Patent classifications
H04L2209/42
Method and apparatus for effecting a data-based activity
A coordinating network element manages a protocol that prohibits the coordinating network element from substantively accessing data content that, at least in part, underlies received protocol-compliant requests. By one approach, these teachings provide for preventing substantive access to data information that is included within the protocol-compliant request in tokenized form, wherein the tokens are generated using secrets, at least one of which is unavailable to the coordinating network element.
Image distribution using composite re-encrypted images
Some embodiments enable distributing data (e.g., recorded video, photographs, recorded audio, etc.) to a plurality of users in a manner which preserves the privacy of the respective users. Some embodiments leverage homomorphic encryption and proxy re-encryption techniques to manipulate the respective data so that selected portions of it are revealed according to an identity of the user currently accessing the respective data.
Anonymized data transmission using per-user-functionality secret shares
There is a need for more effective and efficient secure data transmission. This need can be addressed by, for example, solutions for secure data transmission that utilize per-user-functionality secret shares. In one example, a method includes generating a hashed user identifier based on a received user identifier; transmitting the hashed user identifier to an external computing entity; and receiving a data retrieval secret share from the external computing entity, wherein: (i) the data retrieval secret share is selected from a plurality of per-user-functionality secret shares, (ii) the plurality of per-user-functionality secret shares are generated based on a secret value, (iii) the secret value is generated based on the hashed user identifier, (iv) the secret value is used to generate a user data private key, and (v) the external computing entity is configured to encrypt user-provided data using the user data private key prior to transmission of the encrypted user-provided data.
SYSTEM AND METHOD FOR HEALTHCARE SECURITY AND INTEROPERABILITY
Embodiments facilitate interoperability and secure patient selection for clinical trials and drug/device deployments. An entity may obtain a first set of health parameters and collective demographic information associated with one or more population segments and receive Electronic Health Record (EHR) sub-blocks with patient profile information and corresponding patient medical histories for patients. The entity may determine a subset of eligible candidate patients for a treatment based on information in the EHR sub-blocks and eligibility criteria for the treatment, which may be based the first set of health parameters, and/or the collective demographic information. The entity may transmit sub-blocks comprising eligible candidate patient profiles and medical information associated with the at least one treatment, and, in response to a received transaction block with a transaction confirmation, the entity may augment a multi-dimensional blockchain by linking: the transaction block, with a drug device information block and an EHR block.
DATA COLLECTION AND ANALYSIS SYSTEM AND DEVICE
A data collection and analysis method includes applying a first noise step to an original data stream with an original character to generate a first data stream with a first character; and applying a second noise step to the first data stream to generate a second data stream with a second character, wherein a first variation between the original character and the first character is greater than a second variation between the original character and the second character.
COMPLEX NUMBER TOKENIZATION USING A DISTRIBUTED LEDGER
To record an exchange of value in a distributed ledger, a client device interacts with a distributed ledger maintained by participants in a distributed ledger network, for example via a digital wallet. The distributed ledger includes a set of consensus rules including at least one consensus rule that digital token values recorded in the distributed ledger include complex values having at least two components. The client device generates a transaction indicating an exchange of value of a digital token having at least two components, where the transaction is stored in the distributed ledger, and transmits the transaction to at least one other participant in a distributed ledger network of participants maintaining the distributed ledger. The participants append data to the distributed ledger in response to determining that the data satisfies the set of consensus rules.
SYSTEMS AND METHODS FOR SECURING ACCESS RIGHTS TO RESOURCES USING CRYPTOGRAPHY AND THE BLOCKCHAIN
The present disclosure generally relates to securing access to resource and access rights using cryptography and the blockchain. Certain embodiments of the present disclosure generally relate to systems and methods that enhance the security of resource access using hierarchical deterministic (HD) cryptography and the blockchain. Certain embodiments of the present disclosure relate to systems and methods that securely and anonymously represent the identity of a user and the user's access code data on a distributed ledger represented across the blockchain.
METHOD, SYSTEM, DEVICES AND COMPUTER PROGRAM PRODUCTS FOR HANDLING DIGITAL PAYMENTS BETWEEN PAYERS AND PAYEES BEING IN PHYSICAL PROXIMITY TO EACH OTHER
A method (600) for handling a digital payment between a payer (P1) and a payee (P2) is presented. The payer and payee communication devices (PD1, PD2) uses (610) short-range data communication (SRDC) when the devices are in proximity of each other to agree upon a digital payment (DP) without requiring long-range data communication with a remote digital payment settlement service (DPSS) at that stage. Independently of the other device, the payer communication device (PD1) or the payee communication device (PD2) subsequently communicates (630) buffered digital payment information (DPI) to the remote digital payment settlement service (DPSS) by long-range data communication (LRDC1, 15 LRDC2). The remote digital payment settlement service (DPSS) causes settlement (640) of the digital payment (DP) as indicated by the digital payment information (DPI) received by long-range data communication (LRDC1, LRDC2) from one of the payer communi-cation device and the payee communication device (PD1, PD2).
System and method for obfuscating transaction information
A computer-implemented method for anonymizing online transaction details may include performing a process to generate an identifier (ID) and reference address for a user, and receiving a request for transaction processing from an e-commerce server. The request may include first data including: information associated with a purchase of a product to be delivered to the user; the identifier; and the reference address. The method may further include: in response to the request, determining whether the ID and reference address are included in the request, and if so, obtaining the accurate address and shipping rate rules; applying, based on the first data and the accurate address, the shipping rate rules to determine accurate shipping rate cost information associated with delivering the product to the accurate address; performing an anonymizing process on the accurate information to obtain anonymous shipping rate information, and transmitting the anonymous shipping rate information to the e-commerce server.
SYSTEMS, METHODS, AND DEVICES FOR DIGITAL ADVERTISING ECOSYSTEMS IMPLEMENTING CONTENT DELIVERY NETWORKS UTILIZING EDGE COMPUTING
Disclosed herein are systems and techniques for using a content delivery network to perform various functions within a digital advertising ecosystem, in ways that yield technological benefits such as improved security, efficiency, and speed (for example, reduction in publisher load times). As one specific example, a content delivery network can be used for the creation of electronic tokens for user identity protection between demand side platforms, supply side platforms, content creators (for example, advertisers), and publishers.