H04L2209/42

Providing quality of service for certificate management systems

An example system receives certificate requests from clients. Each request can indicate a number of computerized devices needing certificates; a timestamp indicating when the request was transmitted; and a client identifier. The system includes a Quality of Service (QoS) manager that: distributes the requests from the clients across client queues, each of the client queues corresponding to a particular client; and divides requests into smaller subgroups of entries corresponding to a subset of the computerized devices needing certificates. The system can also transmit retrieved entries from the client queues to a certificate management service.

Privacy-preserving identity asset exchange

A processor-implemented method facilitates identity exchange in a decentralized setting. A first system performs a pseudonymous handshake with a second system that has created an identity asset that identifies an entity. The second system has transmitted the identity asset to a third system, which is a set of peer computers that support a blockchain that securely maintains a ledger of the identity asset. The first system transmits a set of pseudonyms to the third system, where the set of pseudonyms comprises a first pseudonym that identifies the first system, a second pseudonym that identifies a user of the second system, and a third pseudonym that identifies the third system. The first system receives the identity asset from the third system, which securely ensures a validity of the identity asset as identified by the first pseudonym, the second pseudonym, and the third pseudonym.

Customized view of restricted information recorded into a blockchain
10958663 · 2021-03-23 · ·

Systems, methods, and software are disclosed herein to generate a customized view of a blockchain transaction. A blockchain of block entries requested by a plurality of users from user devices is maintained in a distributed network of nodes. The block entries each comprise a plurality of data portions that are each associated with an access level. A request to view one or more data portions of a block entry is received which includes an access code associated with at least one access level. The access code in the request is evaluated with the blockchain of block entries to identify one or more data portions associated with the access level. A customized view of the block entry is generated which includes the one or more data portions associated with the access level.

Contact discovery service with privacy aspect

This application relates to a client-server architecture that enables user accounts registered with a service to be discoverable to other users of the service. A discovery protocol includes accessing personal information data stored in an address book of a client device, obfuscating the personal information data, transmitting a request to a service to determine if the obfuscated personal information data matches any potential contacts that have registered as discoverable with the service, and comparing information related to the potential contacts with the contacts included in the address book to determine if the contacts in the address book match any of the potential contacts.

System and method for healthcare security and interoperability

Disclosed embodiments facilitate healthcare system security and interoperability. In some embodiments, a first entity may receive, in response to a transaction at a first time, encrypted information blocks pertaining to the transaction from one or more second entities. Each encrypted information block may be received from a distinct second entity and may comprise at least one sub-block decryptable by the first entity. The first entity may decrypt the decryptable sub-blocks and augment a multi-dimensional blockchain. The multi-dimensional blockchain may be augmented with a multi-dimensional block formed by linking at least one of the encrypted information blocks received from the one or more second entities to a current block being added to a blockchain associated with the transaction and maintained by the first entity. The first entity may then enable access to the multi-dimensional blockchain for at least one of the one or more second entities.

LOW ENTROPY BROWSING HISTORY FOR ADS QUASI-PERSONALIZATION

The present disclosure provides systems and methods for content quasi-personalization or anonymized content retrieval via aggregated browsing history of a large plurality of devices, such as millions or billions of devices. A sparse matrix may be constructed from the aggregated browsing history, and dimensionally reduced, reducing entropy and providing anonymity for individual devices. Relevant content may be selected via quasi-personalized clusters representing similar browsing histories, without exposing individual device details to content providers.

FACILITY CONTROL METHODS AND APPARATUS
20210082271 · 2021-03-18 ·

A security system includes a physical sensor for determining presence of a first number of users within a detecting region, short-range readers for determining presence of a second number of authorized smart devices in response to ephemeral tokens, wherein the users may remain anonymous to the short-range readers, authentication servers for determining ephemeral tokens for smart devices in response to identifiers of the readers and the smart devices, a physical output device configured to provide a user detectable output, and a processor for determining whether the first number of users is different from the second number and for directing the physical output device to provide the user detectable output.

Confidential blockchain transactions
10958443 · 2021-03-23 · ·

A computer-implemented method includes: determining assets held by a remitter, the assets to be spent in a remittance transaction between the remitter and one or more payees, in which each asset corresponds to a respective asset identifier, a respective asset amount, and a respective asset commitment value; determining a remitter pseudo public key and a remitter pseudo private key; determining a cover party pseudo public key, in which the cover party pseudo public key is obtained based on asset commitment values of assets held by the cover party; and generating a linkable ring signature for the remittance transaction.

ULTRASOUND ASSISTED DEVICE ACTIVATION

An onboarding server uses an ultrasound token to securely onboard a new device to an organizational structure. The onboarding server obtains a registration from the new device and provides the new device with an ultrasound token. The onboarding server also obtains a notification from a user device that detected the ultrasound token broadcast from the new device. The onboarding server determines a device identity for the new device and provides cryptographic information to the new device. The cryptographic information enables the new device to connect to an organizational structure with the device identity.

PRIVATE ASSOCIATION OF CUSTOMER INFORMATION ACROSS SUBSCRIBERS
20210075605 · 2021-03-11 ·

Methods are provided for discovering related attributes with respect to an element in a customer data record, based on provided associations and for generating new associations between various elements of the customer data record. In these method, the context service system obtains, from a subscriber, a lookup request including a first blinded attribute. The first blinded attribute is obtained by applying an oblivious pseudo random function (OPRF) to a first element of a data record. The method further includes the context service system identifying at least one second blinded attribute associated with the first blinded attribute in a shared data partition of the context service system and providing, to the subscriber, at least one second element of the data record associated with the at least one second blinded attribute.