Patent classifications
H04L2209/42
Biometric one touch system
Embodiments disclosed herein generally related to a system and method of authenticating a user with a third party server. In one embodiment, a method is disclosed herein. A computing system receives, from a remote client device of the user, a token. The token includes personal identification information and a digitized file of a biometric captured by a biometric scanner. The computing system identifies via the personal identification information that the user has a user account. The computing system queries a database with the personal identification information and the digitized file to determine whether the biometric matches a stored biometric in the user account. Upon determining that the biometric matches the stored biometric, the computing system generates a message to be transmitted to the third party server that authenticates the user. The computing system transmits the message to the third party server.
Blockchain-based transaction method and apparatus, and remitter device
Implementations of the present specification provide a blockchain-based transaction method and apparatus, and a remitter device. The method includes: calculating a transaction amount commitment, a first commitment random number ciphertext, and a second commitment random number ciphertext; and submitting transaction data to the blockchain, the transaction data including the transaction amount commitment, the first commitment random number ciphertext, and the second commitment random number ciphertext, for the transaction amount commitment and the first commitment random number ciphertext to be recorded into a remitter account, and the transaction amount commitment and the second commitment random number ciphertext to be recorded into a remittee account.
Invoice access method and apparatus based on blockchain, and electronic device
One or more implementations of the present specification provide an invoice access method and apparatus based on a blockchain, and an electronic device. The method includes: receiving an access request initiated by an access user for a target invoice by using a client, the target invoice being encrypted and stored in the blockchain; determining, in response to the access request, whether the access user has an authority to access the target invoice; and in response to that the access user has the authority to access the target invoice, invoking decryption logic provided in a predetermined smart contract to decrypt ciphertext data of the target invoice stored in the blockchain, and returning decrypted plaintext data of the target invoice to the client.
User control of anonymized profiling data using public and private blockchains in an electronic ad marketplace
The disclosure relates to securing and enabling user control of profiling data, blockchain-driven matching of users and advertiser-identified anonymous profiling data records of interest, and smart contracts encoded by blockchain for executing transactions. The system may include an anonymized database of profiling data, which is unlinked to any user. The system may implement a private blockchain to store user-defined settings that provide user control over whether and how the profiling data may be used. If a grant to use the data is received, a link is stored that allows the system to identify a user associated with the anonymous profiling data records. If the grant is revoked, the link may be removed. The system may also implement public blockchain technology to record a public information relating to grants, online marketing transactions, making them verifiable, immutable, and transparent for various stakeholders including advertisers, publishers, and users.
Data analysis server, data analysis system, and data analysis method
A data analysis server holds base-point-added information, wherein the base-point-added information includes a value of an explanatory variable encrypted by first high-performance encryption, a value of a response variable encrypted by a predetermined encryption scheme, and a base point based on frequencies of the value of the explanatory variable in information for learning are associated with one another, wherein the data analysis server: executes decision tree generation processing for generating a decision tree having a leaf node associated with the value of the response variable encrypted by the predetermined encryption scheme, which is included in the base-point-added information; and execute branching rule determine processing in decision tree generation processing without decrypting the value of the explanatory variable and the base point corresponding.
Perturbation-based order preserving pseudonymization of data
A technique includes converting a plurality of plaintext values to a corresponding plurality of pseudonym values. The conversion includes performing encryption of the plurality of plaintext values to provide a plurality of second values; perturbing the plurality of second values to provide the plurality of pseudonym values; and controlling the perturbing to cause an ordering of the plaintext values to be represented in the plurality of pseudonym values.
Determining pseudonym values using tweak-based encryption
A technique includes accessing data that represents a plurality of values that are associated with a plurality of ranges. The technique includes determining a pseudonym value for a given value, where the given value is associated with a given range and determining the pseudonym includes encrypting the given value to provide the pseudonym value; controlling the encryption to cause the pseudonym value to be within the given range; and tweaking the encryption based on an attribute that is associated with the given value.
Techniques for enabling computing devices to identify when they are in proximity to one another
The embodiments set forth a technique for securely identifying relevant computing devices that are nearby. The technique can be implemented at a first computing device, and include the steps of (1) receiving, from a second computing device, an advertisement packet that includes: (i) a network address that is associated with the second computing device, and (ii) a hash value that is calculated using the network address and an encryption key that is associated with the second computing device, and (2) for each known encryption key in a plurality of known encryption keys that are accessible to the first computing device: (i) calculating a temporary hash value using the network address and the known encryption key, and (ii) in response to identifying that the temporary hash value and the hash value match: carrying out an operation associated with the second computing device.
Blockchain-based data processing method, apparatus, and blockchain node
Implementations of the present specification provide a blockchain-based data processing method, apparatus, and computer-readable medium. The method includes obtaining transaction data to be processed; and in response to determining that the transaction data includes a plurality pieces of proof data, invoking a verification program deployed in the blockchain and verifying the plurality pieces of proof data in parallel.
Privacy-preserving sum-based consistency checks for blockchains
A blockchain service receives a first request to insert a first value associated with a transaction into a blockchain. In response, the blockchain service calls a commitment service to obtain a commitment based on the first value. The blockchain service then inserts the commitment into the blockchain at a block associated with the transaction. When the blockchain service subsequently receives a second request to confirm whether a second value matches the first value, it can obtain the commitment from the blockchain. This obtained commitment is then passed to the commitment service along with the second value. The blockchain service then receives a confirmation from the commitment service whether the first value matches the second value. The blockchain service can provide a reply to the second request encapsulating the confirmation. Other variations are provided in which residual amount values can be confirmed. Related apparatus, systems, techniques and articles are also described.