H04L9/06

Platform for management of user data

A system, method, device, and platform for managing data. Data associated with a user received from one of a number of sources. The data is automatically confirmed as applicable to a user. The data is added to a data set associated with the user. A determination is made whether the data set is complete after adding the data to the data set. One or more tokens are created based on the data set of the user.

Writing a container index to persistent storage

Example implementations relate to metadata operations in a storage system. An example method includes receiving, from a first stream process, a first write request for a first container index in memory. The method further includes, in response to a receipt of the first write request, sending a first token to the first stream process without writing the first container index to a persistent storage. The method further includes receiving, from a second stream process, a first completion request for the first container index. The method further includes, in response to a receipt of the first completion request, writing the first container index from the memory to the persistent storage.

Digital identity network interface system

There is a provided a digital identity network interface system that may include a communications module and a processor. The processor may be configured to receive a signal representing a digital identity request, the digital identity request defining one or more scopes associated with the request, at least one of the scopes identifying a data type associated with the request, generate a query based on the scopes by translating at least one of the scopes into a query having a query format associated with a digital identity network, the digital identity network storing data associated with a plurality of users, send a signal representing the query to the digital identity network, send a link to an authorization device, after successful authentication, obtain data associated with the digital identity request from the digital identity network, and release at least some of the data.

Method for storing a data file

A method for storing a data file (DF) on a storage entity (SE) includes receiving, by a proxy (PE) and from a computing entity (CE), a plurality of hash values corresponding to a plurality of blocks of the DF. The PE may check whether the plurality of blocks of the DF are stored in the SE based on the plurality of hash values. Based on determining that at least a subset of the plurality of blocks of the DF are not being stored in the SE, the PE may compute a secret associated with an encryption key. The PE may transmit, to the CE, the secret. The PE may receive, from the CE, information including storage locations of the subset of the plurality of blocks within the SE and one or more hash values, of the plurality of hash values, associated with the subset of the plurality of blocks.

Systems and methods for bartering services and goods using distributed ledger techniques

Systems and methods described herein track bartering using distributed ledger techniques to, for example, facilitate the establishment of a bartering marketplace that enables users to barter for, and ultimately exchange, services and/or goods with each other. In certain embodiments, a monetary value may be assigned to each service and/or good to be bartered to establish appropriate bartering baselines. In addition, in certain embodiments, additional monetary value exchanges may be tracked for particular exchanges to make sure that the exchanges are fair.

SECURE BOOT WITH RESISTANCE TO DIFFERENTIAL POWER ANALYSIS AND OTHER EXTERNAL MONITORING ATTACKS
20180004957 · 2018-01-04 ·

A method for device authentication comprises receiving, by processing hardware of a first device, a message from a second device to authenticate the first device. The processing hardware retrieves a secret value from secure storage hardware operatively coupled to the processing hardware. The processing hardware derives a validator from the secret value using a path through a key tree, wherein the path is based on the message, wherein deriving the validator using the path through the key tree comprises computing a plurality of successive intermediate keys starting with a value based on the secret value and leading to the validator, wherein each successive intermediate key is derived based on at least a portion of the message and a prior key. The first device then sends the validator to the second device.

METHOD AND COMPUTER PROGRAM PRODUCT FOR ORDER PRESERVING SYMBOL BASED ENCRYPTION
20180004971 · 2018-01-04 ·

Techniques for sorting encrypted data within a software as a service (SaaS) environment. Data is encrypted on a per symbol basis with a symbol based encryption module. Sort and search functionality preserving encryption that allows other modules to sort tokens and to search for tokens is provided. Encrypted tokens that have been encrypted by the symbol based encryption module are stored in a database. Access to the encrypted tokens is provided through the SaaS environment.

METHOD AND SYSTEM FOR ENCRYPTING DATA
20180006805 · 2018-01-04 ·

A method for encrypting data based on all-or-nothing encryption includes: providing, by an encryption system, data to be encrypted and an encryption key; dividing, by the encryption system, the data into an odd number of blocks, wherein each of the blocks has the same size; encrypting, by the encryption system, the blocks with the encryption key to obtain an intermediate ciphertext c′ comprising intermediate ciphertext blocks c.sub.0′, . . . , c.sub.N′, wherein c0′ corresponds to a random seed and c.sub.1′, . . . , c.sub.N′ corresponds to the encrypted blocks; and obtaining, by the encryption system, a final ciphertext c using the intermediate ciphertext c′. An intermediate overall ciphertext t is obtained based on XOR'ing the intermediate ciphertext blocks c.sub.0′, . . . , c.sub.N′; and obtaining a plurality of final ciphertext blocks c1, . . . cN by XOR'ing respective intermediate ciphertext blocks c.sub.1′, . . . , c.sub.N′ with the intermediate overall ciphertext t.

METHOD AND SYSTEM FOR STATE MACHINE SECURITY DEVICE
20180007047 · 2018-01-04 ·

A security device may be utilized to provide security measures to an electronic device that may incorporate the security device or be coupled to it. The security measures may comprise authentication (e.g., authentication of devices, users, or activities), and/or encryption measures (e.g., encrypting or decrypting exchanged data). A transaction or access via the security device may be authenticated by communicating an authentication request by the security device to an authentication server, which may generate, in response, a sequence of information requests that are sent to the security device. The security device may then generate, in response, a sequence of responses that are sent to the authentication server, with the sequence of responses comprising a sequence of reported values each of which are unique. The authentication server may then authenticate the security device based on comparing of the sequence of reported values with a sequence of expected values that identifies the security device.

METHODS AND TERMINALS FOR GENERATING AND READING 2D BARCODE AND SERVERS
20180004854 · 2018-01-04 ·

Generating a 2D barcode includes acquiring private information input by a user and sending the private information to a server through a network. The method includes receiving an information access address returned through the network by the server, and generating a 2D barcode including the information access address. The method further includes acquiring a 2D barcode including an information access address and scanning the 2D barcode to obtain the information access address included in the 2D barcode, the information access address being for accessing private information. The method further includes sending the information access address to a server through a network, and receiving the private information returned through the network by the server, and using the private information as a reading result of the 2D barcode.