Patent classifications
H04L2209/42
SYSTEMS AND METHODS FOR SYNCHRONIZING ANONYMIZED LINKED DATA ACROSS MULTIPLE QUEUES FOR SECURE MULTIPARTY COMPUTATION
Disclosed herein are systems and methods for synchronizing anonymized linked data across multiple queues for SMPC. The systems and methods guarantee that data is kept private from a plurality of nodes, yet can still be synced within a local queue, across the plurality of local queues. In conventional SMPC frameworks, specialised data known as offline data is required to perform key operations, such as multiplication or comparisons. The generation of this offline data is computationally intensive, and thus adds significant overhead to any secure function. The disclosed system and methods aid in the operation of generating and storing offline data before it is required. Furthermore, the disclosed system and methods can help start functions across multi-parties, preventing concurrency issues, and align secure input data to prevent corruption.
DISTRIBUTED-LEDGER BASED DISTRIBUTED TRANSACTION PROCESSING AS A BROKERED SERVICE
Systems and methods for distributed ledger based distributed transaction processing as a brokered service are disclosed. In one embodiment, a method for generating a plurality of user transaction profiles may include: (1) receiving, at a computer program for a trusted entity, a transaction involving an account for a user; (2) retrieving, by the computer program, transaction profile information for the user, the transaction profile specifying a plurality of transaction profiles for the user, each transaction profile having a different anonymity level; and (3) writing, by the computer program and on a distributed ledger, the transaction to each transaction profile at the anonymity level for the transaction profile. The transaction profiles on the distributed ledger are linked to each other.
SECURE DATA STORAGE FOR ANONYMIZED CONTACT TRACING
Disclosed are various embodiments for securely storing data while an application is executing in a background state. An application can receive a message containing data, wherein the message is received by the application while the application is executing in a background state. The application can then encrypt the data in the message using a public key accessible to the application to generate encrypted data. Next, the application can store the encrypted data in an alternate data store. Subsequently, the application can authenticate a user of the computing device and switch execution to the foreground in response. Then, the application can decrypt a secure data store using an application specific encryption key. Next, the application can decrypt the encrypted data using a respective private key for the public key to generate decrypted data. The application can then store the decrypted data in the decrypted secure data store.
Privacy-Preserving Image Distribution
Some embodiments enable distributing data (e.g., recorded video, photographs, recorded audio, etc.) to a plurality of users in a manner which preserves the privacy of the respective users. Some embodiments leverage homomorphic encryption and proxy re-encryption techniques to manipulate the respective data so that selected portions of it are revealed according to an identity of the user currently accessing the respective data.
BLOCKCHAIN ARCHITECTURE, SYSTEM, METHOD AND DEVICE INCLUDING A HYBRID PUBLIC-PRIVATE ITERATION FOR FACILITATING SECURE DATA COLLECTION AND CONTROLLED DISTRIBUTION USING A DECENTRALIZED TRANSACTION INFORMATION PLATFORM AND TOKEN ECOSYSTEM
A distributed transaction and data storage platform including a distributed notary ledger or blockchain and one or more individual user micro-identifier chains that together enable the secure effectuation and recordation of one or more transactions, and/or storage of data in an automated, real-time, zero-trust, globally data law and privacy law centric manner while maintaining transaction party confidentiality and preventing chain poisoning.
Cryptography method and system for securing data via electronic transmission
A blockchain-based record of transactions taking place through a smartphone or other electronic/peripheral device. The blockchain record itself contains mathematical hashes, including encryption if desired, based on the various data components of a smartphone or other device, which creates a distributed ledger system that is extremely difficult to break into to add, delete, or alter individual transactions after the fact.
Privacy-preserving anomalous behavior detection
An example operation may include one or more of storing a tree structure via a blockchain storage, the tree structure comprising anonymous behavior data of a plurality of blockchain participants stored in a plurality of nodes in a hierarchical structure, receiving a request to add new anonymous behavior data to the tree structure, the request comprising a zero-knowledge proof generated by a blockchain participant, identifying an active leaf on the tree structure which stores previously recorded anonymous behavior data of the blockchain participant associated with the request based on the zero-knowledge proof, generating a new active leaf for the blockchain participant based on the new anonymous behavior data and the previously recorded anonymous behavior, and storing the new active leaf as a leaf node on the tree structure in the blockchain storage.
Blockchain-based transaction processing
This disclosure relates to blockchain-based transaction processing. In one aspect, a method includes obtaining pieces of transaction data. At least a portion of the pieces of transaction data have a respective group identifier that identifies a node group for the piece of transaction data. Each node group includes multiple blockchain nodes. Pieces of transaction data that have a same first group identifier that identifies a first node group are identified in the obtained pieces of transaction data. The pieces of transaction data are packaged into a first packaging result based on the pieces of transaction data having the same first group identifier. The first packaging result is submitted to a blockchain for storage.
Ultrasound assisted device activation
An onboarding server uses an ultrasound token to securely onboard a new device to an organizational structure. The onboarding server obtains a registration from the new device and provides the new device with an ultrasound token. The onboarding server also obtains a notification from a user device that detected the ultrasound token broadcast from the new device. The onboarding server determines a device identity for the new device and provides cryptographic information to the new device. The cryptographic information enables the new device to connect to an organizational structure with the device identity.
INTEGRITY OF COMMUNICATIONS BETWEEN BLOCKCHAIN NETWORKS AND EXTERNAL DATA SOURCES
Methods, systems, and apparatus, including computer programs encoded on computer storage media, for enhancing blockchain network security. Embodiments include generating a request for data from a data source, the request including plaintext data and encrypted data, the encrypted data including access data and a hash of the plaintext data, transmitting the request to a relay system component external to the blockchain network, receiving a result from the relay system component that is digitally signed using a private key of the relay system component, and verifying an integrity of the result based on a public key of the relay system component and a digital signature of the result.