G06F21/6245

Efficient deniable commitment of data and unlinkable proof of commitment for securing user privacy in a digital identity system
11580256 · 2023-02-14 · ·

A method of generating a deniable commitment of personal data of a user with an unlinkable proof of the commitment of the personal data for securing user privacy in a digital identity system includes receiving the personal data of the user and receiving the commitment of the personal data according to a commitment scheme. An interactive zero-knowledge proof is engaged in with the user so as to verify that the commitment of the personal data opens to the personal data of the user.

Recordation of device usage to public/private blockchains
11580535 · 2023-02-14 · ·

A personal blockchain is generated as a cloud-based software service in a blockchain environment. The personal blockchain immutably archives usage of any device, perhaps as requested by a user. However, some of the usage may be authorized for public disclosure, while other usage may be designated as private and restricted from public disclosure. The public disclosure may permit public ledgering by still other blockchains, thus providing two-way public/private ledgering for improved record keeping. Private usage, though, may only be documented by the personal blockchain.

Image forming apparatus and controlling method
11582236 · 2023-02-14 · ·

An image forming apparatus includes a communication interface and a processor. The communication interface is configured to transmit data to and receive data from a cloud server that provides a cloud service. The processor is configured to receive a token from the cloud server via the communication interface, transmit a request including the token to the cloud server via the communication interface, receive a response including user information from the cloud server via the communication interface, and shift to a login state based on the user information.

Audio profile for personalized audio enhancement

A system creates an audio profile. The audio profile may be stored in a database. For example, the audio profile may be securely stored in a database of a social network and associated with a user account. The audio profile may contain data describing the way in which the specific user hears and interprets sounds. Systems and applications which present sounds to the user may access the audio profile and modify the sounds presented to the user based on the data in the audio profile to enhance the audio experience for the user.

System and method for virtual currency remittance
11580595 · 2023-02-14 ·

[Object] The object is to present a technical solution for a bank to disclose information on a deposit account directly to a third party. [Solution Means] The owner of a virtual currency address or real-currency deposit account provides a disclosure key to a disclosee (third party). The third party accesses a disclosure server 6 by operating a disclosee terminal 7, and transmits a disclosure request with the disclosure key. The disclosure server 6 accesses to an opener bank server 1, 8, acquires the virtual currency address owner information or the instant real-currency deposit account balance information, transmits it to the disclosee terminal 7, and make it browsable on the disclosee terminal 7.

Methods and systems of telemedicine diagnostics through remote sensing
11582200 · 2023-02-14 · ·

A system for telemedicine diagnostics through remote sensing includes a computing device configured to initiate a communication interface between the computing device and a client device operated by a human subject, wherein the secure communication interface includes an audiovisual streaming protocol, receive, from at least a remote sensor at the human subject, a plurality of current physiological data, generate a clinical measurement approximation as a function of the change of a first discrete and a second discrete set of current physiological data, wherein generating further comprises receiving approximation training data correlating physiological data with clinical measurement data, training a measurement approximation model as a function of the training data and a machine-learning process, and generating the clinical measurement approximation as a function of the current physiological data and the measurement approximation model, and presenting the clinical measurement approximation to a user of the computing device using the secure communication interface.

System for context-based data storage scrutinization and capture

A system for context-based data scrutinization and capture is provided. The system comprises: a memory device with computer-readable program code stored thereon; a communication device connected to a network; a processing device, wherein the processing device is configured to execute the computer-readable program code to: monitor a data storage location using a crawler bot configured for scanning an artifact stored in the data storage location; scan the artifact, using the crawler bot, for one or more data fields, wherein at least one of the one or more data fields comprises unobscured private data; identify an artifact type for the artifact based on the one or more data fields; and capture the artifact from the data storage location based on the artifact and the unobscured private data, wherein capturing the artifact comprises temporarily removing the artifact from the data storage location.

File sharing system and method
11580244 · 2023-02-14 · ·

A file sharing system and methods therefor share one or more files without requiring the files be sent to or stored on a server. The file sharing system enables files to be shared from a user device allowing users to maintain control of the files by storing and sharing files off the cloud. Sharing and file access is typically effectuated via a server and one or more links provided by the server. File access is limited to selected file access types.

Automated honeypot creation within a network

Systems and methods for managing Application Programming Interfaces (APIs) are disclosed. Systems may involve automatically generating a honeypot. For example, the system may include one or more memory units storing instructions and one or more processors configured to execute the instructions to perform operations. The operations may include receiving, from a client device, a call to an API node and classifying the call as unauthorized. The operation may include sending the call to a node-imitating model associated with the API node and receiving, from the node-imitating model, synthetic node output data. The operations may include sending a notification based on the synthetic node output data to the client device.

Systems and methods for record linkage

A record linking platform having a computer system with a processor, multiple databases each having records, such as private health information. Each of the multiple databases are not in direct communication with one another. A control center is in communication with the different entities, the control center configured to: generate a site configuration file, a key configuration file, and a broker configuration file. A keymaster configured to: receive the key configuration file, generate a hash key, and transmit the hash key to the databases. The databases configured to: receive the site configuration file and the hash key; process the records to generate evaluation records data that conform to a data model specified in the site configuration file; and encrypt the evaluation records using the hash key. An honest broker configured to: receive the broker configuration file and the encrypted evaluation records; and link the encrypted evaluation records without decrypting.