H04L2209/42

Privacy-Preserving Biometric Authentication

A system for using biometric data to authenticate a subject as an individual whose biometric data has been previously obtained. A second transducer has a digital electronic signal output characterizing a biometric of the subject; a second computing facility to receive the digital electronic signal; an array of servers; and a third computing facility. These components implement processes including generating shards from the digital electronic signal and distributing of the generated shards to the array of servers; receiving and storing by the array of servers the generated shards; performing a data exchange process using a subset of the generated shards to develop information relating to authentication of the subject; and transmitting to a third computing facility, the information developed, to cause the third computing facility to generate an output value indicating whether the subject is authenticated as the individual. A related enrollment system is also provided.

PSEUDONYMOUS FIAT CURRENCY TRANSACTION LOGGER SYSTEM AND METHOD FOR PAYMENT GATEWAYS
20210272110 · 2021-09-02 ·

The present invention relates to a method of recording an anonymized fiat currency transaction between service provider (“payee”) and customer (“payer”) facilitated by a third party payment gateway in a publicly available ledger with a unique set of data points from all parties involved (“payer”, “payee”), which enables software developers to implement an innovative ledger-based service authorization workflow for payments while reducing the software developers burden to store end user sensitive information.

Methods and systems for transmitting anonymized information
11050723 · 2021-06-29 · ·

Exemplary embodiments relate to techniques for anonymizing information in an end-to-end (E2E) encrypted environment; the information may include, for example, statistical data about unique page/message views, view counts, view time, what users selected on the message or page, etc. Exemplary embodiments may prevent an E2E system server from being able to identify which user is associated with which record. Various examples are described, including an embodiment in which an originating client generates the data, encrypts it, and sends it to a random contact. The contact decrypts the data, re-encrypts it, and sends it to another random contact. The procedure continues for a set amount of time or for a set number of hops. Other embodiments relate to wrapping the data in various layers of encryption and sending the data to clients in a chain. The encrypted layers prevent clients along the chain from being able to view the anonymized data.

SYSTEM FOR IMPROVING DATA SECURITY WHEN STORING DATA

When a third party wants to redeem a user's personally identifiable information (PII), the third party presents to the system a token representing the PII, which indicates a request for the PII. The system seeks consent from the user for sending the PII to the third party. If the user grants consent, then the system prepares the PII for the third party. In some embodiments, the third party can initiate a telephone call with a dispatch to receive the PII. In some embodiments, the third party can receive the PII directly from the system.

DATA SUPPLY CHAIN
20210271649 · 2021-09-02 ·

A data supply chain can include functional blocks, which can automatically perform stages of data supply chain, which can include data discovery catalog, data contract negotiation, data preparation, data authentication and authorization, data usage and metering, data contract settlement, data disposal and data forensics and reporting. Information from one or more of the stages can be recorded.

METHOD AND SYSTEM FOR GENERALIZED PROVENANCE SOLUTION FOR BLOCKCHAIN SUPPLY CHAIN APPLICATIONS

A method for conveying auditable information regarding provenance of a product that is cryptographically accurate while retaining complete anonymity of product and participant on a blockchain includes: receiving a product identifier; generating a digital token by applying a hashing algorithm to the product identifier; generating an entry value by applying the hashing algorithm to a combination of an event identifier and the digital token; generating a digital signature by digitally signing a data package using a private key of a cryptographic key pair, where the data package includes at least a blockchain address, the event identifier, and the digital token; and transmitting the blockchain address, the digital signature, and the entry value to a node in a blockchain network.

Re-Identifying Pseudonymized or De-Identified Data Utilizing Distributed Ledger Technology

A system, method, and computer-readable medium are disclosed for providing auditability of a distributed ledger technology (DLT) of de-identified data of entities, stored in the DLT. In certain embodiments, data related to an entity is de-identified. The de-identified data is stored in the DLT. Access to the de-identified data is determined. Instances of access to the de-identified data is recorded to the DLT. In certain embodiments, information used to re-identify the de-identified data is store on the DLT. Access to the information can also be determined and recorded to the DLT.

ENFORCEABLE PSEUDONYMOUS REPUTATION THROUGH CHAINED ENDORSERS
20210184866 · 2021-06-17 ·

Techniques are disclosed to provide enforceable pseudonymous reputation through chained endorsers. In various embodiments, a request associated with a chained endorsement operation is received via a communication interface. A client identity information is extracted from the request. Data comprising or associated with the client identity information is combined with a secret value. A one-way transform of the combined value is performed. A result of the one-way transform is returned to a client with which the chained endorsement operation is associated.

BLOCKCHAIN ARCHITECTURE, SYSTEM, METHOD AND DEVICE FOR AUTOMATED CYBERSECURITY AND DATA PRIVACY LAW COMPLIANCE WITH A STREAMLINED BLOCK STRUCTURE
20210192516 · 2021-06-24 ·

A distributed transaction and data storage platform including a distributed notary ledger or blockchain and one or more individual user micro-identifier chains that together enable the secure effectuation and recordation of one or more transactions, and/or storage of data in an automated, real-time, zero-trust, globally data law and privacy law centric manner while maintaining transaction party confidentiality and preventing chain poisoning.

METHODS AND SYSTEMS FOR IMPLEMENTING MIXED PROTOCOL CERTIFICATES

A system for implementing mixed protocol certificates, the system includes a subject device designed and configured to receive, from an issuing device, a first digital certificate, wherein the first digital certificate further comprises a first digital signature public and private key pair according to a first digital signature protocol and a second digital signature public key according to a second digital signature protocol, wherein the second digital signature protocol is distinct from the first digital signature protocol, to generate a second digital certificate, wherein generating the second digital certificate comprises generating a subject digital signature signing the certificate, the subject digital signature generated as a function of the second digital signature protocol and to provide the first digital certificate and the second digital certificate to a verifying device.