Dismissal

So many live in isolation even though surrounded by other human beings caught up in the web of life trying to free themselves before life strangles them cutting off their oxygen supply If they lose…

Smartphone

独家优惠奖金 100% 高达 1 BTC + 180 免费旋转




Generic Thin Operating System for Blockchain IOT Devices

The world will soon be awash in IOT devices. Such devices may be extremely small and contain only limited processing and memory capacity. It would be an advantage to have an operating system that is generic yet small enough to be loaded into any device and yet retains strong cybersecurity. A further advantage is to enable simple, secure, and robust control functionality including the possibility of processing payments for services provided by the device. The preceding goals can be achieved by interfacing IOTs to the Bitcoin-blockchain protocol.

The Metanet is the network of everything.

When you come to understand the idea fully, you start to see that you can capture information and control sensors and gate and control systems in a manner unlike and far superior to anything that came before. Sensors send to and watch the blockchain. They do not ever interact directly with a command system. The ability to set monitor keys that are derived keys means that an external attacker would not even know what keys are used.

A blockchain IOT device (BID) is an agent set up to execute certain instructions that are securely stored off-BID and accessed through cryptographic keys. In a preferred embodiment, the BID resides on the IOT itself, but in other embodiments, it may reside off-device and have internet connectivity to the device. The IOT device has its own key (and an IP address) so it can securely communicate with other devices or DHTs, etc. Its ‘operating system’ is a simple generic system with some embedded functionality for (at least, but not limited to):

Thus, the BID does not contain its own instructions embedded, and does not ‘know’ what it does or how to do it; it only contains a way to securely retrieve instructions. A BID can only perform a set of simple actions (the following are illustrative only and not limiting):

In one embodiment, such actions are embedded in machine code, and:

All of a BID’s communications are encrypted (see invention #42). Doing so allows:

(i) greater security from hacking

(ii) simple universal software-upgrade protocols

(iii) device agnosticism

The intention is a generic operating system that is usable in any IOT device. The device itself is not programmed—all programs are stored separately and loaded onto the device at set-up time (or, in some embodiments, at execution time).

Carol’s two dogs Archimedes and Bertrand are left alone all day in the backyard, and they are both friendly to each other provided they do not eat at the same time, which for some reason causes them to get very aggressive and fight each other. A and B both have identifying RFID collars, which are detectable by an IOT auto-feeder that dispenses specified quantities of food.

When a dog is at the feeder, its RFID signals to the auto-feeder to unlock the dog’s secure current puzzle solution (which is securely replaced with a new puzzle solution after each iteration). If not, a random number is presented instead.

The auto-feeder is a BID, monitoring its own state. It stores two secret values (S1 and S2) received from a separate control agent. They are used conditionally when the dogs’ RFID collars are detected within range. Based on its instructions as retrieved from the appropriate DHT, on detection of an RFID within range (along with other conditions related to the time of day, number of previous feedings, other restrictions, etc.), it sends a signal to a generic agent acting as its control agent (see below). The signal includes:

The auto-feeder then:

The big issue in IOT is valuing data — trust me when I say, people start to set the value of data and create information where there is a cost.

With 50 billion IOT devices expected to be online in the next 5 years, there is an opportunity.

50 billion machines each making many small transactions and saving and accessing data to and from the ledger… I think the miners will be just fine.

Add a comment

Related posts:

Which US Presidents chose not to run for a second term?

I know that some of our Presidents have not won re-election (10 to be precise which represents 22% of all sitting Presidents), but I want to know how many Presidents who were alive at the end of…

Crear una columna vertebral alrededor de la cual perder grasa

La glucosa es un combustible metabólico indispensable para el cerebro. Debido a que el cerebro no puede sintetizar glucosa o almacenar más de unos pocos minutos como glucógeno, depende de manera…

The Moment I Decided To Stop Fixing You

Nobody is perfect. Not you, not me or even our partners. We all have our set of bad traits and undesirable qualities, however, does that mean fixing would be necessary? In the people whom we care…