H04L2209/42

Network node authentication

An authentication technique is disclosed that uses a distributed secure listing of transactions that includes encrypted data that can be used to authenticate a principal to a verifier.

COMMUNICATION DEVICE, SERVER DEVICE, CONCEALED COMMUNICATION SYSTEM, METHODS FOR THE SAME, AND PROGRAM

A communication device includes a signature encryption unit that encrypts input information with a secret key and transmits the information to a server device if the communication device belongs to a group, and a signature decryption unit that downloads, from the server device, encrypted n−1 pieces of the input information transmitted from other communication devices and decrypts the encrypted n−1 pieces of input information with the secret key if the communication device belongs to a group. The communication device transmits session key generation information to the server device via the signature encryption unit, generates a session key using n−1 pieces of session key generation information acquired via the signature decryption unit and session key generation information of the communication device, transmits a cipher text encrypted with the session key via the signature encryption unit to the server device, and decrypts n−1 cipher texts acquired via the signature decryption unit with the session key.

SYSTEM AND METHOD FOR DISTRIBUTED, SECURE COMPUTING SYSTEM
20210118025 · 2021-04-22 · ·

A method for injecting data into a secure distributed computing system includes obtaining characteristics of an object via a secure operable connection from a smart silo. The method further includes verifying an identity of the smart silo based on credentials included in a message from the smart silo received via the secure operable connection. The methods further includes making a determination that the characteristics match a trigger condition of a smart contract. The method further includes executing the smart contract in response to the determination.

PSEUDONYM CREDENTIAL CONFIGURATION METHOD AND APPARATUS
20210111906 · 2021-04-15 ·

Embodiments of this application provide a pseudonym credential configuration method and apparatus. The method includes: receiving an identifier of a terminal device and information about N to-be-requested pseudonym credentials from the terminal device, sending N second request messages to a pseudonym credential generation server, and storing a tag of each second request message in association with the identifier of the terminal device in the registration server, so that the registration server can obtain, based on the tag, the identifier that is of the terminal device and that is associated with the tag; and generating N pseudonym credentials. The pseudonym credential generated in this application may enable a behavior investigation server to learn of a real identity of the terminal device.

Computer system of computer servers and dedicated computer clients specially programmed to generate synthetic non-reversible electronic data records based on real-time electronic querying and methods of use thereof
10977388 · 2021-04-13 · ·

In some embodiments, the present invention provides for an exemplary computer system which includes at least: a graphical user interface client; a dedicated application server; the dedicated application server is configured to connect to the graphical user interface client and an electronic source with electronic data records; where the electronic data records include real identification identifiers of real individuals; where the graphical user interface client is configured to generate at a graphical user interface that is configured to receive user authenticating credential information and to conduct a real-time electronic negotiation querying session between the user and the dedicated application server to generate a plurality of non-reversible synthetic electronic data records of a plurality of synthetic individuals, by utilizing at least one statistical technique so that the plurality of non-reversible synthetic electronic data records cannot be used to identify any real individual in the plurality of electronic data records.

Systems and methods to secure personally identifiable information

A method implemented in a computing system hosting a three-dimensional virtual reality world. The computer system collects personally identifiable information of users of accounts, where each account in the accounts is identified by an account identifier and each data field of personally identifiable information of each account is identified by a data field identifier. The system uses a scrypt function to generate an encryption key from the global key, the account identifier, and the data field identifier specifically for the content of the data field of the personally identifiable information of the respective account. Different encryption keys are used for different data fields and different accounts. Encrypted content of a data field is stored at a random location; and the identification of the random location is stored in a device, database or system, separate from where the encrypted contents of the data fields of the accounts are stored.

PRIVACY DATA REPORTING METHOD AND APPARATUS, AND STORAGE MEDIUM
20210141922 · 2021-05-13 · ·

Embodiments disclose a privacy data reporting method and apparatus, and a storage medium. The method includes: A terminal device obtains to-be-reported data, divides the to-be-reported data into front string data and rear string data based on a preset step, separately scrambles the front string data and the rear string data, and sends the generated privacy data to a server. The server receives privacy data sent by a plurality of terminal devices, determines N pieces of first front string data, then obtains M pieces of to-be-reported data based on a plurality of pieces of privacy data, and finally determines to-be-reported data whose reporting rate is greater than a first preset value as target to-be-reported data. In an exemplary embodiment, the terminal device divides the to-be-reported data into two parts, and separately scrambles the two parts to generate the privacy data.

METHODS, DEVICES AND SYSTEMS FOR A DISTRIBUTED COORDINATION ENGINE-BASED EXCHANGE THAT IMPLEMENTS A BLOCKCHAIN DISTRIBUTED LEDGER
20210144196 · 2021-05-13 ·

A distributed system that implements an online exchange may comprise a plurality of server nodes, each of which being configured to receive exchange transaction proposals from customers of the online exchange over a computer network and each being configured to store a copy of a blockchain distributed ledger of completed exchange transactions. A distributed coordination engine may be coupled, over the computer network, to the plurality of server nodes and may receive a plurality of exchange transaction proposals from the plurality of server nodes. The distributed coordination engine may be being further configured to achieve consensus on the plurality of exchange transaction proposals and to generate, in response, an ordering of agreed-upon exchange transaction proposals that includes the plurality of exchange transaction proposals on which consensus has been reached. This ordering of agreed-upon exchange transaction proposals is identically provided to each of the server nodes and specifies the order in which the server nodes are to execute exchange transactions and to update their copy of the distributed ledger. The ordering of agreed-upon exchange transaction proposals may optionally be re-ordered and identically provided to each server node to conform to the local orderings at the exchange transaction proposal's node server of origin.

BLOCKCHAIN-BASED TRUSTABLE GUARANTEES

A method includes receiving a cyphertext of a digital document specifying a guarantee and one or more zero-knowledge proofs (ZKPs) related to a value associated with the guarantee; verifying the one or more ZKPs; upon successfully verifying the one or more ZKPs, storing the cyphertext to a blockchain based on performing a consensus algorithm; receiving a first message from a first computing device associated with the beneficiary or a representative of the beneficiary indicating there is no outstanding claim for the guarantee; sending a second message to a second computing device associated with a guarantor to confirm that the guarantor is discharged from undertaking payment under the guarantee; receiving a third message from the second computing device associated with the guarantor requesting the status of the guarantee to be changed to expired; and updating the status of the guarantee stored in the blockchain to indicate that the guarantee has expired.

Device for secure computing the value of a function using two private datasets without compromising the datasets and method for computing the social rating using the device

The invention relates to data protection means and can be used for cooperative computing by two or more parties without revealing to each other the private data used. The technical result is to ensure the privacy of large amounts of data belonging to different parties, and to reduce the amount of memory secured from unauthorized reading during computations. Such an effect is achieved due to forming the first and the second private datasets, where the first and the second private datasets use user identifiers, wherein the first private dataset contains user ratings matched to the user identifiers, and the second private dataset, for each of the user identifiers, contains an array of user identifiers from the social environment of the respective users; by the user identifiers from the social environment of the selected user, computing the social rating of the selected user as a function of the number of users from the social environment and the rating values of the users from the social environment. Wherein the data on social ratings of users are transmitted in encrypted form.