Patent classifications
H04L2209/42
CONFIDENTIAL BLOCKCHAIN TRANSACTIONS
A computer-implemented method includes: determining assets held by a remitter, the assets to be spent in a remittance transaction between the remitter and one or more payees, in which each asset corresponds to a respective asset identifier, a respective asset amount, and a respective asset commitment value; determining a remitter pseudo public key and a remitter pseudo private key; determining a cover party pseudo public key, in which the cover party pseudo public key is obtained based on asset commitment values of assets held by the cover party; and generating a linkable ring signature for the remittance transaction.
SELECTIVE DISCLOSURE OF ATTRIBUTES AND DATA ENTRIES OF A RECORD
Some embodiments are directed to a system for selectively disclosing attributes and data entries of a record. An issuer device generates a digital signature on a message comprising the attributes and a secret record identifier, and digital signatures on messages comprising respective data entries and each comprising the secret record identifier. The record, secret record identifier, and signatures are provided to a selector device. The selector device selectively discloses attributes and data entries of the record to a receiver device, proving authenticity by means of a zero-knowledge proof of knowledge of the signature on the attributes and signatures on respective data entries. The receiver device verifies the proof with respect to the public key of the issuer and the received attributes and data entries.
Method and device for converting data containing user identity
A method for automatically converting electronic data is disclosed. The method comprises scanning a source data table containing data fields; determining a feature for each of the data fields of the source data table; comparing the feature for each of the data fields with a feature rule for identifying user-identity-containing data fields in the source data table; identifying a first data field of the source data table as containing user identity when the feature of the first data field matches the feature rule; identifying a second data field of the source data table as containing no user identity when the feature of the second data field fails to match the feature rule; converting the source data table by replacing data items of the first data field in the source data table identified as containing user identity with corresponding third-party user accounts, and keeping the second data field in the source data table identified as not containing user identity unaltered; and storing the converted data table in a storage medium.
Audio path sealing
In accordance with some embodiments, an apparatus for privacy protection is provided. The apparatus includes a first housing portion and a second housing portion arranged to receive and enclose one or more personal communication devices. The apparatus further includes at least one sound attenuation layer disposed in the second housing portion, the at least one sound attenuation layer absorbs sound. The apparatus also includes a noise generator to provide one or more noise signal streams and audio output device(s), which are at least partially supported by the first housing portion and coupled to the noise generator to receive the one or more noise signal streams. The audio output device(s) are operable to output noise signal based on the one or more noise signal streams and direct the noise signal at the one or more personal communication devices placed adjacent the at least one sound attenuation layer.
Timestamp order-preserving encryption of network traffic traces
According to examples, an apparatus may include a processor and a memory on which is stored machine readable instructions to cause the processor to access network traffic traces including a plurality of timestamps, the plurality of timestamps having an order with respect to each other. The instructions may also cause the processor to encrypt the plurality of timestamps to anonymize the plurality of timestamps while preserving the order of the plurality of timestamps with respect to each other and to store the encrypted plurality of timestamps in a data store.
Dynamic blockchain system and method for providing efficient and secure distributed data access, data storage and data transport
A dynamic blockchain system includes: at least one complete asset node server, including a complete asset manager and a complete asset storage; a plurality of hash asset node servers, each including a hash asset manager and an asset blockchain and; a dynamic blockchain management server, including a blockchain manager, a representation calculation function, and an asset map with a plurality of map records; and a blockchain management device; such that the dynamic blockchain management server validates a digital asset by lookup in the at least one complete asset node server and by verification of the digital asset by a random sampling in a statistically significant number of hash asset node servers in the plurality of hash asset node servers.
Electronic Healthcare Record Data Blockchain System
An Electronic Health Record (EHR) data blockchain system configured to allow multiple entities (e.g., pharmacy industry entities that can act as data, service, product providers, and consumers) to connect to an EHR patient transaction blockchain (e.g., EHR-DATA-BC) and an EHR Data Patient Portal (e.g., EHR-Data-PP) to provide a centralized location for messages and subsequent edits to ensure uniform message data is presented. The EHR data blockchain system can include an EHR Data API, an EHR patient transaction blockchain API, and an EHR patient transaction blockchain. The EHR Data API can access and retrieve patient identifiable information (PII) and generate a non-patient-identifiable Single Purpose Patient ID (SPPID) for a particular patient. The EHR patient transaction blockchain API (e.g., EHR-DATA-BC-API) can store the SPPID, store particular, discrete data retrieved from the EHR for a patient, execute smart contracts, and control the execution of digital currency transfers, among other functions.
Electronic Healthcare Record Data Blockchain System and Process
An Electronic Health Record (EHR) data blockchain system configured to allow multiple entities (e.g., pharmacy industry entities and healthcare providers that can act as data, service, product and service providers, and consumers) to connect to an EHR patient transaction blockchain (e.g., EHR-DATA-BC) and an EHR Data Patient Portal (e.g., EHR-Data-PP) to provide a centralized location for messages and subsequent edits to ensure uniform message data is presented. The EHR data blockchain system can include an EHR Data API, an EHR patient transaction blockchain API, and an EHR patient transaction blockchain. The EHR data blockchain system can provide workflow on the blockchain that can utilize smart contracts to define workflow processes, expected outcomes, and financial costs. When a prescription transaction is complete, it will result in the settlement of each of the smart contracts that were added to the prescription workflow.
Key Attestation Statement Generation Providing Device Anonymity
A computing device sends a request for an attestation certificate to an attestation service along with information regarding the hardware and/or software of the device. The attestation service processes the request and verifies the information received from the device. After verifying the information, the attestation service selects a public/private key pair from a collection of reusable public/private key pairs and generates an attestation certificate for the device and public key of the public/private key pair. This attestation certificate is digitally signed by the attestation service and returned to the device. The private key of the selected public/private key pair is also encrypted to a trusted secure component of the device, ensuring that the key cannot be stolen by malware and re-used on another device, and is returned to the device. The device uses this attestation certificate to access relying parties, and optionally generates additional public/private key pairs and attestation certificates.
CHANNELING DATA WITH DECENTRALIZED IDENTITY STORES
Channeling data with at least partially synchronized decentralized identity stores The computing system monitors latency in interfacing with each of at least some of the multiple of decentralized identity stores. In response to the computing system determining that data is to be channeled between (e.g., written to or read from) one of the decentralized identity stores and the computing system, the computing system selects one of the decentralized identity stores based on the monitored latency of each of at least some of the multiple decentralized identity stores. Then, the data is channeled with the selected decentralized identity store. For instance, that data might be read from or written to the selected decentralized identity store.