H04L2209/42

Trustworthy data exchange using distributed databases

The present disclosure relates to a trustworthy data exchange. Embodiments include receiving, from a device, a query, wherein the query comprises a question. Embodiments include identifying particular information related to the query. Embodiments include receiving credentials from a user for retrieving the particular information related to the query. Embodiments include retrieving, using the credentials, the particular information related to the query from one or more data repositories that are part of a distributed database comprising an immutable data store that maintains a verifiable history of changes to information stored in the distributed database. Embodiments include determining, based on the particular information related to the query, an answer to the query. Embodiments include providing the answer to the device.

Cryptographic methods and systems for managing digital certificates with linkage values

Improved pseudonym certificate management is provided for connected vehicle authentication and other applications. Temporary revocation of a certificate is enabled. With respect to Security Credential Management Systems (SCMS), pre-linkage values can be employed. The pre-linkage values can be encrypted using homomorphic encryption. Other embodiments are also provided.

Method to anonymize client MAC addresses for cloud reporting

A method for anonymizing user identifiable information to be transmitted outside of a local network includes generating a network entity hash input based on (i) a first MAC address assigned to a client station of the local network, (ii) a second MAC address assigned to the network gateway device of the local network, and (iii) an identifier of a cloud entity of an external network to which data of the client station is to be transmitted. The method further includes generating a hash value output based on the network entity hash input and a random token value using a hashing function, generating an anonymized MAC address associated with the client station based on the hash value output, and transmitting the anonymized MAC address associated with the client station to the cloud entity of the external network.

COMPUTER SYSTEM OF COMPUTER SERVERS AND DEDICATED COMPUTER CLIENTS SPECIALLY PROGRAMMED TO GENERATE SYNTHETIC NON-REVERSIBLE ELECTRONIC DATA RECORDS BASED ON REAL-TIME ELECTRONIC QUERYING AND METHODS OF USE THEREOF
20230130083 · 2023-04-27 ·

In some embodiments, the present invention provides for an exemplary computer system which includes at least: a graphical user interface client; a dedicated application server; the dedicated application server is configured to connect to the graphical user interface client and an electronic source with electronic data records; where the electronic data records include real identification identifiers of real individuals; where the graphical user interface client is configured to generate at a graphical user interface that is configured to receive user authenticating credential information and to conduct a real-time electronic negotiation querying session between the user and the dedicated application server to generate a plurality of non-reversible synthetic electronic data records of a plurality of synthetic individuals, by utilizing at least one statistical technique so that the plurality of non-reversible synthetic electronic data records cannot be used to identify any real individual in the plurality of electronic data records.

METHOD AND DEVICE FOR CONTROLLING ELECTRONIC DEVICE FOR FEDERATED LEARNING

Embodiments of the disclosure relate to an electronic device and a server for federated learning, and a method of the same. A method of refining a core artificial intelligence (AI) model built in the server includes transmitting, to each of a plurality of electronic devices performing federated learning with the core AI model, data for requesting transmission of first data used for refining the core AI model, receiving first data from at least one of the plurality of electronic devices, identifying an electronic device that has transmitted the first data from among the plurality of electronic devices, transmitting data for requesting transmission of second data to the electronic device that has transmitted the first data among the plurality of electronic devices, receiving second data from the electronic device that has transmitted the first data, and refining the core AI model by using the first data and the second data, wherein the first data includes first differential privacy protection data for protecting private data of each of the plurality of electronic devices, and the second data includes differential privacy modification data used to modify the first differential privacy protection data into second differential privacy protection data.

PRIVACY PROOFING OF SECURE ELEMENT GENERATED CERTIFICATES
20220337431 · 2022-10-20 · ·

Techniques to privacy proof secure element generated certificates anonymous secure element attestations are described herein. An attestation certificate request can be generated that is signed using the static key of the secure element. The attestation certificate request can then be sent to an attestation server, which can verify the attestation certificate request and return an anonymized attestation certificate. The device containing the secure element can transmit the certificate to third parties to verify attestation data signed by the secure element using the certificate and provide assurance to the third parties that the data being attested to has been generated inside a secure element associated with a specific manufacturer.

METHOD AND APPARATUS FOR THIRD-PARTY MANAGED DATA TRANSFERENCE AND CORROBORATION VIA TOKENIZATION

A protocol that is managed by a coordinating network element or third-party intermediary or peer network elements and utilizes tokens prohibits any subset of a union of the coordinating network element or third-party intermediary, if any, and a proper subset of the processors involved in token generation from substantively accessing underlying data. By one approach, processors utilize uniquely-held secrets. By one approach, an audit capability involves a plurality of processors. By one approach, the protocol enables data transference and/or corroboration. By one approach, transferred data is hosted independently of the coordinating network element. By one approach, the coordinating network element or third-party intermediary or a second requesting network element is at least partially blinded from access to tokens submitted by a first requesting network element. By one approach, a third-party intermediary uses a single- or consortium-sourced database. By one approach, network elements provisioned with tokens jointly manage the protocol.

SYSTEMS AND METHODS FOR ANONYMIZING MEDIA FILES FOR TESTING
20230075976 · 2023-03-09 ·

A computer-implemented method for anonymizing media files for testing may include (i) identifying a computing process that processes media files, (ii) identifying a media file with at least one characteristic expected to produce output usable for improving the computing process when used as input data to perform a test of the computing process, (iii) anonymizing the media file by replacing content in the media file with predetermined filler content while maintaining the at least one characteristic in a valid state for producing the output usable for improving the computing process, and (iv) initiating the test of the computing process using the anonymized media file as the input data such that the output of the test can be used to improve the computing process. Various other methods, systems, and computer-readable media are also disclosed.

COMPUTER METHOD AND GRAPHICAL USER INTERFACE FOR IDENTITY MANAGEMENT
20230131095 · 2023-04-27 ·

According to embodiments, a global identity (ID) is generated by receiving a plurality of documents which, in total, only a particular person has ready access, and assigning a global ID to actual name of the particular person. Registration on the blockchain gives others a way to verify that a transaction was signed by the person and sent from the person's personal electronic device by transmitting a challenge message to the person as a digital challenge, and verifying that the person possesses a corresponding private key by responding with an encrypted message that can be decrypted to display the original message.

Establishing a session initiation protocol session

The present disclosure describes methods and systems for establishing a Session Initiation Protocol Session. One method includes transmitting a first message requesting authentication configuration information; in response to the first message, receiving a second message that includes the authentication configuration information; transmitting a third message that includes authentication information based upon the received authentication configuration information; receiving an authentication challenge request that is formatted according to the second protocol; and in response to receiving the authentication challenge request, transmitting an authentication response to the second network node.