H04L2209/42

Privacy preserving transactions with probabilistic transaction fees

An example operation may include one or more of receiving transaction parameters for a blockchain transaction into a transaction wallet interface of a transaction wallet of a sender, the transaction parameters comprising a transaction amount and an intended recipient address. The example operation may include generating a blockchain transaction that specifies the transaction amount and a single recipient address selected from the intended recipient address and a mining pool address of a mining pool, and providing the generated blockchain transaction to the mining pool.

System, method, and computer program product for maintaining user privacy in advertisement networks

A method for maintaining user privacy in advertisement networks may include receiving first persona data associated with a first user from at least one publisher system. The first persona data may be generalized to form first generalized persona data. A session key may be generated. The first generalized persona data and the session key may be encrypted with a first public key of an advertisement network system to form a first ciphertext. The first ciphertext and first user identity data may be communicated to a mediator system. The first user identity data may be associated with the first user's identity. A first encrypted targeted advertisement may be received based on the first generalized persona data from the advertisement network system via the mediator system. The first encrypted targeted advertisement may be decrypted with the session key to form a first targeted advertisement. A system and computer program product are also disclosed.

Method for improving the utilization rate of a vehicle-to-X communication device and vehicle-to-X communication device

A method for improving the utilization rate of a vehicle-to-X communication device for vehicle-to-X communication, having the steps: receipt of digital certificates by the vehicle-to-X communication device, generation of cryptographic keys for signing vehicle-to-X messages to be emitted using the digital certificates by an electronic computing apparatus, temporal spacing of the receipt of the digital certificates by the vehicle-to-X communication device, and generation of the cryptographic keys using the digital certificates. Furthermore, a vehicle-to-X communication device and use of the device in a vehicle or an infrastructure apparatus is provided.

METHOD AND SYSTEM FOR OPTIMIZING TRANSACTION FLOW FOR BLOCKCHAIN MINING AND CONFIRMATION

A method for confirming a blockchain transaction utilizing output from a transaction still waiting inclusion in a blockchain includes: storing, in a node of a blockchain network, a plurality of waiting blockchain transactions not included in a blockchain associated with the blockchain network; receiving a new blockchain transaction including a transaction amount, destination address, digital signature, and an unspent transaction output, where the unspent transaction output is a reference to one waiting blockchain transactions; validating the new blockchain transaction including confirmation of the one of the waiting blockchain transactions; generating a new block including a block header and a plurality of blockchain data entries including at least the new blockchain transaction and the one of the waiting blockchain transactions; and transmitting the generated new block to a plurality of additional nodes in the blockchain network for confirmation.

Secure, multi-level access to obfuscated data for analytics

In a computer-implemented method for providing obfuscated data to users, first, a user request to access data is received; then, an authorization level associated with the request received is identified. Next, obfuscated data is accessed in a protected enclave, which data corresponds to the request received. The data accessed has been obfuscated with an obfuscation algorithm that yields a level of obfuscation compatible with the authorization level identified. Finally, the obfuscated data accessed is provided to the user, from the protected enclave. Related systems and computer program products are also disclosed.

PROCESSING PERSONALLY IDENTIFIABLE INFORMATION FROM SEPARATE SOURCES
20220239469 · 2022-07-28 · ·

A method for data security including receiving, at a server, a record, said record including at least one field for storing personally identifiable information (PII) and querying a structured data store for key information associated with the PII. Then replacing the PII with the key information, altering the key information by combining it with a unique pre-determined modifier, and storing the record wherein the PII includes at least one of a name, social security number, telephone number or address. In some embodiments the key information is numeric and altering includes either adding or subtracting the key information to the unique modifier.

System and method for providing anonymous validation of a query among a plurality of nodes in a network
11379616 · 2022-07-05 · ·

A system and method for providing anonymous validation of a query among a plurality of nodes in a network: receives at a support node a query from a requester node; wherein the query comprises a one-way function representation of at least one data point of information of the requester node; receives at the support server, from at least one validator node, a one-way function representation of at least one data point of information of the validator node; compares by the support server the query from the requestor node with the one-way function representation of the at least one data point of information; determines by an aggregator server, based on the comparison, whether the at least one data point of information of the requester node matches the at least one data point of information of the at least one validator node; and outputs a match result to the requestor node.

Selective replacement of information within communication metadata
11379620 · 2022-07-05 · ·

Described herein are techniques that provide privacy protection for a user by preventing user device tracking via device fingerprints. A communication may be received from a user device that includes metadata having information related to the user device. An intended recipient of the communication may be identified. Based on one or more of the user device or the recipient, a determination may be made as to what data within the metadata should be scrambled or selectively replaced. The data may then be overwritten with alternative data that may be selected at random, and the communication is forwarded to the recipient.

Systems and methods for securing access rights to resources using cryptography and the blockchain
11387978 · 2022-07-12 · ·

The present disclosure generally relates to securing access to resource and access rights using cryptography and the blockchain. Certain embodiments of the present disclosure generally relate to systems and methods that enhance the security of resource access using hierarchical deterministic (HD) cryptography and the blockchain. Certain embodiments of the present disclosure relate to systems and methods that securely and anonymously represent the identity of a user and the user's access code data on a distributed ledger represented across the blockchain.

Methods and systems for cryptographically secured decentralized testing

A method of cryptographically secured decentralized testing includes receiving, by a computing device and from a secure test apparatus, an output of a cryptographic function of a secret test result identifier, authenticating the output, and recording, in a data repository, an indication of a test result as a function of the output.