H04L2209/42

System For Collaboration And Optimization Of Edge Machines Based On Federated Learning
20220138626 · 2022-05-05 ·

A system for collaboration and optimization of edge machines based on federated learning is provided. The system includes R federated learning systems, R≥1, a model parameter assignment unit, and model training and optimizing units. The model parameter assignment unit is configured to assign initial parameters for federated learning to the M.sub.i edge machines, receive intermediate model parameters, and aggregate and update the received intermediate model parameters to obtain new model parameters. The model training and optimizing units are configured to train, on the basis of the initial parameters and respective operating data, local operating models, transmit the intermediate model parameters obtained after training to the model parameter assignment unit, and obtain a system collaborative operating model according to the new model parameters.

OVERLAY FOR COMMUNICATION ANONYMITY AND PRIVACY IN A COMPUTER NETWORK
20230308263 · 2023-09-28 ·

A plurality of nodes connected to the plurality of servers that form a broadcasting overlay over a network for performing best effort broadcasting of data through the broadcasting overlay, may receive, from a first computing device of a plurality of computing devices connected to the broadcasting overlay, a first encrypted message and may perform best effort broadcasting of the first encrypted message through the broadcasting overlay to send, in an end-to-end encrypted manner, the first encrypted message to a first service of a plurality of services. The plurality of nodes may also receive, from the plurality of services, a second encrypted message, and may perform best effort broadcasting of the second encrypted message to propagate the second encrypted message through the broadcasting overlay to send, in the end-to-end encrypted manner, the second encrypted message to a second computing device of the plurality of computing devices.

ANONYMOUS AUTHENTICATION WITH TOKEN REDEMPTION
20230308277 · 2023-09-28 ·

This disclosure relates to a method for anonymous attestation that includes receiving, by an application running on a client device and from a first content provider, an authentication request to authenticate a user to receive content from a second domain of a second content provider, redeeming, with an attestation token issuing system that issued an anonymous attestation token attesting to the user's authentication to the second content provider, the anonymous attestation token by transmitting the anonymous attestation token with a second request, receiving a redemption result representing whether the attestation token was successfully redeemed, signed by the attestation token issuing system using a digital signature and is operable to verify, to the second content provider, that the user is authenticated to the second content provider without identifying the user to the second content provider, and transmitting, to the first content provider, the redemption result.

Face reattachment to brain imaging data

A cloud computing system is described that communicates with a virtual machine to reattach the face of a patient to brain imaging data before the brain imaging data is transmitted for display on a brain navigation system.

Privacy-preserving image distribution

Some embodiments enable distributing data (e.g., recorded video, photographs, recorded audio, etc.) to a plurality of users in a manner which preserves the privacy of the respective users. Some embodiments leverage homomorphic encryption and proxy re-encryption techniques to manipulate the respective data so that selected portions of it are revealed according to an identity of the user currently accessing the respective data.

SYSTEMS AND METHODS FOR VERIFICATION OF PROTECTED PRIVATE INFORMATION
20230298015 · 2023-09-21 ·

Systems and methods for validating information of a user by registering a user private identifier to a registry may generate a user public key and a user private key, the keys together forming a user cryptographic public/private key pair, generate generating a nonce value using a cryptographic random generator, generate the user public identifier, wherein the user public identifier is a hash value generated by applying a cryptographic hash function to: the user public key, the nonce value, and at least one identity trait that the user has previously registered with the registry, sign the user public identifier with the user private key to obtain a signed user public identifier, generate a zero knowledge proof of the at least one identity trait; and transmit to the registry computer system: the user public identifier, the signed user public identifier, the user public key, and the zero knowledge proof.

Techniques for enabling computing devices to identify when they are in proximity to one another
11765585 · 2023-09-19 · ·

The embodiments set forth a technique for securely identifying relevant computing devices that are nearby. The technique can be implemented at a first computing device, and include the steps of (1) receiving, from a second computing device, an advertisement packet that includes: (i) a network address that is associated with the second computing device, and (ii) a hash value that is calculated using the network address and an encryption key that is associated with the second computing device, and (2) for each known encryption key in a plurality of known encryption keys that are accessible to the first computing device: (i) calculating a temporary hash value using the network address and the known encryption key, and (ii) in response to identifying that the temporary hash value and the hash value match: carrying out an operation associated with the second computing device.

Private key security in the cloud
11764977 · 2023-09-19 · ·

Techniques for providing to a user with an anonymous user signature on a message in a distributed decentralized network are presented. The techniques use a hardware security module and a certificate authority. The certificate authority: obtains a credential that includes a certificate for the user, where the certificate includes a user public key and a plurality of user attributes; receives a request for a signature on the message, where the request includes an indication of a subset of the plurality of user attributes to be revealed; accesses from the hardware security module a user secret key; and provides to the user at least the message signed by the user secret key and a zero-knowledge proof that establishes that the message is signed by the user secret key corresponding to the user public key in the credential without revealing the plurality of user attributes.

Automated Event Processing Computing Platform for Handling and Enriching Blockchain Data

Methods and systems for using block chain technology to verify transaction data are described herein. A computing platform may receive data about events related to transactions, personal or corporate information, supply chains, and other relevant information about a person or corporate entity. The event information may be received, aggregated, and processed to determine metadata about the person or corporate entity. The metadata may indicate, for example, a trustworthiness of the person or corporate entity for various purposes. Such event information and/or metadata may be stored as transactions in a block chain that may be accessible by counterparties to a potential transaction involving the person or corporate entity. The automated event processing computing platform may further use automated techniques to implement smart transactions between the person/entity and counterparty based on the trust metadata.

IN-VEHICLE MEDIA CONTENT MONITORING AND REPORT GENERATION

The invention provides a novel and unique system and method for cross channel in-vehicle identification of media, source, and consumption measurement and analysis. Real-time measurement and analysis of all applicable forms of media that a driver or passenger may consume inside of an automobile can be achieved. This includes AM/FM radio, Satellite Digital Audio Radio Service (SDARS), stored media such as CDs, MP3s & DVDs, streaming media, internet radio, audio books, podcasts, text-to-speech content, use of hands-free calling and other forms of audio, including content routed to the In Vehicle Entertainment (IVE) system through integration with a smartphone, media player or similar external Consumer Electronic (CE) device via wired or wireless connectivity, including but not limited to USB, Bluetooth, Wi-Fi, and the like, and also including integration platforms such as APPLE CARPLAY, GOOGLE ANDROID AUTO, HARMAN AHA RADIO, PANASONIC AUPEO, PIONEER ZYPR, FORD SYNC, MIRRORLINK, AIRBIQUITY CHOREO, and the like.