Patent classifications
H04L2209/42
PRIVACY ENHANCED PROXIMITY TRACKER
A device, system and method for privacy enhanced proximity detection by secure collaboration between a first party without access to user locations and a second party without access to a target user identifier. The second party may receive from the first party a homomorphic encryption public key and homomorphic encrypted target user identifier or masked target location, and may determine an associated homomorphic encrypted target user location. The second party may search a homomorphically encrypt database of user locations and associated user identifiers for homomorphic encrypted proximate user identifiers associated with homomorphic encrypted user locations proximate to the homomorphic encrypted target user location. The second party may send the first user the search result of homomorphic encrypted proximate user identifiers to be decrypted by the first party with a private key to identify proximate user identifiers without knowing their locations.
Blockchain-based verifiable inter-domain routing validation method
The disclosure disclosures a blockchain-based verifiable inter-domain routing validation method, which includes: constructing a blockchain-based verifiable inter-domain routing system consisting of a verifiable inter-domain routing and a routing behavior validation subsystem; constructing, by a sender router R1, a routing behavior validation terminal of an autonomous domain to which the R1 belongs, and the routing validation blockchain system, a routing evidence and a routing evidence validation proposal, validating and endorsing the proposal, determining whether the proposal satisfies an endorsement policy, generating a routing evidence transaction, conducting consensus ordering on the transaction and updating a routing validation blockchain; and constructing, by a receiver router T, a routing behavior validation terminal of an autonomous domain to which the T belongs, and the routing validation blockchain system, a routing request validation message and retrieving whether a routing evidence corresponding to the routing request exists.
INVOICE ACCESS METHOD AND APPARATUS BASED ON BLOCKCHAIN, AND ELECTRONIC DEVICE
One or more implementations of the present specification provide an invoice access method and apparatus based on a blockchain, and an electronic device. The method includes: receiving an access request initiated by an access user for a target invoice by using a client, the target invoice being encrypted and stored in the blockchain; determining, in response to the access request, whether the access user has an authority to access the target invoice; and in response to that the access user has the authority to access the target invoice, invoking decryption logic provided in a predetermined smart contract to decrypt ciphertext data of the target invoice stored in the blockchain, and returning decrypted plaintext data of the target invoice to the client.
CLINICAL INFRASTRUCTURE WITH FEATURES FOR THE PREVENTION OF EGRESS OF PRIVATE INFORMATION
DICOM data is automatically prepared for transit outside of the clinical-data infrastructure, by examining a plurality of metadata fields in the corresponding metadata in the DICOM data; identifying a first subset of the metadata fields as containing private information; identifying a second subset of the metadata fields as private-information free; accessing at least some of the plurality of layers of the DICOM data; and transforming the accessed layers into a single transmission-image, the transmission-image being in a format i) other than DICOM and ii) that stores the second subset of the metadata fields as transmission-metadata in a scheme that is non-redundant for a given transmission-image.
Sensitive Data Evaluation
Evaluating risk of sensitive data associated with a target data set includes a computer system receiving a pattern that defines sensitive data and a selection of a data set as the target data set for evaluating. The system determines portions of the target data set from which to select sample data sets and determines, responsive to a confidence limit and sizes of the respective portions of the target data, a size of a sample data set for each respective target data set portion. The system randomly samples the target data set portions to provide sample data sets of the determined sample data set sizes and determines whether there is an occurrence of the sensitive data in each sample data set by searching for the pattern in the sample data sets. The system determines a proportion of the sample data sets that have the occurrence of the sensitive data.
DECENTRALIZED CONSENT NETWORK FOR DECOUPLING THE STORAGE OF PERSONALLY IDENTIFIABLE USER DATA FROM USER PROFILING DATA
A computer implemented method for tracking and securing user data, the method including providing a user data vault that stores user data, providing the user data to display on a user interface, collecting access rights and permission settings, storing the access rights on a blockchain consent network, and providing access to remote users. The system and methods utilize blockchain technology, encryption, and a novel data structure (e.g. consent tokens) that enhance the security, transparency, and user experience regarding user data collection.
DATA EXCHANGE FOR MACHINE LEARNING SYSTEM AND METHOD
A data exchange system includes a first computer processor environment configured to accept a dataset from a client user. The first computer processor environment includes an exchange interface for receiving input from a user. The data exchange system also includes a second computer processor environment configured to run at least partially trained neural network software that has been trained to perform scoring of the dataset. The second computer processor environment is configured to receive the dataset from the first computer processor environment. The data exchange system further includes a third computer processor environment configured to receive the dataset. The third computer processor environment provides user useable output through a GUI running on the third computer processor environment.
Blockchain-based trustable guarantees
A method includes receiving a cyphertext of a digital document specifying a guarantee and one or more zero-knowledge proofs (ZKPs) related to a value associated with the guarantee; verifying the one or more ZKPs; upon successfully verifying the one or more ZKPs, storing the cyphertext to a blockchain based on performing a consensus algorithm; receiving a first message from a first computing device associated with the beneficiary or a representative of the beneficiary indicating there is no outstanding claim for the guarantee; sending a second message to a second computing device associated with a guarantor to confirm that the guarantor is discharged from undertaking payment under the guarantee; receiving a third message from the second computing device associated with the guarantor requesting the status of the guarantee to be changed to expired; and updating the status of the guarantee stored in the blockchain to indicate that the guarantee has expired.
METHOD AND SYSTEM OF PROVIDING PERSONAL INFORMATION BASED ON BLOCKCHAIN
Provided are a method and system of providing personal information on the basis of a blockchain. The blockchain-based personal information providing method includes making a data privacy-related contract with a user and providing user data, which corresponds to personal information of the user according to the data privacy-related contract, to a service for accessing the user data using a contract with the service.
RADIO FREQUENCY COMMUNICATIONS DETECTION FOR SUBSCRIBER ACCESS CONTROL
A radio frequency (RF) communication that is transmitted by a subscriber device to a base station of a wireless carrier network on a corresponding allocated communication frequency of the wireless carrier network is monitored. A device identifier of the subscriber device is extracted from the RF communication and sent to a core network of the wireless carrier network for an indication of whether a subscriber associated with the subscriber device is eligible to access a resource. In response to receiving a notification from the core network that the subscriber is eligible to access the resource, whether the subscriber device with the device identifier is permitted to access the resource is determined based at least on device access information stored in an access control database of the device. The subscriber device is granted access when the device access information indicates that the subscriber device is permitted to access the resource.