H04L2209/30

Systems, devices, and methods for encrypting genetic information

Systems, devices, and methods for encrypting genetic information are provided herein. Also provided herein are systems, devices, and methods for encrypting compressed genetic data, transmitting encrypted compressed genetic data, and receiving, storing, accessing encrypted compressed genetic data. In some cases, a user interface is in communication with a system or device provided herein.

A METHOD OF GENERATING A SECURE RECORD OF A CONVERSATION
20210297395 · 2021-09-23 ·

A method is provided for generating a tamper-proof record of a conversation recorded using a recording device. During or after the recording, successive sections, chunks or other form of fragments of the audio recording are sent continuously or intermittently to a secure remote server. The successive fragments are automatically encrypted and stored securely on the recording device until a network connection is available.

SPLIT-KEY WALLET ACCESS BETWEEN BLOCKCHAINS
20210258169 · 2021-08-19 ·

An approach is disclosed for running a first smart contract on a first blockchain platform restricting access to a client's funds appropriated to a second smart contract running on a second blockchain platform. A transaction is received by invoking the first smart contract authorizing the second smart contract. In response to receiving an indication of a successful completion of the first smart contract, a plurality of client's authorization tickets are sent to the second smart contract. The invoked smart contract receives the set of authorization information and records the set of authorization information. After receiving a set of authenticated authorization tickets exceeding a predetermined threshold, the funds are released.

DOCUMENT VERIFICATION

An example operation may include one or more of receiving, by a document processor node, a document with a user mark over a blockchain, determining, by the document processor node, if the document is associated with a collection of documents based on the user mark, and adding the document to the collection as a part of a process step.

DOCUMENT VERIFICATION

An example operation may include one or more of marking a document, by a user node, to be included into a collection of documents, determining, by the user node, a business process step associated with the document based on a user mark, and executing a transaction to store a hash of the document onto a ledger of a blockchain, wherein a Merkle tree hash is generated and tagged on the ledger with details of the business process step.

Predictive Joint Compression and Encryption for Images and Videos

A joint compression and encryption system is configured to retrieve, from a local memory or image capture device, an image file including a first plurality of segments. The system is further configured to identify, for one or more segment of the first plurality of segments, a matching segment in a local segmentation repository. The system is further configured to compress remaining segments of the first plurality of segments for which no matching segment was identified into a compressed remaining segment set. The system is further configured to transmit, via an unsecure communication channel and to a second computing entity, the identifications of the matching segments, and the compressed remaining segment set. The system is further configured to, prior to retrieving the image file, perform a handshake or calibration process. The system is further configured to encrypt the matching segments using a key into an encrypted segment set and transmit the key to the second computing entity. In embodiments, the second computing entity, using the key, decrypts the encrypted segment set.

Host attestation

A service provider provides virtual computing services using a fleet of one or more host computer systems. Each of the host computer systems may be equipped with a trusted platform module (“TPM”). The service provider, the host computer systems, and the virtual computing environments generate attestations that prove the integrity of the system. The attestations are signed with a one-time-use cryptographic key that is verifiable against the public keys of the service provider, a host computer system, and a virtual computing environment. The public key of the host computer system is integrated into a hash tree that links the public key of the host computer system to the public key of the service provider. The public key of the virtual computing environment is signed using a one-time-use graphic key issued to the host computer system that hosts the virtual computing environment.

Blockchain ledger authentication

A computer-implemented method for performing authentication includes: determining, by a database server storing data in a blockchain ledger, a target ledger segment on which time service authentication is to be performed; generating a Merkle tree corresponding to the target ledger segment; determining a root hash of the Merkle tree, the root hash of the Merkle tree being based on a block hash of each data block in a set of one or more data blocks; executing a predetermined time capture process in a trusted execution environment to obtain a trusted time from an interface provided by a trusted time service organization; generating a digital signature for the trusted time and the root hash in the trusted execution environment; and generating a time service certificate including the trusted time, the root hash, and the digital signature.

SYSTEM AND METHOD FOR ELECTRONIC CONFERENCE VERIFICATION AND MANAGEMENT
20210203486 · 2021-07-01 · ·

Methods and systems for creating and managing electronic communications are disclosed. Exemplary methods can compress and encrypt meeting information and encode the compressed and encrypted meeting information into a uniform resource locator (URL) for transmission between one or more devices and a conferencing server.

METHOD AND SERVER FOR PROVIDING NOTARY SERVICE FOR FILE AND VERIFYING FILE RECORDED BY NOTARY SERVICE
20210167966 · 2021-06-03 · ·

According to one aspect of the present disclosure, provided is a method for providing a notary service for a file, the method comprising the steps in which: (a) when a notary service request for a specific file is obtained, a server generates, by using a hash function, or supports the generation of, a message digest of the specific file; and (b) if a predetermined condition is satisfied, the server registers, in a database, or supports the registration of, a representative hash value or a value obtained by processing the representative hash value, the representative hash value being generated by calculating at least one neighboring hash value that matches a specific hash value, wherein the specific hash value is a hash value of the result of encrypting the message digest with a private key of a first user, a private key of a second user and a private key of the server.