Patent classifications
H04L2209/42
Systems and methods for providing a modified loss function in federated-split learning
Disclosed is a method that includes training, at a client, a part of a deep learning network up to a split layer of the client. Based on an output of the split layer, the method includes completing, at a server, training of the deep learning network by forward propagating the output received at a split layer of the server to a last layer of the server. The server calculates a weighted loss function for the client at the last layer and stores the calculated loss function. After each respective client of a plurality of clients has a respective loss function stored, the server averages the plurality of respective weighted client loss functions and back propagates gradients based on the average loss value from the last layer of the server to the split layer of the server and transmits just the server split layer gradients to the respective clients.
Biometric identification using filters and by secure multipart calculation
The invention is about an identification process of an individual or object, in a system comprising a control server and a management server of a database comprising N indexed data of N stored individuals, in which, to identify the individual or object, its datum is compared to each of the N data of the base. The process comprises steps during which: the control server acquires the datum of the individual or object to be identified, the reference data of the base and the datum of the individual or object to be identified are converted into simplified data of lesser size, a set of p index of simplified data of the base, p being less than N, having the most similarities to the simplified datum of the individual or object to be identified, securely between each of the N simplified data of the database and the simplified datum of the individual or object to be identified, the management server scrambles the N reference data of the database, and transfers to the control server p scrambled data corresponding to the simplified data identified previously, from the p scrambled data the control server determines, by secure multi-party computation between each of the p scrambled data and the datum of the individual or object, the index or the indices of one or more scrambled data whereof the corresponding reference data have a rate of similarity to the datum of the individual or object, which exceeds a predetermined threshold.
SELECTION OF CRYPTOGRAPHIC IDENTIFIERS IN A BLOCK
A method for detecting and tracking tainted cryptographic wallets. The method measures a wallet's propensity to engage in criminal or suspicious activity. Naturally, transacting with a criminal is tantamount either to funding crime or laundering its proceeds, so it is in our collective interest to identify—and then monitor or quarantine—any wallet with criminal association. The method also automatically flags risky withdrawal requests in real-time for further review before committing them to the blockchain. In some embodiments, the exchange can quarantine wallets at a certain AddressScore.
Vehicle information inquiry method
Disclosed is a vehicle information inquiry method including a logging step of acquiring an event ID for sharing anonymized vehicle information and vehicle travel information corresponding to the event ID from an external device, by a central server, a query step of receiving an inquiry about the event ID and the vehicle travel information corresponding to the event ID from an inquiry server, by the central server, and a responding step of transmitting the vehicle travel information corresponding to the event ID received from the inquiry server to the inquiry server, by the central server.
Biometric scanner apparatus and methods for its use
A biometric scanner apparatus comprising a biometric sensor configured to scan at least a biological sample and receive a unique biometric pattern, a secret data extractor configured to receive the unique biometric pattern from the biometric sensor and generate an output comprising a sample-specific secret, and a sample identifier circuit communicatively connected to the secret data extractor wherein the sample identifier circuit is configured to produce at least an output comprising a secure proof of the sample-specific secret.
Preventing statistical inference attacks on data that is shared among multiple stakeholders with disjoint access privileges
According to one embodiment, a method, computer system, and computer program product for preventing statistical inference attacks is provided. The present invention may include splitting records into items, and classifying these items into shared items and private items; grouping the private items according to privacy and confidentiality requirements; restricting access of the private items to stakeholders based on the confidentiality requirements using cryptographic keys; generating and encrypting one or more placeholders for both existent and non-existent stakeholders; storing private items in private storage as indicated by links; creating shared records comprising links, placeholders, and shared items; adding integrity signatures to the shared records; and publishing the shared records to a shared medium.
Authentification method for a communication network
An authentication method for a communication network includes a registration step, an inquiry step, an answering step and a verification step. The authentication method further includes an emergency authentication mode if a response code is not received by a requesting end within a predetermined period of time or if a first confirmation code is verified to be incorrect by a requesting end. In another embodiment, an authentication method for a communication network includes a registration step, a first inquiry step, a second inquiry step, a first answering step, a second answering step and a verification step. The authentication method in the other embodiment also includes an emergency authentication mode if a second response code is not received by the requesting end within a predetermined period of time or if a third tested code is verified to be incorrect.
Private overlay for information networks
A private overlay is provided for information networking that puts the user in charge of the user's personal information. User identity is separated from a numeric tag that points to the cell in which the user equipment can be paged. The private overlay is created by addition of a registration and certification authority such as Public Key Infrastructure and Certification Authority (PKI). The registration and certification authority provides the network and all subscribers with public encryption keys for the network and the users. Private decryption key are generated and stored locally in a suitable manner. With this addition, a private overlay to the existing cellular, wireless or utility distribution infrastructure can be established for a device that has registered with, e.g., a cellular or wireless network or with a utility distribution system.
Detection of Compromised Accounts
Processes and systems described herein enable a computing device to detect compromised accounts. The computing device may obtain a user credential including a user ID, and further modify the user ID. The computing device may transmit the modified user ID to a service including a database related to compromised accounts, receive a record corresponding to the modified user ID that includes information of a compromised account, and further determine whether an account of the user ID is compromised based on the received record.
System for association of customer information across subscribers
The disclosed technology relates to a context service system configured to receive, from a subscriber, a shared customer lookup request that includes a first customer data identifier and identify, in a shared data partition, a second customer data identifier associated with the first customer data identifier. The context service system is further configured to determine that the second customer data identifier is associated with customer information in a subscriber data partition and transmit, to the subscriber system, the customer information from the subscriber data partition.