H04L2209/42

METHOD AND SYSTEM FOR HANDLING DYNAMIC CYBERSECURITY POSTURE OF A V2X ENTITY

A method at a network element, the method including receiving at least one message at the network element, the at least one message being one or both of: an update status information message from an updates server; and an anomaly detection status information message from anomaly detection server; determining, based on the receiving the at least one message, a dynamic cybersecurity posture indication for an intelligent transportation system entity; and providing the dynamic cybersecurity posture indication for the intelligent transportation system entity to an Enrolment Authority, wherein the dynamic cybersecurity posture indication can be included in a certificate relating to the intelligent transportation system entity.

PRIVATE SHARED RESOURCE CONFIRMATIONS ON BLOCKCHAIN
20210342332 · 2021-11-04 ·

A processor may identify one or more transaction verification requests from one or more entities. The processor may convert each of the one or more transaction verification requests into respective hashed transaction verification requests. The processor may send, on one or more private, anonymous channels, the hashed transaction verifications to an orchestrator. The processor my decrypt the hashed transaction verifications with the orchestrator. The processor may determine whether information in each of the one or more transaction verification requests matches.

Concealment device, data analysis device, and computer readable medium

A random-number generation unit generates a plurality of random numbers from a plurality of seeds. A data scrambling unit conceals concealment target data which is a concealment target by using the plurality of random numbers generated by the random-number generation unit. A transmission unit transmits concealed data which is the concealment target data concealed by the data scrambling unit to a data analysis device, and transmits any seed among the plurality of seeds to the data analysis device, after transmission of the concealed data to the data analysis device.

Systems and methods for a butterfly key exchange program

Embodiments described herein provide an implicit protocol with improved resource and bandwidth efficiency. A post-quantum secure approach for issuing multiple pseudonym certificates from a small piece of information is provided, while traditionally most encryption schemes are vulnerable to post-quantum attacks (e.g., in a traditional SCMS). Long-term security can be improved with the post-quantum protocol.

DIGITAL WATERMARKING WITHOUT SIGNIFICANT INFORMATION LOSS IN ANONYMIZED DATASETS
20230334179 · 2023-10-19 ·

A computer-implemented process of altering original data in a dataset, in which original data is anonymised and a digital watermark is included in the anonymised data. Anonymising the original data incurs information loss, and the process of including the digital watermark does not add significant further information loss. The original data can be a tabular file, a relational or a non-relational database, or the results of interactive database queries. Anonymising the data is achieved using one or more techniques that perturb the original data, such as tokenisation, generalisation; data blurring, synthetic record insertion, record removal or re-ordering.

Systems and methods for communication, storage and processing of data provided by an entity over a blockchain net work

A computer-implemented method for submitting feedback for an entity to a blockchain is disclosed. The method, which is implemented at one of a plurality of participating nodes, includes: obtaining a first key, the first key being one of a fixed set of keys distributed to participating nodes that are eligible to submit feedback for the entity; generating first feedback (r.sub.j) of the entity for submission to the blockchain; encrypting the first feedback (r.sub.j) using at least the first key; and submitting the encrypted first feedback to a mixing service, the mixing service being configured to generate a mixed transaction based on the encrypted first feedback and at least one other encrypted feedback submission from one or more eligible participating nodes.

Method and device for anonymous access control to a collaborative anonymization platform

A device and a method implemented by computer for authorizing, to a user having access rights granted by a first operator, a completely anonymous and secure access, with no trusted third-party, to a collaborative anonymization platform and/or to a service requiring privacy properties based on such a platform operated by various operators.

Apparatus and method for recommending user privacy control

Disclosed herein are an apparatus and method for recommending privacy control. A privacy control server includes multiple common privacy control recommendation models learned based on personal information provision histories of multiple users, a user preference determination unit for generating at least one question item based on the multiple common privacy control recommendation models and determining a privacy control preference of a user based on a result of a user answer to the at least one question item, and a common privacy control recommendation model provision unit for providing a common privacy control recommendation model selected to match the privacy control preference of the user to the user.

Systems and methods to provide information and services to authorized users
11757863 · 2023-09-12 · ·

Systems and methods are provided to authorize users to anonymously access resources of different web sites. For example, a business listing service may authenticate users and allow the authenticated users to access the resources of the businesses listed via the business listing service, without the users having to create separate accounts with the businesses and without having to reveal the identities of the users to the businesses.

SYSTEMS AND METHODS FOR PRIVACY-ENABLED BIOMETRIC PROCESSING
20230283476 · 2023-09-07 · ·

A set of distance measurable encrypted feature vectors can be derived from any biometric data and/or physical or logical user behavioral data, and then using an associated deep neural network (“DNN”) on the output (i.e., biometric feature vector and/or behavioral feature vectors, etc.) an authentication system can determine matches or execute searches on encrypted data. Behavioral or biometric encrypted feature vectors can be stored and/or used in conjunction with respective classifications, or in subsequent comparisons without fear of compromising the original data. In various embodiments, the original behavioral and/or biometric data is discarded responsive to generating the encrypted vectors. In another embodiment, distance measurable or homomorphic encryption enables computations and comparisons on cypher-text without decryption of the encrypted feature vectors. Security of such privacy enabled embeddings can be increased by implementing an assurance factor (e.g., liveness) to establish a submitted credential has not been spoofed or faked.