H04L2209/42

AGENTS AND SYSTEMS FOR RIGHT?S MANAGEMENT
20220114266 · 2022-04-14 ·

An information system is provided that enables stakeholders to define a secure data object that sets permissions, rules, and rights for an asset. The secure data object may be communicated to entities, such as computer hosts or hardware agents, and the entities are enable to act within the permissions, rules, and rights to conduct transactions and gather information as agents of the stakeholders. The secure data object may be received into a hardware agent attached to an asset, and the agent may have sufficient permission to monitor environmental conditions, adjust pricing, consummate a transaction, or communicate a report.

Machine learning for interconnected surgical theater architecture

Each of a plurality of edge computing devices are configured to receive data streams generated by at least one sensor forming part of a respective medical device (e.g., a sensor-equipped surgical tool, etc.) which, in turn, characterizes use of the respective medical device in relation to a particular patient. Each of the edge computing devices can execute at least one machine learning model which generates or from which model attributes are derived. The generated model attributes are anonymized using an anonymization technique such as k-anonymity. The anonymized generated model attributes are homomorphically encrypted and transmitted to a central server. Encrypted model attribute updates to at least one of the machine learning models are later received from the central server which results in the machine learning models executing on one or more of the edge computing devices to be updated based on the received encrypted model attribute updates.

Method and system for protection of customer PII via cryptographic tokens

A method for facilitating communications while protecting customer privacy through cryptography and withholding of personally identifiable information includes: storing, in a memory of a processing server, contact data and a reference value associated with a first external computing device; receiving, by a receiver of the processing server, a communication request from a second external computing device, the communication request including at least the reference value and a digital signature; validating, by a processor of the processing server, the digital signature using a communicator public key of a cryptographic key pair; receiving, by the receiver of the processing server, a communication message from the second external computing device; and forwarding, by a transmitter of the processing server, the communication message to the first external computing device using the stored contact data following successful validation of the digital signature.

Credential renewal continuity for application development
11277415 · 2022-03-15 · ·

Disclosed herein are methods, systems, and processes for continuously renewing credentials in application development and testing environments that include application products from third-party vendors. A notification indicating that an existing credential associated with a developer account of a third-party application will expire is received via a webhook. A credential renewal request for a new set of credentials for the developer account is sent using a request method specified for the third-party application and the new set of credentials for the developer account are received within the expiration period via the webhook.

Systems and methods of using group functions certificate extension
11283623 · 2022-03-22 · ·

Systems and methods relating to an extension of a group signature scheme certificate that allows group users to conduct anonymous transactions in public, with the ability to subsequently audit and confirm signer identity. Auditing and confirmatory functions may include group signature openers that are configured to reveal the identity of a signer that is a member of a group by their signature. Auditing and confirmatory functions may also include group signature linkers that are configured to link two signatures to the same signer using a linking key or linking base.

Transaction unique loyalty identification programs (TULIP)

Examples described herein relate to systems, apparatuses, methods, and non-transitory computer-readable media for cryptographically determining a loyalty account identifier, including determining a cryptographic key, determining an input parameter, and generating the loyalty account identifier using a cryptography method based on the cryptographic key and the input parameter. The cryptographic key and the input parameter are inputs to the cryptography method. The loyalty account identifier is an output of the cryptography method.

SYSTEM, METHOD AND APPARATUS FOR PRIVACY PRESERVING INFERENCE
20220103346 · 2022-03-31 ·

The disclosed systems, and methods are directed to a method for Privacy Preserving Inference (PPI) comprising receiving a first set of matrix information from a client device, generating k.sub.c−1 matrices by operating a first CSPRNG associated with the server with k.sub.c−1 seeds, computing inferences from the set of k.sub.c matrices, generating a matrix S.sub.s, generating k.sub.s−1 random matrices, computing a matrix Y.sub.k.sub.s in accordance with the inference matrix Y, the matrix S.sub.s and the k.sub.s−1 random matrices, transmitting a second set of matrix information to the client device, the second set of matrix information includes k.sub.s−1 seeds corresponding to the k.sub.s−1 random matrices and the matrix Y.sub.k.sub.s, receiving a matrix U from the client device, and computing an inference value y from the matrix U.

MODIFYING DATA ITEMS

In examples, there is provided a method for modifying a data item from a source apparatus, the data item associated with an event, in which the method comprises, within a trusted environment, parsing the data item to generate a set of tuples relating to the event and/or associated with the source apparatus, each tuple comprising a data item, and a data identifier related to the data item, applying a rule to a first tuple to pseudonymise a first data item to provide a transformed data item, and/or generate a contextual supplement to the first data item, generating a mapping between the transformed data item and the first data item, whereby to provide a link between the transformed data item and the first data item to enable subsequent resolution of the first data item using the transformed data item, and forwarding the transformed data item and the data identifier related to the first data item to an analytics engine situated logically outside of the trusted environment.

Blockchain-based secure, anonymizing message bus

Systems and methods for enabling a blockchain-based secure, anonymizing message bus are disclosed. An example method includes sharing public keys associated with messaging participants for communicating information using a message-bus smart contract implemented on a blockchain network. The method also includes a first participant sending a message via a smart contract call against an instance of the message-bus smart contract, and a second participant determining and receiving the message using the blockchain network.

PRECOMPUTED AND TRANSACTIONAL MIXING
20220078172 · 2022-03-10 ·

Precomputed and transactional mixing is believed to allow portable devices, such as smart phones, to send and receive messages, with little extra bandwidth or battery usage, while achieving anonymity for senders and recipients among all messages sent globally in batches defined by short time intervals. To learn anything about which inputs correspond with which outputs of such a batch of messages, the entire cascade of mix devices, each preferably operating independently in a different country, would it is believed have to be compromised.

None of the real-time computation, neither by the mixes nor smartphones, uses full public-key operations - - - resulting it is believed in orders of magnitude performance improvement over previously-known systems.

Aspects include untraceable return addresses, group chat, feed-following and large payloads. Transaction protocols include a variety of payments use cases. Limited anonymity and credential mechanism are based on a new approach to user identification disclosed, in which each user provides a small amount of different identifying information to each mix node, so that comparatively little is revealed to each node individually.