H04L2209/42

BLOCKCHAIN-BASED TRANSACTION METHOD AND APPARATUS, AND REMITTER DEVICE
20210295342 · 2021-09-23 ·

Implementations of the present specification provide a blockchain-based transaction method and apparatus, and a remitter device. The method includes: calculating a transaction amount commitment, a first commitment random number ciphertext, and a second commitment random number ciphertext; and submitting transaction data to the blockchain, the transaction data including the transaction amount commitment, the first commitment random number ciphertext, and the second commitment random number ciphertext, for the transaction amount commitment and the first commitment random number ciphertext to be recorded into a remitter account, and the transaction amount commitment and the second commitment random number ciphertext to be recorded into a remittee account.

BLOCKCHAIN-BASED TRANSACTION METHOD AND APPARATUS, AND REMITTER DEVICE
20210281413 · 2021-09-09 ·

Implementations of the present specification provide a blockchain-based transaction method and apparatus, and a remitter device. The method includes: calculating a transaction amount commitment, a first commitment random number ciphertext, a first transaction amount ciphertext, a second commitment random number ciphertext, and a second transaction amount ciphertext; and submitting transaction data to the blockchain, the transaction data including the transaction amount commitment, the first commitment random number ciphertext, the first transaction amount ciphertext, the second commitment random number ciphertext, and the second transaction amount ciphertext, for the transaction amount commitment, the first commitment random number ciphertext, and the first transaction amount ciphertext to be recorded into a remitter account, and the transaction amount commitment, the second commitment random number ciphertext, and the second transaction amount ciphertext to be recorded into a remittee account.

TRACKING AND ANALYSES OF CONTENT PRESENTATION
20210234842 · 2021-07-29 ·

Systems and methods for providing services are disclosed. One aspect comprises authenticating a user associated with a first service, receiving a selection of a second service, generating an opaque identifier associated with the user and the first service, wherein the opaque identifier facilitates the anonymous collection of data relating to the second service. Another aspect can comprise transmitting the opaque identifier to the second service, and receiving data relating to the second service.

Systems and methods for communicating token attributes associated with a token vault

Systems and methods for interoperable network token processing are provided. A network token system provides a platform that can be leveraged by external entities (e.g., third party wallets, e-commerce merchants, payment enablers/payment service providers, etc.) or internal payment processing network systems that have the need to use the tokens to facilitate payment transactions. A token registry vault can provide interfaces for various token requestors (e.g., mobile device, issuers, merchants, mobile wallet providers, etc.), merchants, acquirers, issuers, and payment processing network systems to request generation, use and management of tokens. The network token system further provides services such as card registration, token generation, token issuance, token authentication and activation, token exchange, and token life-cycle management.

Method and device for anonymizing data stored in a database

A method is provided to anonymize “initial” data stored in a database of a computer system and resulting from aggregating personal data relating to a plurality of individuals. The method includes: an identification act identifying in the initial data a set of data that is “sensitive” that would be affected by personal data relating to one individual being added to or removed from the database; a partitioning act partitioning the sensitive data set into a plurality of subsets as a function of a sensitivity level of the sensitive data; a determination act determining a sensitivity level for each subset; and an anonymization act anonymizing the initial data and including, for each subset, adding noise to the sensitive data of that subset with a noise level that depends on the sensitivity level determined for the subset.

IMPROVED SYSTEM AND METHOD FOR INTERNET ACCESS AGE-VERIFICATION
20210234705 · 2021-07-29 ·

A system and method for internet-access age-verification is described which has direct application for controlling access to age-limited internet content, such as gambling sites, by secure communication with an age-verification server. After registering with an age-verification server, the internet user installs a software application on his multimedia device which manages the age-verification In transaction between an age-restricted content provider and the age-verification server whenever the user attempts to access age-restricted content. The invention maintains anonymity between the user and the content provider yet provides secure and authenticated verification of the age of the user. No user website data is transmitted to the age-verification server, thus maintaining the privacy of the internet user.

CRYPTOGRAPHIC METHODS AND SYSTEMS FOR MANAGING DIGITAL CERTIFICATES

Digital certificates are generated for devices by a Certificate Authority (CA), which communicates with devices via another entity registration authority (RA)—so that the CA and RA cannot associate certificates with devices. Each certificate is associated with a public signature key, and with a public encryption key used by CA to encrypt the certificate to hide it from the RA. Both keys are derived by CA from a single key. For example, the signature key can be derived from the public encryption key rather than generated independently. However, high security is obtained even when the CA does not sign the encrypted certificate. Reduced bandwidth and computational costs are obtained as a result. Other embodiments are also provided.

SYSTEMS AND METHODS TO SECURE PERSONALLY IDENTIFIABLE INFORMATION

A method implemented in a computing system hosting a three-dimensional virtual reality world. The computer system collects personally identifiable information of users of accounts, where each account in the accounts is identified by an account identifier and each data field of personally identifiable information of each account is identified by a data field identifier. The system uses a script function to generate an encryption key from the global key, the account identifier, and the data field identifier specifically for the content of the data field of the personally identifiable information of the respective account. Different encryption keys are used for different data fields and different accounts. Encrypted content of a data field is stored at a random location; and the identification of the random location is stored in a device, database or system, separate from where the encrypted contents of the data fields of the accounts are stored.

SYSTEM AND METHOD FOR PROVIDING PERSONAL INFORMATION USING ONE TIME PRIVATE KEY BASED ON BLOCKCHAIN OF PROOF OF USE
20210243028 · 2021-08-05 ·

The present disclosure relates to a system and a method for providing personal information for an online service system. More particularly, the present disclosure relates to a system and a method for providing personal information using a one-time private key based on a blockchain of proof of use, wherein personal information is registered and stored in a distributed manner in a blockchain network, services in online and offline service systems are used by using alternative authentication identification information that is anonymous and includes a public key to access the personal information in the blockchain network, and for membership registration and login, only the alternative authentication identification information is used to receive a service, become a member of a service, and to log in, without providing the personal information.

PROTECTING CLIENT PERSONAL DATA FROM CUSTOMER SERVICE AGENTS

Techniques for providing a real-time service that protects personal data of clients from customer service agents are provided. Customer data that includes personal data indicative of sensitive information of a customer can be received from the customer. The personal data within the received customer data can be detected and a token that does not include the sensitive information of the customer can be generated. The personal data and the generated token can be stored along with data indicating a relationship between the token and the personal data. The personal data in the received customer data can be replaced by the token to form modified customer data. The modified customer data can be provided to a customer service representative. The token within the modified customer data can later be detected and associated with the personal data without revealing the personal data to the customer service representative.