Patent classifications
H04L9/00
COMPUTING CONNECTION CREDENTIAL VERIFICATION
A computing device may include a memory and a processor configured to cooperate with the memory to establish a connection with a client device, with the client device having a first credential to connect the client device to a computing service, and the first credential being provided by a proxy. The processor may further receive a request from the client device via the connection to validate the first credential before use of the first credential by the client device, and validate the first credential with use of a second credential for the computing service obtained independent of the proxy.
SECRET CODE VERIFICATION PROTOCOL
The present disclosure generally relates to code verification. For example, aspects of the present disclosure include systems and techniques for determining whether two codes are a match. One example method generally includes generating, at a first device, first encrypted data at least in part by encrypting verification data using a public key; generating, at the first device, second encrypted data at least in part by encrypting a random factor using the public key; generating, at the first device, a key for the verification data; generating, at the first device, third encrypted data at least in part by encrypting the key using the public key; computing, at the first device, fourth encrypted data at least in part by applying homomorphic encryption function to the first encrypted data, the second encrypted data, and the third encrypted data; and sending, to a second device, the fourth encrypted data.
CERTIFICATION OF FAN STATUS AND CORRESPONDING MARKETPLACE FOR DIGITAL COLLECTIBLES
The present invention is related to systems and methods for creating, validating, updating, and certifying fan status. The present invention is directed to creating a platform for fan communications and engagement. The present invention also includes a marketplace for transacting digital collectibles of interest to fans. Fan status in the present invention is a metric of social interaction, engagement, time spent, money spent, events attended, and/or other ways of measuring support and interest. Both quantitative and qualitative measures of fan status are compatible with the present invention. Preferably, the fan status is used for fans of sports teams.
Systems and methods for facilitating generation of a carbon offset based on processing of a recyclable item
Disclosed herein is a method for facilitating generation of a carbon offset based on processing of a recyclable item. Accordingly, the method may include receiving, using a communication device, transportation data associated with transportation of at least one recyclable item from at least one first device. Further, the method may include analyzing, using a processing device, the transportation data. Further, the method may include determining, using the processing device, a carbon value associated with the transportation of the at least one recyclable item based on the analyzing. Further, the method may include generating, using the processing device, a net CO.sub.2e offset associated with the at least one recyclable item based on the carbon value. Further, the method may include storing, using a storage device, the net CO.sub.2e offset associated with the at least one recyclable item in a distributed ledger.
Homomorphic Encryption-Based Testing Computing System
A homomorphic encryption-based testing computing system provides a risk-based, automated, one-directional push of production data through a homomorphic encryption tool and distributes the encrypted data to use in testing of applications. Data elements and test requirements are considered when automatically selecting a homomorphic encryption algorithm. A decisioning component selects an algorithm to use to homomorphically encrypt the data set and a push mechanism performs one or both of the homomorphic encryption and distribution of the encrypted data set to at least one intended host. Once delivered, the testing software and/or testing procedures proceed using the encrypted data set, where results of the testing may be stored in a data store. A validation mechanism may validate the test data against production data and communicates whether testing was successful.
Physical Item Control
The present invention relates to systems and methods for physical item control. The invention further relates to a technological coordination layer protocol for representation of a physical item on a blockchain by a physically backed token minted when the physical item is transferred by its owner or possessor to a guardian user of the protocol. The guardian user delivers the item to a physical location when the physically backed token is burned. While the physical item is in the possession of the guardian user, the condition of the physical item is verified through on-chain audits. The protocol can provide tokens to compensate guardian users.
INTEGRATED METHOD FOR UPLOADING DATA ON A BLOCKCHAIN
An integrated method for uploading data on a blockchain comprising: receiving an editable text data or an editable form data by the data source computer device; determining whether a file update time of the editable text data or the editable form data is later than a last change time stored by the service server and corresponding to the data by the data source computer device; sending the data to the service server when the data source computer device determined that the file update time is later than the last change time by the data source computer device; executing a corresponding service that is able to access data of a blockchain and upload the data to the blockchain according to the data from the data source computer device by the service server. Therefore, the data can be efficiently and quickly uploaded to the blockchain.
PRIVACY-PRESERVING MACHINE LEARNING TRAINING BASED ON HOMOMORPHIC ENCRYPTION USING EXECUTABLE FILE PACKAGES IN AN UNTRUSTED ENVIRONMENT
Aspects of the present disclosure provide systems, methods, and computer-readable storage media that support secure training of machine learning (ML) models that preserves privacy in untrusted environments using distributed executable file packages. The executable file packages may include files, libraries, scripts, and the like that enable a cloud service provider configured to provide ML model training based on non-encrypted data to also support homomorphic encryption of data and ML model training with one or more clients, particularly for a diagnosis prediction model trained using medical data. Because the training is based on encrypted client data, private client data such as patient medical data may be used to train the diagnosis prediction model without exposing the client data to the cloud service provider or others. Using homomorphic encryption enables training of the diagnosis prediction model using encrypted data without requiring decryption prior to training.
METHOD AND SYSTEM FOR SHARING SENSOR INSIGHTS BASED ON APPLICATION REQUESTS
A method at a first domain for obtaining at least one insight from a second domain, the method including registering an application with an anchor in the first domain; providing, from the anchor to the application, a first message signed by the anchor; sending, from the first domain to a network domain, the signed message; receiving, from the network domain, at least one signed token, each of the at least one signed token being for a synthetic sensor on the second domain, where the synthetic sensor provides an insight; sending a request message to the second domain, the request message requesting the insight and including the at least one token; and receiving the insight from a synthetic sensor associated with the at least one token.
ACCELERATED CRYPTOGRAPHIC-RELATED PROCESSING WITH FRACTIONAL SCALING
Cryptographic-related processing is performed using an n-bit accelerator. The processing includes providing a binary operand to a multiply-and-accumulate unit of the n-bit accelerator. The multiply-and-accumulate unit performs an operation using the binary operand and a predetermined fractional constant F to obtain an operation result, and rounds the operation result by discarding x least-significant bits of the operation result to obtain a fractionally-scaled result, where x is a configurable number of bits to discard from the operation result, and the fractionally-scaled result facilitates performing the cryptographic-related processing.