H04L2209/42

Partition-based prefix preserving anonymization approach for network traces containing IP addresses

A node including processing circuitry configured to: generate anonymized data based at least in part on a first cryptographic key and network data, calculate a coordination vector, generate initialized data based at least in part on the anonymized data, a second cryptographic key and the coordination vector, transmit the initialized data, the random vector, a security policy and instructions to analyze n iterations of the initialized data and the security policy using the random vector and the second cryptographic key, and receive results of the analysis of the n iterations of the initialized data and the security policy using the random vector and the second cryptographic key. The analysis of an m iteration of the n iterations correspond to an analysis of the initialized data with prefix preservation where the analysis of the remaining iterations of the n iterations fail to be prefixed preserved.

Method and apparatus for third-party managed data transference and corroboration via tokenization

A protocol that is managed by a coordinating network element or third-party intermediary or peer network elements and utilizes tokens prohibits any subset of a union of the coordinating network element or third-party intermediary, if any, and a proper subset of the processors involved in token generation from substantively accessing underlying data. By one approach, processors utilize uniquely-held secrets. By one approach, an audit capability involves a plurality of processors. By one approach, the protocol enables data transference and/or corroboration. By one approach, transferred data is hosted independently of the coordinating network element. By one approach, the coordinating network element or third-party intermediary or a second requesting network element is at least partially blinded from access to tokens submitted by a first requesting network element. By one approach, a third-party intermediary uses a single- or consortium-sourced database. By one approach, network elements provisioned with tokens jointly manage the protocol.

User device and electronic device for sharing data based on block chain and homomorphic encryption technology and methods thereof
11316657 · 2022-04-26 · ·

A data sharing method of a user device is provided. The data sharing method includes receiving, from a server device storing information, a private key corresponding to the information, performing a homomorphic encryption of the private key by a homomorphic encryption key provided from the server device, and generating a switch key, and uploading the switch key to a blockchain system. Accordingly, a more effective and clear data sharing is provided.

Methods and systems for enhancing network privacy of multiple party documents on distributed ledger-based networks
11316691 · 2022-04-26 ·

Embodiments of the instant disclosure include methods and systems directed at providing enhanced security and privacy to multiple party communications that occur on zero knowledge proof (ZKP)-enabled distributed ledger-based networks (DLNs). In particular, the methods and systems include subject matter related to the deployment, and approval, of a multi-party document or instrument for consideration and approval by multiple participants of the DLN.

Systems and methods for securing personally identifiable information within telematics data

Systems, methods, and other embodiments described herein relate to securing personally identifiable information associated with riding in a vehicle. In one embodiment, a method includes, in response to receiving, in a mobile device from the vehicle, telematics data about a current trip of the vehicle, securing the telematics data according to at least a mobile cryptographic key associated with the mobile device to provide the telematics data as secured data that is obfuscated. The method includes generating, by the mobile device, a secure packet including at least the secured data and a signature from the vehicle associated with the secured data. The method includes communicating, by the mobile device, the secure packet to a remote computing device to cause the remote computing device to securely store the secured data without identifying a user associated with the mobile device.

Clinical infrastructure with features for the prevention of egress of private information

DICOM data is automatically prepared for transit outside of the clinical-data infrastructure, by examining a plurality of metadata fields in the corresponding metadata in the DICOM data; identifying a first subset of the metadata fields as containing private information; identifying a second subset of the metadata fields as private-information free; accessing at least some of the plurality of layers of the DICOM data; and transforming the accessed layers into a single transmission-image, the transmission-image being in a format i) other than DICOM and ii) that stores the second subset of the metadata fields as transmission-metadata in a scheme that is non-redundant for a given transmission-image.

SYSTEMS AND METHODS AUTHENTICATING A DIGITALLY SIGNED ASSERTION USING VERIFIED EVALUATORS
20220123948 · 2022-04-21 · ·

A system for authenticating a requesting device using verified evaluators includes an authenticating device. The authenticating device is designed and configured to receive at least a first digitally signed assertion from a requesting device, the at least a first digitally signed assertion linked to at least a verification datum, evaluate at least a second digitally signed assertion, signed by at least a cryptographic evaluator, conferring a credential to the requesting device, validate the credential, as a function of the at least a second digitally signed assertion, and authenticate the requesting device based on the credential.

SECURE COMPUTING HARDWARE APPARATUS

A secure computing hardware apparatus includes at least a secret generator module, the at least a secret generator module configured to generate a module-specific secret, and a device identifier circuit communicatively connected to the at least a secret generator, the device identifier circuit configured to produce at least an output comprising a secure proof of the module-specific secret. Secret generator module may implement one or more physically unclonable functions to generate the module-specific secret.

SYSTEMS AND METHODS FOR ENABLING TWO PARTIES TO FIND AN INTERSECTION BETWEEN PRIVATE DATA SETS WITHOUT LEARNING ANYTHING OTHER THAN THE INTERSECTION OF THE DATASETS
20230244650 · 2023-08-03 ·

A system and method are disclosed for comparing private sets of data. The method includes encoding first elements of a first data set such that each element of the first data set is assigned a respective number in a first table, encoding second elements of a second data set such that each element of the second data set is assigned a respective number in a second table, applying a private compare function to compute an equality of each row of the first table and the second table to yield an analysis and, based on the analysis, generating a unique index of similar elements between the first data set and the second data set.

EFFICIENTLY DEBUGGING A PROGRAM IN HOMOMORPHICALLY ENCRYPTED SPACE
20220121552 · 2022-04-21 · ·

A device, system and method for debugging a homomorphically encrypted (HE) program. The HE program comprising real ciphertext data and encrypted operations in the HE space (production mode) may be mapped to an equivalent plaintext program comprising equivalent pseudo-ciphertext data and pseudo-encrypted operations in the unencrypted space (simulation mode). The plaintext program may be executed in a first full pass in simulation model and a sampling of the HE program may be executed in a second partial pass in production mode, the results of which are compared. The HE program and/or mapping may be validated if the results of simulation and production mode match and debugged if the results do not match. An integrated development environment (IDE) may switch among the HE space (production mode), the unencrypted space (simulation mode), and a combination of both HE and unencrypted spaces simultaneously (simultaneous production-simulation mode).