H04L2209/42

METHOD AND PROTOCOL FOR TRIPLE-BLIND IDENTITY MAPPING.
20210143985 · 2021-05-13 · ·

A method and protocol for triple-blind identity mapping that sufficiently address the need to reduce accidental or nefarious attempts to re-identify the underlying identities pseudonymized by current hashing methods are disclosed. The system abates the privacy exposure risk derived from the simple exchange of hashed information, because the referenced actors do not come into possession of the input values required to produce a repeatable function.

PROTECTING CLIENT PERSONAL DATA FROM CUSTOMER SERVICE AGENTS

Techniques for providing a real-time service that protects personal data of clients from customer service agents are provided. Customer data that includes personal data indicative of sensitive information of a customer can be received from the customer. The personal data within the received customer data can be detected and a token that does not include the sensitive information of the customer can be generated. The personal data and the generated token can be stored along with data indicating a relationship between the token and the personal data. The personal data in the received customer data can be replaced by the token to form modified customer data. The modified customer data can be provided to a customer service representative. The token within the modified customer data can later be detected and associated with the personal data without revealing the personal data to the customer service representative.

PRIVATE KEY SECURITY IN THE CLOUD
20230412398 · 2023-12-21 · ·

Techniques for providing to a user with an anonymous user signature on a message in a distributed decentralized network are presented. The techniques use a hardware security module and a certificate authority. The certificate authority: obtains a credential that includes a certificate for the user, where the certificate includes a user public key and a plurality of user attributes; receives a request for a signature on the message, where the request includes an indication of a subset of the plurality of user attributes to be revealed; accesses from the hardware security module a user secret key; and provides to the user at least the message signed by the user secret key and a zero-knowledge proof that establishes that the message is signed by the user secret key corresponding to the user public key in the credential without revealing the plurality of user attributes.

Automated Management of Blockchain Knowledge Repositories
20230412363 · 2023-12-21 ·

In one example aspect, a first content item is received. First metadata from the first content item; detecting a match between the first metadata and at least one predetermined metadata element in a knowledge repository pertaining to a target blockchain context; determining a first blockchain wallet address associated with the first content item; locating a second content item based on the first blockchain wallet address; extracting second metadata from the second content item; and updating the knowledge repository based on the second metadata extracted from the second content item.

BLOCKCHAIN-BASED TRANSACTION METHOD AND APPARATUS, AND REMITTER DEVICE
20210058253 · 2021-02-25 ·

Implementations of the present specification provide a blockchain-based transaction method and apparatus, and a remitter device. The method includes: calculating a transaction amount commitment, a first commitment random number ciphertext, a first transaction amount ciphertext, a second commitment random number ciphertext, and a second transaction amount ciphertext; and submitting transaction data to the blockchain, the transaction data including the transaction amount commitment, the first commitment random number ciphertext, the first transaction amount ciphertext, the second commitment random number ciphertext, and the second transaction amount ciphertext, for the transaction amount commitment, the first commitment random number ciphertext, and the first transaction amount ciphertext to be recorded into a remitter account, and the transaction amount commitment, the second commitment random number ciphertext, and the second transaction amount ciphertext to be recorded into a remittee account.

BLOCKCHAIN-BASED TRANSACTION METHOD AND APPARATUS, AND REMITTER DEVICE
20210058230 · 2021-02-25 ·

Implementations of the present specification provide a blockchain-based transaction method and apparatus, and a remitter device. The method includes: calculating a transaction amount commitment, a first commitment random number ciphertext, and a second commitment random number ciphertext; and submitting transaction data to the blockchain, the transaction data including the transaction amount commitment, the first commitment random number ciphertext, and the second commitment random number ciphertext, for the transaction amount commitment and the first commitment random number ciphertext to be recorded into a remitter account, and the transaction amount commitment and the second commitment random number ciphertext to be recorded into a remittee account.

Methods, network nodes, mobile entity, computer programs and computer program products for protecting privacy of a mobile entity

A method for a first network node may protect confidentiality of a first identifier associated by the first network node with a subscription used by a mobile entity. The communications network comprises a home network of the mobile entity and a serving network serving the mobile entity. The first network node, which is part of the home network may: receive, from a second network node which is part of the serving network, a first request for authentication information for the mobile entity, the first request comprising the first identifier; generate a first pseudonym associated with the first identifier; create a link between the first pseudonym and the first identifier; and send, to the second network node, the first pseudonym in response to the first request for authentication information for use as an identifier for the mobile entity in the serving network. A method for a second network node is also provided.

Flexible security channel establishment in D2D communications
10944551 · 2021-03-09 · ·

A method for securing D2D communications may comprise: encrypting communication data based at least in part on a security policy associated with at least one of a general trust evaluation and a local trust evaluation; and sending the encrypted communication data from a first user equipment to one or more second user equipments, wherein the second user equipment of which at least one of a general trust evaluation result and a local trust evaluation result satisfies the security policy set by the first user equipment is eligible to access the encrypted communication data.

Method and application for communicating sensitive information
10944726 · 2021-03-09 · ·

Method and application for communicating sensitive information, incident reporting, and for acceleration of urgent situation responses and supervision allowing for school administrators, teachers, professors, users, submitters, or receivers, to instantly report credible threats, or dangerous situations. In at least one current embodiment, a Smart Button is a digital situation button for use by any submitter to instantly report their GPS map location, name, title, contact information, picture and/or workplace. Submitters can receive and/or send 1-way or at least 2-way communications. At least one embodiment of the invention relates to a method for sending, receiving, reporting or responding to mood related, time-sensitive, live situation, or secretive messages, through a one-step anonymous, or with a specific degree of anonymity, or non-anonymous submit and targeted authorized receipt process, generating, assigning, and utilizing unique identifiers with a corresponding administrative report generating process. Submitters' information and messages can be encrypted, in whole or in part.

Secure methods and systems for identifying bluetooth connected devices with installed application

A system and method for securely verifying a connection between a remote device and an audio device. The method includes establishing a wireless connection between the remote device and the audio device. The remote device has an application configured to control operation of the audio device. An identity resolving key (IRK) for the application is obtained with the remote device. The IRK is transmitted to the audio device via the wireless connection. An instruction to is transmitted the audio device to generate a random resolvable address for the application using the IRK and to broadcast data containing the random resolvable address. The data containing the random resolvable address is received by the application of the remote device. An active audio connection between the remote device and the audio device is identified if the random resolvable address is able to be resolved by the application using the IRK.