Patent classifications
H04L9/06
HOMOMORPHIC COMPUTATIONS ON ENCRYPTED DATA WITHIN A DISTRIBUTED COMPUTING ENVIRONMENT
The disclosed exemplary embodiments include computer-implemented systems, apparatuses, and processes that perform homomorphic computations on encrypted third-party data within a distributed computing environment. For example, an apparatus receives a homomorphic public key and encrypted transaction data characterizing an exchange of data from a computing system, and encrypts modelling data associated with a first predictive model using the homomorphic public key. The apparatus may perform homomorphic computations that apply the first predictive model to the encrypted transaction data in accordance with the encrypted first modelling data, and transmit an encrypted first output of the homomorphic computations to the computing system, which may decrypt the encrypted first output using a homomorphic private key and generate decrypted output data indicative of a predicted likelihood that the data exchange represents fraudulent activity.
DECENTRALIZED TRUST USING BLOCKCHAIN FOR TRACKING AND VALIDATION OF VOICE COMMUNICATIONS
Systems and methods of authenticating voice data using a ledger (blockchain). Examples include a scalable and seamless system that uses blockchain technologies to distribute trust of a conversation, authenticate persons in a conversation, track their characteristics and also to keep records of conversations. In some examples, smart phones, wearables, and Internet-of-Things (IoT) devices can be used to record and track conversations between individuals. These devices can each be used to create entries for the blockchain or a single device could be used to keep track of the entirety of the conversation. Fuzzy hashing may be used to compare newly created entries with previous entries on the ledger.
OPTIMIZATION OF TRUSTED INVOICING
An example operation may include one or more of monitoring, by a blockchain node, a delivery of a service to a first node from a second node based on a service contract and an order retrieved from a blockchain, determining, by the blockchain node, an incremental charge for a partial delivery of the service based on the monitoring, and executing, by the blockchain node, a smart contract to issue the incremental charge for the partial delivery of the service, and responsive to a resolution of a dispute raised for the incremental charge, add the incremental charge to an incremental invoice.
FILE PROCESSING DEVICE AND FILE PROCESSING METHOD
The present technology relates to a file processing device and a file processing method for enabling restriction of viewing of an image.
A file control unit generates a file that stores an encrypted image obtained by encrypting an image with a first encryption key, and an encrypted encryption key obtained by encrypting the first encryption key with a second encryption key, the encrypted image and the encrypted encryption key being associated with each other in the file. The file control unit also decrypts the encrypted encryption key in the file into the first encryption key, and, with the first encryption key obtained by the decryption, decrypts the encrypted image into the image. The present technology can be applied to a digital camera and the like that capture images, for example.
SYSTEM AND TECHNIQUES FOR UTILIZING A SMART CONTRACTS LIBRARY
Disclosed are techniques and an apparatus for accessing a smart contract library that may include a number of templates of different legal contracts implementable as a smart contract between respective parties. Each template may include a number of sections having different contractual terms and conditions and fillable fields for specific contract terms. Each respective section of the number of sections includes programming code operable to enforce conformance with specific section-related contractual terms and conditions of the respective section and with any specific contract terms input to a fillable field of the respective section. A first user address generated based on cryptographic keys may be associated with a contract-creating computing device in a private blockchain. The first user address may be associated with the first user in the private blockchain. A finalized smart contract may have a smart contract address generated from the first user address and a nonce value.
SYSTEMS AND METHODS FOR FACILITATING GENERATION OF A CARBON OFFSET BASED ON PROCESSING OF A RECYCLABLE ITEM
Disclosed herein is a method for facilitating generation of a carbon offset based on processing of a recyclable item. Accordingly, the method may include receiving, using a communication device, transportation data associated with transportation of at least one recyclable item from at least one first device. Further, the method may include analyzing, using a processing device, the transportation data. Further, the method may include determining, using the processing device, a carbon value associated with the transportation of the at least one recyclable item based on the analyzing. Further, the method may include generating, using the processing device, a net CO.sub.2e offset associated with the at least one recyclable item based on the carbon value. Further, the method may include storing, using a storage device, the net CO.sub.2e offset associated with the at least one recyclable item in a distributed ledger.
CACHING AND DELIVERING MEDIA CONTENT FROM MULTIPLE STREAMING PROVIDERS
In a system and method for distribution of media content, a cable provider gateway cooperates with a broker API, one or more streaming provider gateways, and one or more streaming applications to locally cache and display media content from the streaming provider gateways even when the streaming applications do not have connectivity to their gateways.
Systems for Session-Based Routing
In implementations of systems for session-based routing, a computing device implements a routing system to receive session data describing a session ID as a character sequence including non-embedded characters and at least one embedded character at a pre-determined index of the character sequence. The routing system extracts the at least one embedded character and determines a processing device configuration corresponding to the at least one embedded character from ledger data describing processing device configurations. The routing system maps the session data to a particular processing device based on the processing device configuration and the non-embedded characters of the character sequence.
DATA TRANSMISSION METHOD, APPARATUS, AND SYSTEM, COMPUTER DEVICE, AND STORAGE MEDIUM
A data transmission method, apparatus, and system, a computer device, and a storage medium. The method includes: performing two-way authentication with a first interaction device; receiving encrypted interaction data obtained by encrypting interaction data based on a working key and transmitted by the first interaction device, after the two-way authentication is completed, the working key being obtained by the first interaction device by mapping an authentication key used in the two-way authentication; decrypting the encrypted interaction data according to the working key obtained by mapping the authentication key on the communication adapter; transmitting interaction data obtained through the decryption to a second interaction device through a simulated device node identifiable by the second interaction device and based on a communication protocol of the second interaction device that is natively adapted to the device node.
High definition secure playback with downloadable DRM for android platforms
A Trustonic DRM Plug-in is provided that can be downloaded and operate in conjunction with an Android framework. The solution also includes a PVP with the downloadable DRM. The system includes components that can be added by Trustonic based on the Android 4.3 Framework in addition to current t-base 300 that can be used by any DRM vendor. The system enables the DRM to be downloaded in the field since all DRMs could use the standard API services of the Android 4.3 OS. With a codec component employed like H.264 or HEVC that can use the PVP with the downloaded DRM component, the Android video player can use the component to satisfy HD content security requirements.