H04L2209/42

Reversible anonymous telemetry data collection

According to one aspect of the present disclosure, a telemetry data set, which includes a plurality of data fields associated with application operations, is collected for an application. A request for at least a portion of the telemetry data set is received and processed. Data fields in the telemetry data set that are to be anonymized are identified based on the request, with information in the identified data fields is to be anonymized according to corresponding anonymization rules. The information in each of the identified data fields is masked based on the corresponding anonymization rule for the data field, and an anonymized telemetry data set is generated. The anonymized telemetry data set includes the masked information for the identified data fields and unmasked information for other data fields indicated in the request.

METHOD AND SYSTEM FOR OPTIMIZING TRANSACTION FLOW FOR BLOCKCHAIN MINING AND CONFIRMATION

A method for confirming a blockchain transaction utilizing output from a transaction still waiting inclusion in a blockchain includes: storing, in a node of a blockchain network, a plurality of waiting blockchain transactions not included in a blockchain associated with the blockchain network; receiving a new blockchain transaction including a transaction amount, destination address, digital signature, and an unspent transaction output, where the unspent transaction output is a reference to one waiting blockchain transactions; validating the new blockchain transaction including confirmation of the one of the waiting blockchain transactions; generating a new block including a block header and a plurality of blockchain data entries including at least the new blockchain transaction and the one of the waiting blockchain transactions; and transmitting the generated new block to a plurality of additional nodes in the blockchain network for confirmation.

Apparatus and method for automated privacy protection in distributed images
10990697 · 2021-04-27 · ·

A method executed by a computer includes receiving an image from a client device. A facial recognition technique is executed against an individual face within the image to obtain a recognized face. Privacy rules are applied to the image, where the privacy rules are associated with privacy settings for a user associated with the recognized face. A privacy protected version of the image is distributed, where the privacy protected version of the image has an altered image feature.

Systems and methods for preserving the anonymity of provisional ballots

A computer-implemented method for preserving the anonymity of a provisional ballot cast by a voter in an election whose eligibility to vote in the election is not yet determined comprises including a machine-readable identification marking representing an identification code associated with the voter on the paper card utilized by a voting device associating the identification code represented by the machine-readable identification marking with the contest choices stored in the results database. In this manner, upon a determination that the voter is either eligible or ineligible to vote in the election, the contest choices of the voter can be included in or excluded from, respectively, the results of the election by identifying the identification code associated with the voter and including or excluding, respectively, the contest choices associated with the identification code.

System and method for de-anonymizing actions and messages on networks

A traffic-monitoring system that monitors encrypted traffic exchanged between IP addresses used by devices and a network, and further receives the user-action details that are passed over the network. By correlating between the times at which the encrypted traffic is exchanged and the times at which the user-action details are received, the system associates the user-action details with the IP addresses. In particular, for each action specified in the user-action details, the system identifies one or more IP addresses that may be the source of the action. Based on the IP addresses, the system may identify one or more users who may have performed the action. The system may correlate between the respective action-times of the encrypted actions and the respective approximate action-times of the indicated actions. The system may hypothesize that the indicated action may correspond to one of the encrypted actions having these action-times.

METHOD AND SYSTEM FOR PROTECTION OF CUSTOMER PII VIA CRYPTOGRAPHIC TOKENS

A method for facilitating communications while protecting customer privacy through cryptography and withholding of personally identifiable information includes: storing, in a memory of a processing server, contact data and a reference value associated with a first external computing device; receiving, by a receiver of the processing server, a communication request from a second external computing device, the communication request including at least the reference value and a digital signature; validating, by a processor of the processing server, the digital signature using a communicator public key of a cryptographic key pair; receiving, by the receiver of the processing server, a communication message from the second external computing device; and forwarding, by a transmitter of the processing server, the communication message to the first external computing device using the stored contact data following successful validation of the digital signature.

SYSTEMS AND METHODS FOR SECURING ACCESS RIGHTS TO RESOURCES USING CRYPTOGRAPHY AND THE BLOCKCHAIN
20210119764 · 2021-04-22 ·

The present disclosure generally relates to securing access to resource and access rights using cryptography and the blockchain. Certain embodiments of the present disclosure generally relate to systems and methods that enhance the security of resource access using hierarchical deterministic (HD) cryptography and the blockchain. Certain embodiments of the present disclosure relate to systems and methods that securely and anonymously represent the identity of a user and the user's access code data on a distributed ledger represented across the blockchain.

KEY PAIR PLATFORM AND SYSTEM TO MANAGE FEDERATED TRUST NETWORKS IN DISTRIBUTED ADVERTISING

Systems and methods are provided for object identifier translation using a key pairs platform in a virtualized or cloud-based computing system. A key pair refers to a pair of identifiers held by an entity. Each key pair includes at least one anonymized object identifier. Advantageously, the key pair system protects privacy and provides anonymity for objects by not disclosing the identity of the objects or the underlying data associated with the objects.

DECENTRALIZED GROUP SIGNATURE SCHEME FOR CREDENTIAL SYSTEMS WITH ISSUER ANONYMIZATION
20210135879 · 2021-05-06 ·

A decentralized group signature method for an issuer-anonymized credential system includes (a) an initial system setup operation of defining elements of a group signature method and information that is generated and shared by each group member, (b) an initial group member setup operation, (c) a group member participation operation of adding a new group member to a group, (d) a group signature operation of putting a group signature on a specific message, (e) an operation of verifying the group signature, (f) an operation of removing anonymity from a group signature for a specific group member with agreement of group members, and (g) an operation of revoking a specific group member with agreement of the group members. Exclusive authority of a group manager is distributed to the group members.

SYSTEM AND METHOD FOR HEALTHCARE SECURITY AND INTEROPERABILITY

Embodiments facilitate interoperability and secure determination of healthcare costs. An entity may receive a first Electronic Health Record (EHR) sub-block with patient medical coverage information and first treatments and may transmit a first Device Drug Information (DIR) sub-block comprising first treatment classes corresponding to each first treatment, first treatment class members corresponding to each first treatment class, and corresponding first treatment class member cost information. In response, the entity may receive a second EHR sub-block comprising second treatments each: associated with a corresponding first treatment, and selected from corresponding first treatment class members. Upon receipt of a transaction confirmation, the entity may augment a multi-dimensional blockchain with a multi-dimensional block formed by linking: a DIR block including second treatment information, an EHR block including information based on the second EHR sub-block and a transaction block. Payment assistance information determined from the second EHR block may be transmitted to a patient.