Patent classifications
H04L9/00
Blockchain generation apparatus, blockchain verification apparatus, and program
The blockchain generation apparatus 1 includes: a parameter calculator 122 that identifies a parameter type to be used for linkage of the new block, based on block approval method data 114, and calculates a value for the identified parameter type based on transaction datasets which are related to an identifier of a generating party; a block generation condition checker 125 that determines whether the generating party is qualified to generate the new blockchain data, based on the value calculated by the parameter calculator 122; and a blockchain generator 126 that tries to generate the new blockchain by referring to the shared data when the block generation condition checker 125 determines that the generating party is qualified. An identifier of the blend pattern included in the block approval method data 114 specifies a combination of the plurality of parameter types that conflict with each other.
Mobile enrollment using a known biometric
A system performs mobile biometric identification system enrollment using a known biometric. The system receives a digital representation of a first biometric for a person. Prior to using the digital representation of the first biometric to identify the person, the system compares a received digital representation of a second biometric for the person to known biometric data for the person. When the digital representation of the first biometric has been thus verified, the system is operative to identify the person using the digital representation of the first biometric.
Security mechanisms for data plane extensions of provider network services
A connectivity enablement device includes one or more processors, one or more memories and a hardware input port. The memories store program instructions that when executed examine a token obtained from a token transfer device inserted into the port, and cause one or more messages to be transmitted to a virtualized computing service. The messages indicate (a) the connectivity enablement device, (b) the token transfer device, (c) the token's source and (d) a server. An indication that the server has been configured within an isolated virtual network is obtained at the connectivity enablement device.
Protocols for decentralized networks
Methods, systems, and apparatus, including computer programs encoded on computer storage media, for establishing a proof of storage over a specified period of time. One of the methods includes: (i) receiving, at a prover, an initial input challenge; (ii) producing, at the prover, an output proof proving that the prover has access to specified data for a specified time, wherein producing the output proof includes: (a) producing, at the prover, an initial proof responsive to the initial input challenge, the initial proof proving that the prover is storing specified data; (b) generating, at the prover, a new input challenge based at least in part on the initial proof: (c) producing, at the prover, a new proof responsive to the new input challenge, the new proof proving that the prover is storing the specified data; and (d) repeating, at the prover, the generating step and the producing a new proof responsive to the new input challenge step a number of times, the repeating step generating sequential proofs of storage to determine time of storage , wherein each generating step is based at least in part on a most recent new proof; and (iii) forwarding the output proof, e.g., to a blockchain.
METHOD AND APPARATUS FOR ENCRYPTING AND DECRYPTING AND READING AND WRITING MESSAGES, COMPUTER DEVICE, AND STORAGE MEDIUM
A method for encrypting messages is provided. The method for encrypting messages includes: generating a seed; generating a mask based on the seed; generating a masked message by masking an original message using the mask; acquiring a target message by performing white box encryption on the masked message; and disclosing the target message and the seed.
DATA PROCESSING METHOD AND APPARATUS, INTELLIGENT DEVICE, AND STORAGE MEDIUM
Embodiments of this application disclose a data processing method. The method includes obtaining data that need to be verified from a target trusted computing node; obtaining first ledger data corresponding to the data that need to be verified, the first ledger data being obtained by signing a first message digest by using a private key of the target trusted computing node and being stored in the blockchain network by the target trusted computing node, and the first message digest being obtained by performing message digest calculation on raw data; decrypting the first ledger data by using a public key of the target trusted computing node to obtain the first message digest; performing message digest calculation on the data that need to be verified to obtain a second message digest; and determining a verification result according to the first message digest and the second message digest.
METHOD AND APPARATUS FOR VERTICAL FEDERATED LEARNING
This disclosure relates to a method for vertical federated learning. In multiple participation nodes deployed in a multi-way tree topology, an upper-layer participation node corresponds to k lower-layer participation nodes. After the upper-layer participation node and the k lower-layer participation nodes exchange public keys with each other, the upper-layer participation node performs secure two-party joint computation with the lower-layer participation nodes with a first public key and second public keys as encryption parameters to obtain k two-party joint outputs of a federated model. Further, the upper-layer participation node aggregates the k two-party joint outputs to obtain a first joint model output corresponding to the federated model. As such, a multi-way tree topology deployment-based vertical federated learning architecture is provided, improving the equality of each participation node in a vertical federated learning process.
METHOD AND SERVER FOR PERFORMING BUILDING INFORMATION MODELLING DESIGN COLLABORATION VIA CONFIDENTIALITY-MINDED FRAMEWORK USING INTERPLANETARY-FILE-SYSTEM-BLOCKCHAIN INTEGRATED NETWORK
A method for performing Building Information Modelling design collaboration via Confidentiality-Minded Framework using Interplanetary-File-System-Blockchain integrated network by a server is provided. The method includes: segregating one or more sensitive and non-sensitive BIM portions of a BIM object; uploading a target BIM component into an IPFS network to receive a target content identifier (CID) of the target BIM component from the IPFS network; if the target BIM component has one or more of the sensitive portions, encrypting the target CID to obtain a target encrypted CID (ECID), and adding the target ECID into a target blockchain ledger as a target transaction via a target smart contract; accessing the target transaction to download the target BIM component from the IPFS network; and performing a design coordination operation on the target BIM component, so as to distributing revised target BIM component to a receiver terminal.
ACCESS CONTROL APPARATUS, CONTROL METHOD, AND NON-TRANSITORY COMPUTER READABLE MEDIUM
An access control apparatus (2000) acquires a request (20) for access to data stored in a first storage apparatus 30. The access control apparatus (2000) acquires privilege information (70) from a blockchain storage (40). The privilege information (70) represents access privilege pertaining to access to the first storage apparatus (30). The access control apparatus (2000) determines whether requested access is within a range of the access privilege of a target entity (10) being a subject of the request (20), by using the privilege information (70) of the target entity (10). When it is determined that the access is within the range of the access privilege of the target entity (10), the access control apparatus (2000) executes the access.
DECENTRALIZED INFORMATION MANAGEMENT DATABASE SYSTEM
A request to present digital content at a client machine associated with a designated network identifier may be received. For each of a plurality of preference characteristics, a respective characteristic query message may be transmitted via a network to a respective plurality of identity nodes via a gossip communication protocol defining a peer-to-peer procedure for transmitting information among the plurality of identity nodes. For each of the plurality of preference characteristics, a respective preference identification response message that includes a respective preference value corresponding with the respective preference characteristic may be received. The designated network identifier may be stored in a trust ledger shared among the plurality of identity nodes. A digital content item may be selected based at least in part on the preference values.