H04L2209/42

Tamper resistant public ledger voting system
11361606 · 2022-06-14 ·

There is disclosed an electronic voting system for tamper resistant voting. In some embodiments of a system and/or method for allows a voter to verify that his vote was recorded properly and/or allows public counting of votes by any entity. For example, the system may record information on a distributed ledger that prevents changing of votes. For example, enough data may be available to each voter to check that his vote was recorded properly and/or to substantiate and/or prove if it was not recorded properly. For example, public data may be recorded anonymously such that a third party may be able to access the number of votes, but not the identify of individual voters. Optionally, the individual voter may be supplied a way to substantiate a claim that he voted for either party of the election.

AUTONOMOUS CRYPTOGRAPHIC AND BLOCKCHAIN ACTOR IN A BROWSER EXECUTION CONTEXT
20220141037 · 2022-05-05 ·

Systems and methods for enabling an autonomous cryptographic and blockchain actor in a browser execution context are disclosed. An example method includes generating, by a web browser application, a root cryptographic identity for the web browser application to interact with blockchain(s). The method also includes creating sub identities based on the root cryptographic identity, associating the sub identities with blockchain identities on the blockchain(s), and causing the blockchain identities to be funded, for smart contract call transaction(s) via the blockchain(s).

Establishing a session initiation protocol session

The present disclosure describes methods and systems for establishing a Session Initiation Protocol Session. One method includes transmitting a first message requesting authentication configuration information; in response to the first message, receiving a second message that includes the authentication configuration information; transmitting a third message that includes authentication information based upon the received authentication configuration information; receiving an authentication challenge request that is formatted according to the second protocol; and in response to receiving the authentication challenge request, transmitting an authentication response to the second network node.

SYSTEMS AND METHODS FOR PRIVACY-ENABLED BIOMETRIC PROCESSING
20220100896 · 2022-03-31 · ·

In one embodiment, a set of feature vectors can be derived from any biometric data, and then using a deep neural network (“DNN”) on those one-way homomorphic encryptions (i.e., each biometrics' feature vector) can determine matches or execute searches on encrypted data. Each biometrics' feature vector can then be stored and/or used in conjunction with respective classifications, for use in subsequent comparisons without fear of compromising the original biometric data. In various embodiments, the original biometric data is discarded responsive to generating the encrypted values. In another embodiment, the homomorphic encryption enables computations and comparisons on cypher text without decryption. This improves security over conventional approaches. Searching biometrics in the clear on any system, represents a significant security vulnerability. In various examples described herein, only the one-way encrypted biometric data is available on a given device. Various embodiments restrict execution to occur on encrypted biometrics for any matching or searching.

Method for verifying opinion by use of block chain which guarantees anonimity and prevents sybil attack

The method of verifying an opinion includes, by an account module, receiving a request for identification information of the opinion (Ballot Stamp) from the user terminal; requesting a first random value to the user terminal; receiving a first homomorphic ciphertext from the user terminal; generating a second random value; storing a first value; generating a second homomorphic ciphertext from the Ballot Stamp; receiving a third homomorphic ciphertext obtained from a tag from an opinion verifying program module; and transmitting the second homomorphic ciphertext and the third homomorphic ciphertext to the user terminal. The method further includes, by the opinion verifying program module, receiving the tag obtained by decrypting the third homomorphic ciphertext, Ballot Stamp, and the opinion message, from the user terminal; and determining the opinion as being verified if the value calculated by the first arithmetic operation to the random value and Ballot Stamp is identical to the tag.

Method and system for generating keys for an anonymous signature scheme

A method for anonymous signature of a message executed by a member entity of a group. The method includes: registering the member entity with an administration entity of the group; generating by the member entity a trace from a trace generator calculated by at least one revocation entity and included in a public key of the group, the trace being invariant relative to the anonymous signatures generated by the member entity in accordance an anonymous signature scheme; blindly obtaining by the member entity a private group key; and generating at least one signature according to the anonymous signature scheme by using the private key, the signature comprising the trace.

METHOD AND SYSTEM FOR PRIVACY PRESERVING MULTIFACTOR BIOMETRIC AUTHENTICATION

Authentication is a key procedure in information systems. Conventional biometric authentication system is based on a trusted third-party server which is not secure. The present disclosure provides a privacy preserving multifactor biometric authentication for authenticating a client without the third-party authentication server. The server receives a plurality of encrypted biometric features from the client, encrypted using Fully Homomorphic Encryption. Further, the server evaluates the plurality of encrypted biometric features to obtain a client identifier value and a plurality of encrypted resultant values. The server encrypts each of the plurality of resultant values based on a time based nonce and the client identifier value. The encrypted authentication tags and the corresponding resultant values are aggregated by the server and transmitted to the client. The client decrypts the resultant value and the authentication tag and transmits to the server. The server authenticates the client after verifying the received information.

Distributed biometric comparison framework

A method is disclosed. An authentication node may receive a plurality of encrypted match values, wherein the plurality of encrypted match values were formed by a plurality of worker nodes that compare a plurality of encrypted second biometric template parts derived from a second biometric template to a plurality of encrypted first biometric template parts derived from a first biometric template. The authentication node may decrypt the plurality of encrypted match values resulting in a plurality of decrypted match values. The authentication node may then determine if a first biometric template matches the second biometric template using the plurality of decrypted match values. An enrollment node may be capable of enrolling a biometric template and storing encrypted biometric template parts at worker nodes.

Systems and methods for preserving privacy and incentivizing third-party data sharing

Methods and systems relating incentivizing a data provider to participate in a match making protocol between a business (second entity) to a user (first entity) are shown. Encryption techniques maintain the secrecy of the data providers data such as proprietary analytics of user information such that the data is need not be shared with users or businesses. Businesses can verify that the user has desired properties without learning the actual raw data owned by the data provider. Users initiate data sharing by explicit request but do not learn the actual raw data known to the data provider, only whether or not they satisfy the properties of interest. The data provider is incentivized because the business compensates the data provider for access to proofs of properties about user data.

SYSTEMS, METHODS, AND DEVICES FOR DIGITAL ADVERTISING ECOSYSTEMS IMPLEMENTING CONTENT DELIVERY NETWORKS UTILIZING EDGE COMPUTING
20220101384 · 2022-03-31 ·

Disclosed herein are systems and techniques for using a content delivery network to perform various functions within a digital advertising ecosystem, in ways that yield technological benefits such as improved security, efficiency, and speed (for example, reduction in publisher load times). As one specific example, a content delivery network can be used for the creation of electronic tokens for user identity protection between demand side platforms, supply side platforms, content creators (for example, advertisers), and publishers.