H04L2209/42

TECHNIQUES FOR ENABLING COMPUTING DEVICES TO IDENTIFY WHEN THEY ARE IN PROXIMITY TO ONE ANOTHER
20220007188 · 2022-01-06 ·

The embodiments set forth a technique for securely identifying relevant computing devices that are nearby. The technique can be implemented at a first computing device, and include the steps of (1) receiving, from a second computing device, an advertisement packet that includes: (i) a network address that is associated with the second computing device, and (ii) a hash value that is calculated using the network address and an encryption key that is associated with the second computing device, and (2) for each known encryption key in a plurality of known encryption keys that are accessible to the first computing device: (i) calculating a temporary hash value using the network address and the known encryption key, and (ii) in response to identifying that the temporary hash value and the hash value match: carrying out an operation associated with the second computing device.

ANONYMOUS SERVICE ACCESS

A method of operating a service provider server and a computing device to provide anonymous service access. For the service provider server, the method comprises: receiving a service message from a computing device; and determining whether to send a service response message, and if so sending a service response message. The service message includes a pseudonym associated with the computing device, service data and a signature on the pseudonym generated by either the service provider server or an identity manager. The service response message is broadcast by the service provider server or transmitted to the identity manager.

CONTACT TRACING AMONG WORKERS AND EMPLOYEES

A method may include collecting from each of multiple endpoint devices a set of anonymized interactions of the corresponding endpoint device with other endpoint devices. Each anonymized interaction in the set of anonymized interactions may be based on an ephemeral unique identifier of another endpoint device involved in a corresponding anonymized interaction with the corresponding endpoint device. The method may include, for each endpoint device, resolving identities of the other endpoint devices with which the corresponding endpoint device has interacted from the corresponding set of anonymized interactions.

BLOCKCHAIN ARCHITECTURE, SYSTEM, METHOD AND DEVICE FOR FACILITATING SECURE MEDICAL TESTING, DATA COLLECTION AND CONTROLLED DISTRIBUTION USING A DECENTRALIZED HEALTH INFORMATION PLATFORM AND TOKEN ECOSYSTEM
20210350887 · 2021-11-11 ·

A distributed transaction and data storage platform including a distributed notary ledger or blockchain and one or more individual user micro-identifier chains that together enable the secure effectuation and recordation of one or more transactions, and/or storage of data in an automated, real-time, zero-trust, globally data law and privacy law centric manner while maintaining transaction party confidentiality and preventing chain poisoning.

UNSUBSCRIBE AND DELETE AUTOMATION

Methods, computer-readable media, software, and apparatuses may assist a consumer in deleting personal information held by a data broker Entities holding the consumer's personal information may be discovered and automated actions for purging or deleting the consumer's personal information may be determined. The methods, computer-readable media, software, and apparatuses may assist the consumer in updating privacy settings associated with accounts at various entities.

GEOSPATIAL-TEMPORAL PATHOGEN TRACING IN ZERO KNOWLEDGE

Techniques for geospatial-temporal pathogen tracing in zero knowledge include: generating, by a first user device, a first proximity token for contact tracing; receiving, by the first user device, a second proximity token from a second user device; generating, by the first user device, a hash based on the first proximity token and the second proximity token; generating, by the first user device using a prover function of a preprocessing zero knowledge succinct non-interactive argument of knowledge (pp-zk-SNARK), a cryptographic proof attesting that an individual associated with the first user device tested positive for a pathogen; transmitting, by the first user device, first publicly verifiable exposure data including at least the cryptographic proof and the hash to a public registry; and applying at least the first publicly verifiable exposure data and second publicly verifiable exposure data to a machine learning model, to obtain actionable intelligence associated with the pathogen.

FACE REATTACHMENT TO BRAIN IMAGING DATA

A cloud computing system is described that communicates with a virtual machine to reattach the face of a patient to brain imaging data before the brain imaging data is transmitted for display on a brain navigation system.

PRIVACY PRESERVING ARCHITECTURE FOR PERMISSIONED BLOCKCHAINS

A processor may generate a request associated with a transaction. The processor may collect an anchor associated with the request. The processor may transition the transaction into a collection of two or more hashes. The processor may submit the transaction to an ordering service.

A processor may receive a request associated with a transaction. The processor may identify that a first preimage associated with a first hash is known to a first shard. The processor may generate a first identification tag associated with the transaction.

A processor may receive a request associated with a transaction. The processor may assign a first shard a first task. The processor may identify that a first preimage associated with a first hash is known to the first shard. The processor may perform the task.

Method and system for media, advertising and/or in vehicle content monitoring

A method for reporting in vehicle media consumption and user interaction with a vehicle. The method including receiving raw data of media and vehicle usage of a vehicle by a platform device, the platform device including storage, operation controls, a microprocessor, a memory component, I/O inputs and outputs and an operating system installed and running thereon; processing the raw data to remove at least one obfuscation function to anonymize at least a portion of a personally identifiable information; and producing a report with the processed raw data relating to the user interaction vehicle and the media content.

Information security using blockchains
11170128 · 2021-11-09 · ·

A network device that includes a memory operable to store a set of anonymization rules and a distributed ledger comprising information for a private blockchain and a semi-private blockchain associated with the user. The network device further includes an information security engine implemented by a processor. The information security engine is configured to receive data from one or more user devices and to store the data in the private blockchain. The information security engine is further configured to determine a data classification type for the data, to determine to anonymize the data based on the data classification type, to anonymize the data in accordance with the set of anonymization rules, and to store the anonymized data in the semi-private blockchain.