device 100. In addition, even in a mode in which recording is performed in different unique block chains for each designated software and in which general purpose software is recorded in the general purpose block chain, it is also possible to grasp a series of logs in the terminal device 100 by collecting appropriate information such as terminal identification information.
More administrator capabilities within Secure PC
Only when the designated software is driven, processing information such as a log in the designated software may be recorded in the block chain. When such an embodiment is adopted, processing information such as a log is recorded in a block chain only when the designated software is operated, and when software other than the designated software is used, processing information such as a log is not recorded in the block chain. For example, when the designated software is software for business use, processing information such as a log is recorded in a block chain when the business is performed using the designated software, but when the terminal device 100 is used otherwise, processing information such as a log is not recorded. As a result, it is possible to manage the operation of the terminal device 100 by the user when using the designated software for business, and to protect the privacy of the user on the other hand.
This describes how managers can see employees working on their Secure PCs without violating privacy. They can see that programs are running because the blockchains are being updated. If the software isn’t running, the blockchain is not running.
As described above, as an example of a mode in which writing from the external management terminal 100 b to the block chain is performed, operation in software corresponding to the block chain can be performed. By performing writing from the external management terminal 100 b to the unique block chain, it is possible to operate the user terminal 100 a on the designated software corresponding to the specific block chain. Similarly, it may be possible to perform the operation of the user terminal 100 a relating to the general-purpose software corresponding to the general-purpose block chain by writing the general-purpose block chain from the outside.
If you have the keys to operate the blockchain from outside that Secure PC, you have the keys to run the general purpose software on that Secure PC remotely.
For example, when the camera function of the user terminal 100 a is used by the designated software A. By specifying the user terminal 100 a from the external management terminal 100 b and writing it into the specific block chain C corresponding to the designated software A, it is possible to stop the camera function of the user terminal 100 a or to operate the camera function.
A mode in which a block chain is written from an external management terminal 100, and a mode in which an operation in software corresponding to the block chain is enabled is adopted.
It is possible to prevent a user (e.g., an operator) who uses the user terminal 100 a from mistake. According to such an aspect, for example, it is possible to perform encryption of data and access restriction by an external management terminal 100 b. In addition, even if data is erroneously deleted, since a recording is left in the block chain, it is possible to restore the data from the management terminal 100 b, for example, using the remaining recording. In addition, if there remains a record in which copy or the like has been made in a block chain, it may be written from the outside so as to delete the copy. In addition, when confidential information is recorded at a location which should not be recorded, the user terminal 100 a may be operated from the outside so as to delete the information.
Describes how you can remotely delete and restore data with the blockchain.
I ran out of room in my post! So I deleted these entries and just left my summaries.
Describes how you can remotely uninstall software with the blockchain.
More remote management capabilities for employers.
Remote hardware controls.
More details on capabilities of how to deal with a “full” device that needs to upload.
More management control options.
This is one big example of possible loggings in the blockchain by a Secure PC.
Auto log-out functions.
Login functions.
Describes of how an admin command is logged using public keys
Describes of how an admin command is logged using private keys.
I hope you enjoyed my breakdown! I tried to make my comments short and straight to the point.
submitted by /u/Icy_Amphibian_JASMY
[link] [comments]