Patent classifications
H04L2209/42
SYSTEM AND METHOD FOR PROVIDING ANONYMOUS VALIDATION OF A QUERY AMONG A PLURALITY OF NODES IN A NETWORK
A system and method for providing anonymous validation of a query among a plurality of nodes in a network may receive at a support node a query from a requester node; wherein the query comprises a one-way function representation of at least one data point of information of the requester node; receive at the support server, from at least one validator node, a one-way function representation of at least one data point of information of the validator node; compare by the support server the query from the requestor node with the one-way function representation of the at least one data point of information; determine by an aggregator server, based on the comparison, whether the at least one data point of information of the requester node matches the at least one data point of information of the at least one validator node; and output a match result to the requestor node.
Unsubscribe and Delete Automation
Methods, computer-readable media, software, and apparatuses may assist a consumer in deleting personal information held by a data broker. Entities holding the consumer's personal information may be discovered and automated actions for purging or deleting the consumer's personal information may be determined. The methods, computer-readable media, software, and apparatuses may assist the consumer in updating privacy settings associated with accounts at various entities.
Systems and Methods for Countering Co-Existence Attack
Embodiments described herein provide systems and methods to prevent, or provide a countermeasure, to a co-existence attack, for example, that may occur in a Security Credential Management System (SCMS) where both regular butterfly key (RBK) protocol and unified butterfly key (UBK) protocol are supported. Embodiments described herein provide, support, employ, or implement hardware acceleration for a Hardware Security Module (HSM), for example, for cryptographic operations (e.g., block ciphers, digital signature schemes, and key exchange protocols).
Communication device, server device, concealed communication system, methods for the same, and program
A communication device includes a signature encryption unit that encrypts input information with a secret key and transmits the information to a server device if the communication device belongs to a group, and a signature decryption unit that downloads, from the server device, encrypted n−1 pieces of the input information transmitted from other communication devices and decrypts the encrypted n−1 pieces of input information with the secret key if the communication device belongs to a group. The communication device transmits session key generation information to the server device via the signature encryption unit, generates a session key using n−1 pieces of session key generation information acquired via the signature decryption unit and session key generation information of the communication device, transmits a cipher text encrypted with the session key via the signature encryption unit to the server device, and decrypts n−1 cipher texts acquired via the signature decryption unit with the session key.
Integrity of communications between blockchain networks and external data sources
Methods, systems, and apparatus, including computer programs encoded on computer storage media, for enhancing blockchain network security. Embodiments include generating a request for data from a data source, the request including plaintext data and encrypted data, the encrypted data including access data and a hash of the plaintext data, transmitting the request to a relay system component external to the blockchain network, receiving a result from the relay system component that is digitally signed using a private key of the relay system component, and verifying an integrity of the result based on a public key of the relay system component and a digital signature of the result.
SELECTIVE REPLACEMENT OF INFORMATION WITHIN COMMUNICATION METADATA
Described herein are techniques that provide privacy protection for a user by preventing user device tracking via device fingerprints. A communication may be received from a user device that includes metadata having information related to the user device. An intended recipient of the communication may be identified. Based on one or more of the user device or the recipient, a determination may be made as to what data within the metadata should be scrambled or selectively replaced. The data may then be overwritten with alternative data that may be selected at random, and the communication is forwarded to the recipient.
INFORMATION PROCESSING DEVICE, MOBILE DEVICE, INFORMATION PROCESSING SYSTEM, METHOD, AND PROGRAM
Individually-identifiable data included in observation information of a driver or the like of a vehicle or data for which recording processing is not permitted in a personal information protection regulation is abstracted or encrypted and recorded. A driver information acquisition unit that acquires the observation information of the driver of the vehicle and a data processing unit that inputs the observation information and executes data processing are included. The data processing unit divides the observation information into conversion unnecessary data and conversion necessary data, executes abstraction processing or encryption processing for the conversion necessary data, and stores conversion data such as abstraction data or encryption data in a storage unit. The data processing unit executes the abstraction processing or the encryption processing for the individually-identifiable data included in the observation information or the data for which recording processing is not permitted in the personal information protection regulation as the conversion necessary data.
System and method for de-anonymizing actions and messages on networks
A traffic-monitoring system that monitors encrypted traffic exchanged between IP addresses used by devices and a network, and further receives the user-action details that are passed over the network. By correlating between the times at which the encrypted traffic is exchanged and the times at which the user-action details are received, the system associates the user-action details with the IP addresses. In particular, for each action specified in the user-action details, the system identifies one or more IP addresses that may be the source of the action. Based on the IP addresses, the system may identify one or more users who may have performed the action. The system may correlate between the respective action-times of the encrypted actions and the respective approximate action-times of the indicated actions. The system may hypothesize that the indicated action may correspond to one of the encrypted actions having these action-times.
Tokenized encryption system for preserving anonymity while collecting behavioral data in networked systems
The present disclosure is generally directed to systems and methods for providing privacy to a user of a user device that is used for interacting with a networked software platform. A server computer coupled to the user device receives a hashed device ID of the device and generates a unique user ID in the form of a unique number. The user ID can be used by the server and other entities to gather information related to the activities of the user with respect to the networked software platform, which can be, for example, a video game platform, a social media platform, or a health-related diagnostic tool. The identity of the user remains anonymous during the information gathering procedures because neither the device ID nor the identity of the user is transmitted over the network when the user is participating in activities of the networked software platform.
Method and system for handling dynamic cybersecurity posture of a V2X entity
A method at a network element, the method including receiving at least one message at the network element, the at least one message being one or both of: an update status information message from an updates server; and an anomaly detection status information message from anomaly detection server; determining, based on the receiving the at least one message, a dynamic cybersecurity posture indication for an intelligent transportation system entity; and providing the dynamic cybersecurity posture indication for the intelligent transportation system entity to an Enrolment Authority, wherein the dynamic cybersecurity posture indication can be included in a certificate relating to the intelligent transportation system entity.