H04L2209/42

SYSTEMS AND METHODS FOR A BUTTERFLY KEY EXCHANGE PROGRAM
20210211306 · 2021-07-08 ·

Embodiments described herein provide an implicit protocol with improved resource and bandwidth efficiency. A post-quantum secure approach for issuing multiple pseudonym certificates from a small piece of information is provided, while traditionally most encryption schemes are vulnerable to post-quantum attacks (e.g., in a traditional SCMS). Long-term security can be improved with the post-quantum protocol.

VEHICLE, COMMUNICATION SYSTEM AND COMMUNICATION METHOD USING THE SAME
20210211869 · 2021-07-08 ·

The present disclosure provides a communication method comprising registering a public key for a vehicle, generating a pseudonym ID, transmitting the pseudonym ID, verifying whether the vehicle is registered, and storing a first transaction. Registration of the public key for the vehicle comprises receiving a service with a service provider. The pseudonym ID is generated based on the public key. The pseudonym ID and vehicle data are transmitted to a road side unit. Verification as to whether the vehicle is registered with the service provider is performed based on the transmitted pseudonym ID. A transaction including the pseudonym ID and the vehicle data is then stored in a database of the service provider according to a result of the verification.

ANONYMIZING WIRELESS MESSAGES

Features relating to a vaporizer device configured to wirelessly broadcast anonymized advertisement messages to protect the privacy and/or security of a user of the vaporizer device and/or a user equipment.

Conflict resolution for blockchain storage structure

An example operation may include one or more of receiving a content request to add a content to a blockchain storage structure implemented on a blockchain database, temporarily storing the content of the content request in a queue implemented via the blockchain database based on when the request is received, receiving a request to flush the queue which is invoked by chaincode, and in response to the flush request, removing the content from the queue and adding the content to the blockchain storage structure.

ANONYMIZATION METHOD AND APPARATUS, DEVICE, AND STORAGE MEDIUM
20210029091 · 2021-01-28 ·

This disclosure provides an anonymization method and apparatus, a device, and a storage medium, and pertains to the field of communications network technologies. The method includes: receiving a data obtaining request of a first terminal, and obtaining requested target data based on the data obtaining request; determining behavior data generated when the target data is obtained; determining, based on the behavior data, a first permutation character sequence corresponding to the target data; and anonymizing, based on the first permutation character sequence, a to-be-anonymized character string in the target data, and outputting the anonymized target data. In this disclosure, because the behavior data is different each time and is not easy to crack, anonymization is implemented without relying on plaintext information, thereby improving anonymization security and meeting anonymization requirements specified by laws.

Privacy-preserving Sum-based Consistency Checks for Blockchains
20210026971 · 2021-01-28 ·

A blockchain service receives a first request to insert a first value associated with a transaction into a blockchain. In response, the blockchain service calls a commitment service to obtain a commitment based on the first value. The blockchain service then inserts the commitment into the blockchain at a block associated with the transaction. When the blockchain service subsequently receives a second request to confirm whether a second value matches the first value, it can obtain the commitment from the blockchain. This obtained commitment is then passed to the commitment service along with the second value. The blockchain service then receives a confirmation from the commitment service whether the first value matches the second value. The blockchain service can provide a reply to the second request encapsulating the confirmation. Other variations are provided in which residual amount values can be confirmed. Related apparatus, systems, techniques and articles are also described.

ACCESS CONTROL FOR DIGITAL ASSETS
20210029123 · 2021-01-28 ·

A computer implemented method of controlling access to a digital asset specifying how an artefact is to be rendered, the method including receiving the digital asset and an indication of a first transaction in a decentralized sequential transactional database; verifying the digital asset by evaluating a digital hash of the asset to compare with a hash stored in the first transaction and, responsive to the verification, securely storing the digital asset; generating a second transaction in the database to indicate the availability of the digital asset for rendering the artefact; receiving a request to access the digital asset by a requesting renderer, the request including an indication of a third transaction in the database; accessing the third transaction and responsive to a determination that the third transaction indicates that the requesting renderer is authorized to access the digital asset for rendering the artefact, securely communicating the digital asset to the requesting renderer.

Safe Logon

Methods, computer-readable media, software, and apparatuses are provided to assist a user and vendor in completing an online trusted transaction. Trusted vendor websites are verified and user identities are confirmed through a cyber-security safe logon credentialing system. The vendor can be confident that the user identity has been verified to be who they say they are and the user can be confident that they are using a trusted verified vendor website.

Digital rights management for anonymous digital content sharing
10902093 · 2021-01-26 · ·

Embodiments of the present disclosure relate to digital rights management. A method for managing rights transfer of using digital content from a first device (120) to a second device (130) is proposed, comprising generating at an authentication device (110) a first authentication dataset C by encrypting a first verification code R1 using at least one public key for at least one device blacklisted by the authentication device (110). The first authentication dataset C and a second verification code R2 are provided from the authentication device 110 to the first device (120) and a response message M is returned from the second device (130) to the authentication device (110). The method also comprises verifying validity of the second device (130) at the authentication device (110) based on the received response message M. In accordance with embodiments of the present disclosure, the DRM protected digital content can be shared with high security, while the recipient is kept anonymous to the DRM server.

METHOD AND SYSTEM FOR PRIVACY BASED SEARCH
20210021576 · 2021-01-21 ·

The present teaching relates to a method, system, and programming for encrypted searching. One or more keywords are obtained from a user. A uniform resource locator (URL) is generated, wherein a portion of the URL includes the one or more keywords encrypted via a first key. The URL is transmitted to a search server. In response to a time-related criterion associated with the URL being satisfied, one or more search results are obtained from the server, and in response to the time-related criterion associated with the URL being violated, a search box is obtained in response to transmitting the URL.