Patent classifications
H04L2209/42
PRESERVATION SYSTEM FOR PRESERVING PRIVACY OF OUTSOURCED DATA IN CLOUD BASED ON DEEP CONVOLUTIONAL NEURAL NETWORK
The present invention relates to a preservation system for preserving privacy of outsourced data in a cloud based on a deep convolutional neural network (CNN). The system includes a key generation center, a cloud platform, a data user, and a CNN service providing unit. The key generation center is an entity trusted by all other entities in the system, and is responsible for distributing and managing all keys of a data user or a CNN service provider, and all boot keys of the cloud platform. The cloud platform stores and manages encrypted data outsourced from a registrant in the system, and provides a computing capability to perform a homomorphic operation on the encrypted data. The CNN service provider provides a required deep classification model for the data user, and a decision result reflects a current situation of the data user.
System and method for privacy-preserving data retrieval for connected power tools
A method for network-connected tool operation with user anonymity includes generating a first cryptographic key that is stored in a memory in the power tool, generating a first encrypted serial number for the power tool based on an output of an encryption function using the first cryptographic key applied to a non-encrypted serial number for the power tool stored in the memory, and generating usage data based on data received from at least one sensor in the power tool during operation of the power tool. The method further includes transmitting the usage data in association only with the first encrypted serial number from the power tool to a maintenance system to enable usage data collection that prevents identification of the power tool as being associated with the usage data.
ANONYMISING ROBOTIC DATA
A method is provided of anonymising data in a surgical robotic system. The surgical robotic system comprises a robot having a base and an arm extending from the base to an attachment for an instrument, the arm comprising a plurality of joints whereby the configuration of the arm can be altered. The method comprises receiving a data stream captured by the surgical robotic system, the data stream comprising data relating to a surgical procedure and comprising personally-identifiable data; determining one or more personally-identifiable feature in the received data stream; and generating, in dependence on the determined personally-identifiable feature and the received data stream, an anonymised data stream omitting the personally-identifiable data.
DISTRIBUTED BIOMETRIC COMPARISON FRAMEWORK
A method is disclosed. An authentication node may receive a plurality of encrypted match values, wherein the plurality of encrypted match values were formed by a plurality of worker nodes that compare a plurality of encrypted second biometric template parts derived from a second biometric template to a plurality of encrypted first biometric template parts derived from a first biometric template. The authentication node may decrypt the plurality of encrypted matchvalues resulting in a plurality of decrypted matchvalues. The authentication node may then determine if a first biometric template matches the second biometric template using the plurality of decrypted match values. An enrollment node may be capable of enrolling a biometric template and storing encrypted biometric template parts at worker nodes.
NETWORK NODE AUTHENTICATION
An authentication technique is disclosed that uses a distributed secure listing of transactions that includes encrypted data that can be used to authenticate a principal to a verifier.
Methods And Systems For Securing And Retrieving Sensitive Data Using lndexable Databases
The technology disclosed teaches protecting sensitive data in the cloud via indexable databases. The method includes identifying sensitive fields of metadata for encryption and for hashing. The method also includes hashing at least partial values in the indexable sensitive fields to non-reversible hash values, concatenating the non-reversible hash values with the metadata for the network events, and encrypting the sensitive fields of metadata. Also included is sending the metadata for the network events, with the non-reversible hash values and the encrypted sensitive fields, to a remote database server that does not have a decryption key for the encrypted sensitive fields and that indexes the non-reversible hash values for indexed retrieval against the indexable sensitive fields. The disclosed technology also teaches retrieving sensitive information that is secured at rest: receiving a sensitive field query, hashing the query, querying and receiving network event metadata responsive to the query, and decrypting the metadata.
FACILITATING QUERIES OF ENCRYPTED SENSITIVE DATA VIA ENCRYPTED VARIANT DATA OBJECTS
Various aspects of this disclosure provide digital data processing systems for using encrypted variant data objects to facilitate queries of sensitive data. In one example, a digital data processing system can receive sensitive data about an entity. The digital data processing system can create, in an identity data repository and from the sensitive data, a searchable secure entity data object for the entity. The searchable secure entity data object is usable for servicing a query regarding the entity. For instance, a transformed query parameter can be generated from a query parameter in the query. The query can be serviced by matching the transformed query parameter to tokenized variant data in the searchable secure entity data object and retrieving tokenized sensitive data from the searchable secure entity data object.
Anonymous allocation and majority voting in a compromised environment
Described is a system for anonymous job allocation and majority voting in a cloud computing environment. The system broadcasts a job to physical nodes, each of the physical nodes having a control operations plane (COP) node and one or more service nodes associated with the COP node. A set of redundant job assignments is distributed to individual COP nodes pursuant to a private job assignment schedule, such that each individual COP node is only aware of its own assignment and corresponding job. The service nodes execute the job assigned to the COP nodes such that the service nodes each complete a task associated with the job and forward an individual result to their associated COP node. A privacy-preserving result checking protocol is performed amongst the COP nodes such that secret shares of a majority result are obtained and the majority result is provided to a client.
SYSTEMS AND METHODS FOR COMMUNICATING TOKEN ATTRIBUTES ASSOCIATED WITH A TOKEN VAULT
Systems and methods for interoperable network token processing are provided. A network token system provides a platform that can be leveraged by external entities (e.g., third party wallets, e-commerce merchants, payment enablers/payment service providers, etc.) or internal payment processing network systems that have the need to use the tokens to facilitate payment transactions. A token registry vault can provide interfaces for various token requestors (e.g., mobile device, issuers, merchants, mobile wallet providers, etc.), merchants, acquirers, issuers, and payment processing network systems to request generation, use and management of tokens. The network token system further provides services such as card registration, token generation, token issuance, token authentication and activation, token exchange, and token life-cycle management.
USER EXPERIENCE USING PRIVATIZED CROWDSOURCED DATA
Embodiments described herein provide a privacy mechanism to protect user data when transmitting the data to a server that estimates a frequency of such data amongst a set of client devices. In one embodiment, a differential privacy mechanism is implemented using a count-mean-sketch technique that can reduce resource requirements required to enable privacy while providing provable guarantees regarding privacy and utility. For instance, the mechanism can provide the ability to tailor utility (e.g. accuracy of estimations) against the resource requirements (e.g. transmission bandwidth and computation complexity).