Patent classifications
H04L2209/42
Threat information sharing based on blockchain
Systems and methods provide a platform for threat information sharing. A method comprises transmitting an access permission request to a blockchain network. The request asks for access to cyber threat information stored in at least one cyber threat information storage system. The information may come from a plurality of organizations. The blockchain network may include a blockchain ledger storing access control information from the plurality of organizations. Upon receipt of a reference to an access permission token generated by the blockchain network using at least one smart contract, a transaction request to the cyber threat information server may be sent. In response to the transaction request including the reference to the access permission token, the requested cyber threat information may be retrieved from the cyber threat information server.
Method and system for managing vehicle generated data
A system for collecting and managing vehicle-generated data from multiple vehicles are provided. The vehicle-generated data is pseudonymized by pseudonymized identifiers, and the pseudonymized vehicle-generated data is collected and managed by a neutral data server operated by an operator who is independent of vehicle manufacturers. Vehicle manufacturers can reestablish the link of the pseudonymized event data with the vehicle that had generated the event data and the vehicle driver.
Systems and methods of providing ledger as a service
Described herein are systems and methods for a providing Ledger as a Service (LaaS). Blockchain technology helps bring potential solutions to the distributed ledger problem, with a linear record structure to record transaction history. However, there are different types of blockchain techniques (e.g., Hyperledger, Ethereum, Quorum), and users/developers need to know the explicit features of each technique and align with the required APIs. Ledger as a Service can allow users to an develop applications more efficiently, and can allow users to easily migrate applications among different blockchain techniques and platforms (e.g., between Hyperledger and Ethereum). LaaS can also allow for simplified transactions with a blockchain, and can additionally provide simplified communication between blockchains of different types.
Systems and methods for synchronizing anonymized linked data across multiple queues for secure multiparty computation
Disclosed herein are systems and methods for synchronizing anonymized linked data across multiple queues for SMPC. The systems and methods guarantee that data is kept private from a plurality of nodes, yet can still be synced within a local queue, across the plurality of local queues. In conventional SMPC frameworks, specialised data known as offline data is required to perform key operations, such as multiplication or comparisons. The generation of this offline data is computationally intensive, and thus adds significant overhead to any secure function. The disclosed system and methods aid in the operation of generating and storing offline data before it is required. Furthermore, the disclosed system and methods can help start functions across multi-parties, preventing concurrency issues, and align secure input data to prevent corruption.
Private association of customer information across subscribers
Methods are provided for discovering related attributes with respect to an element in a customer data record, based on provided associations and for generating new associations between various elements of the customer data record. In these method, the context service system obtains, from a subscriber, a lookup request including a first blinded attribute. The first blinded attribute is obtained by applying an oblivious pseudo random function (OPRF) to a first element of a data record. The method further includes the context service system identifying at least one second blinded attribute associated with the first blinded attribute in a shared data partition of the context service system and providing, to the subscriber, at least one second element of the data record associated with the at least one second blinded attribute.
System and method for healthcare security and interoperability
Embodiments facilitate interoperability and secure determination of healthcare costs. An entity may receive a first Electronic Health Record (EHR) sub-block with patient medical coverage information and first treatments and may transmit a first Device Drug Information (DIR) sub-block comprising first treatment classes corresponding to each first treatment, first treatment class members corresponding to each first treatment class, and corresponding first treatment class member cost information. In response, the entity may receive a second EHR sub-block comprising second treatments each: associated with a corresponding first treatment, and selected from corresponding first treatment class members. Upon receipt of a transaction confirmation, the entity may augment a multi-dimensional blockchain with a multi-dimensional block formed by linking: a DIR block including second treatment information, an EHR block including information based on the second EHR sub-block and a transaction block. Payment assistance information determined from the second EHR block may be transmitted to a patient.
Privacy protection in mobile robot
A mobile robot is configured for operation in a commercial or industrial setting, such as an office building or retail store. The mobile robot may include cameras for capturing images and videos and include microphones for capturing audio of its surroundings. To improve privacy by preventing confidential information from being transmitted, the mobile robot may detect text in images and modify the images to make the text illegible before transmitting the images. The mobile robot may also detect human voice in audio and modify audio to make the human voice unintelligible before transmitting the audio.
SUBSCRIPTION CONCEALED IDENTIFIER PRIVACY
A user equipment (“UE”) in a wireless communication network can generate a padded identifier by inserting a padding bitstring in a field of an identifier associated with the UE. The UE can further encrypt the padded identifier to generate a concealed padded identifier. The UE can further transmit the concealed padded identifier to a network node operating in the wireless communication network.
Private Computation of Multi-Touch Attribution
A method comprises receiving an ad event data including data about a plurality of ad events, and including a user ID and an ad ID for each ad event in the ad event data set, where the ad event data set has been anonymized applying a one-way encryption key for each user ID in the ad event data set, and a two-way encryption key for the ad ID in the ad event data set. The attribution processor receives a customer data set including data about a plurality of customers, including a user ID and a customer value for each customer, where the customer data set has been anonymized using the one-way encryption key for each user ID in the data, and a private encryption key for the customer value. Without decrypting the received ad event data set and the received customer data set, the processor then matches ad events for each conversion by comparing the user IDs in the encrypted ad event data set to the user IDs in the encrypted customer data set to create a set of contributing ad events, assigns a share of the customer value to each relevant ad event, sums homomorphically the encrypted customer values for contributing events, and determines a recommendation for serving advertisements.
Privacy data reporting method and apparatus, and storage medium
Embodiments disclose a privacy data reporting method and apparatus, and a storage medium. The method includes: A terminal device obtains to-be-reported data, divides the to-be-reported data into front string data and rear string data based on a preset step, separately scrambles the front string data and the rear string data, and sends the generated privacy data to a server. The server receives privacy data sent by a plurality of terminal devices, determines N pieces of first front string data, then obtains M pieces of to-be-reported data based on a plurality of pieces of privacy data, and finally determines to-be-reported data whose reporting rate is greater than a first preset value as target to-be-reported data. In an exemplary embodiment, the terminal device divides the to-be-reported data into two parts, and separately scrambles the two parts to generate the privacy data.