H04L9/00

Method of constructing a public-key system in QAP-based homomorphic encryption

A public-key scheme of Homomorphic Encryption (HE) in the framework Quotient Algebra Partition (QAP) comprises: encryption, computation and decryption. With the data receiver choosing a partition or a QAP, [n, k, C], a public key Key.sub.pub=(VQ.sub.en, Gen.sub.ε) and a private key Key.sub.priv=custom character.sup.†P.sup.† are produced, where VQ.sub.en is the product of an n-qubit permutation V and an n-qubit encoding operator Q.sub.en, Gen.sub.ε an error generator randomly provides a dressed operator Ē=V.sup.†EV spinor error E of [n, k, C]. Then, by Key.sub.pub, the sender can encode his k-qubit plaintext Ix) into an n-qubit ciphertext |ψ.sub.encustom character, which is transmitted to the cloud. The receiver prepares the instruction of encoded computation U.sub.en=Pcustom charactercustom charactercustom characterV.sup.†Q.sub.en.sup.† for a given k-qubit action M and sends to cloud, where custom character is the error-correction operator of [n, k, C], custom character=I.sub.2.sub.n−k.Math.M the tensor product of the (n−k)-qubit identity I.sub.2.sub.n−k and M , and V.sup.†Q.sup.†.sub.en and Pcustom character the complex-transposes of VQ.sub.en and </p

Computing connection credential verification

A computing device may include a memory and a processor configured to cooperate with the memory to establish a connection with a client device, with the client device having a first credential to connect the client device to a computing service, and the first credential being provided by a proxy. The processor may further receive a request from the client device via the connection to validate the first credential before use of the first credential by the client device, and validate the first credential with use of a second credential for the computing service obtained independent of the proxy.

Social media profile identification connected to cryptographic token
11706028 · 2023-07-18 · ·

Disclosed herein is a social media platform profile identification and social discovery feature. Disclosed social media networks enable introduction of users that may not otherwise know one another based on commonality between those users. Social media profiles are identified by digital objects instead of or in addition to more traditional indexing methods such as real names or screen names. Social discovery on a social network is performed via matching to similar behavior profiles in activity monitored by a block explorer. Machine learning models categorize behavior patterns observed by the block explorer into a machine recognized glossary. Social networks further recommend actions by users based on the monitored online behaviors of social connections.

MANAGING METHOD OF FRAGMENTARY DIGITAL CREATION AND COMPUTER READABLE STORAGE MEDIUM
20230013584 · 2023-01-19 ·

A managing method of a fragmentary digital creation incorporated with a creation managing platform is disclosed. The method includes: receiving an uploaded digital creation by the creation managing platform; receiving a setting command to set a charging approach, a price and a profit-sharing mode of the digital creation; generating a text record corresponding to content of the digital creation through an algorithm; analyzing the digital creation through an AI model to divide the digital creation into multiple fragmentary creations; labeling each fragmentary creation according to the text record; computing a weighting value for each fragmentary creation with respect to the entire digital creation; computing a fragmentary price for each fragmentary creation based on the price and each weighting value; and storing the charging approach, the profit-sharing mode, multiple labeled fragmentary creations, each weighting value, and each fragmentary price to generate an online-executable smart contract.

System and method for conducting searches at target devices

A method, apparatus and system for secure forensic investigation of a target machine by a client machine over a communications network. In one aspect the method comprises establishing secure communication with a server over a communications network, establishing secure communication with the target machine over the communications network, wherein establishing secure communication with the target machine includes establishing secure communication between the server and the target machine, installing a servelet on the target machine, transmitting a secure command to the servelet over the communications network, executing the secure command in the servelet, transmitting data, by the target machine, in response to a servelet instruction, and receiving the data from the target machine over the communication network.

System and method for conducting searches at target devices

A method, apparatus and system for secure forensic investigation of a target machine by a client machine over a communications network. In one aspect the method comprises establishing secure communication with a server over a communications network, establishing secure communication with the target machine over the communications network, wherein establishing secure communication with the target machine includes establishing secure communication between the server and the target machine, installing a servelet on the target machine, transmitting a secure command to the servelet over the communications network, executing the secure command in the servelet, transmitting data, by the target machine, in response to a servelet instruction, and receiving the data from the target machine over the communication network.

HOMOMORPHIC ENCRYPTION IN A HEALTHCARE NETWORK ENVIRONMENT, SYSTEM AND METHODS

A system and method for homomorphic encryption in a healthcare network environment is provided and includes receiving digital data over the healthcare network at a data custodian server in a plurality of formats from various data sources, encrypting the data according to a homomorphic encryption scheme, receiving a query at the data custodian server from a data consumer device concerning a portion of the encrypted data, initiating a secure homomorphic work session between the data custodian server and the data consumer device, generating a homomorphic work space associated with the homomorphic work session, compiling, by the data custodian server, a results set satisfying the query, loading the results set into the homomorphic work space, and building an application programming interface (API) compatible with the results set, the API facilitating encrypted analysis on the results set in the homomorphic work space.

METHOD AND SYSTEM FOR CHEON RESISTANT STATIC DIFFIE-HELLMAN SECURITY
20230224157 · 2023-07-13 ·

A method for providing Cheon-resistance security for a static elliptic curve Diffie-Hellman cryptosystem (ECDH), the method including providing a system for message communication between a pair of correspondents, a message being exchanged in accordance with ECDH instructions executable on computer processors of the respective correspondents, the ECDH instructions using a curve selected from a plurality of curves, the selecting including choosing a range of curves; selecting, from the range of curves, curves matching a threshold efficiency; excluding, within the selected curves, curves which may include intentional vulnerabilities; and electing, from non-excluded selected curves, a curve with Cheon resistance, the electing comprising a curve from an additive group of order q, wherein q is prime, such that q−1=cr and q+1=ds, where r and s are primes and c and d are integer Cheon cofactors of the group, such that cd≤48.

SYSTEMS AND METHODS FOR PRIVATE LOCAL SPONSORED CONTENT
20230222551 · 2023-07-13 ·

Systems and methods are shown for providing private local sponsored content selection and improving intelligence models through distribution among mobile devices. This allows greater data gathering capabilities through the use of the sensors of the mobile devices as well as data stored on data storage components of the mobile devices to create predicted models while offering better opportunities to preserve privacy. Locally stored profiles comprising machine intelligence models may also be used to determine the relevance of the data gathered and in improving an aggregated model for identifying the relevance of data and the selection of sponsored content items. Distributed optimization is used in conjunction with privacy techniques to create the improved machine intelligence models. Publishers may also benefit from the improved privacy by protecting the statistics of type or volume of sponsored content items shown with publisher content.

METHOD AND SYSTEM FOR HTTP SESSION MANAGEMENT USING HASH CHAINS
20230224144 · 2023-07-13 ·

A method for performing authentication of a client device using a hash chain includes: receiving a first data request from a client device, the first data request including at least a user identifier and a first hash value; transmitting a first data response message to the client device; receiving a second data request from the client device, the second data request including at least the user identifier and a second hash value; generating a validating hash value by applying a hashing algorithm to the second hash value; validating the first hash value as being equal to the generated validating hash value; and transmitting a second data response message to the client device upon successful validation of the first hash value, wherein the second data response message includes one or more data values associated with the user identifier.