H04L2209/42

Systems and methods for securing data to an immutable distributed ledger

The disclosed computer-implemented method for securing data on blockchains may include receiving a smart contract from a third-party for a designated party and a data set, transmitting, to a network of nodes, a request to add the smart contract and the data set to an immutable distributed ledger, receiving a digital signature from the third-party, receiving a digital signature from the designated party, validating the smart contract, the digital signature from the third-party, and the digital signature from the designated party, and in response to validating the smart contract, the digital signature from the third-party and the digital signature from the designated party, adding the smart contract and the data set to the immutable distributed ledger. Various other methods, systems, and computer-readable media are also disclosed.

A METHOD AND APPARATUS FOR SECURING HEALTH DATA
20200372179 · 2020-11-26 ·

The present invention relates to a method, apparatus and system for securing health data for transportation over communications network. It is important that heath data of a patient be kept secure. The apparatus and system of this invention secure health data for transport by preparing the health data in an anonymous form and associating a token with the health data. The token is used to secure the health data and also to enable access to the health data.

METHOD AND SYSTEM FOR GENERALIZED PROVENANCE SOLUTION FOR BLOCKCHAIN SUPPLY CHAIN APPLICATIONS

A method for conveying auditable information regarding provenance of a product that is cryptographically accurate while retaining complete anonymity of product and participant on a blockchain includes: receiving a product identifier; generating a digital token by applying a hashing algorithm to the product identifier; generating an entry value by applying the hashing algorithm to a combination of an event identifier and the digital token; generating a digital signature by digitally signing a data package using a private key of a cryptographic key pair, where the data package includes at least a blockchain address, the event identifier, and the digital token; and transmitting the blockchain address, the digital signature, and the entry value to a node in a blockchain network.

Service for users to voluntarily self-identify in over the top (OTT) messaging
10846419 · 2020-11-24 · ·

A method enables a user to self-identify to a user support system when a user electronic device is connected to the user support system by an over-the-top (OTT) communication session where an OTT messaging service provides an anonymous identifier to the user support system to enable communication with the user. The method includes receiving a secured real identifier and a secured token from the user electronic device in response to a user selection to self-identify to the user support system, decrypting the secured real identifier to determine a real identifier that identifies user account information at an external system, determining the anonymous identifier for the user using the secured token in a manner that associates the real identifier with the OTT communication session, and sending the real identifier to the user support system to enable access to the user account information by the user support system.

DEVICE FOR SECURE COMPUTING THE VALUE OF A FUNCTION USING TWO PRIVATE DATASETS WITHOUT COMPROMISING THE DATASETS AND METHOD FOR COMPUTING THE SOCIAL RATING USING THE DEVICE

The invention relates to data protection means and can be used for cooperative computing by two or more parties without revealing to each other the private data used. The technical result is to ensure the privacy of large amounts of data belonging to different parties, and to reduce the amount of memory secured from unauthorized reading during computations. Such an effect is achieved due to forming the first and the second private datasets, where the first and the second private datasets use user identifiers, wherein the first private dataset contains user ratings matched to the user identifiers, and the second private dataset, for each of the user identifiers, contains an array of user identifiers from the social environment of the respective users; by the user identifiers from the social environment of the selected user, computing the social rating of the selected user as a function of the number of users from the social environment and the rating values of the users from the social environment. Wherein the data on social ratings of users are transmitted in encrypted form.

Outsourcing Exponentiation in a Private Group
20200366482 · 2020-11-19 · ·

A method for outsourcing exponentiation in a private group includes executing a query instruction to retrieve a query element stored on an untrusted server by selecting a prime factorization of two or more prime numbers of a modulus associated with the query element stored on the server, obtaining a group element configured to generate a respective one of the prime numbers, generating a series of base values using the prime factorization and the group element, and transmitting the series of base values from the client device to the server. The server is configured to determine an exponentiation of the group element with an exponent stored on the server using the series of base values. The method also includes receiving a result from the server based on the exponentiation of the group element with the exponent.

Authentication and key agreement in communication network
10841784 · 2020-11-17 · ·

A method for authentication and key agreement in a communication network is disclosed. In the method, a network node generates a common public key and a master secret key, assigns to a first user equipment a first set of one or more pseudonym identifications corresponding to a real identity of the first user equipment, the common public key and a first private key specific to the first user equipment, and assigns to a second user equipment a second set of one or more pseudonym identifications corresponding to a real identity of the second user equipment, the common public key and a second private key specific to the second user equipment. In response to a request for establishing a communication session between the first user equipment with a first pseudonym identification and the second user equipment with a second pseudonym identification, the network node generates a first intermediate key for the first user equipment based on the common public key and a second secret key shared between the second user equipment and the network node, and a second intermediate key for the second user equipment based on the common public key and a first secret key shared between the first user equipment and the network node. Upon successfully authenticate each other based on the common public key, the first and second user equipments generate a session key to be used for securing the communication session based on the first and second intermediate keys respectively.

Active control of anonymous forum for members of service

A method and system of providing emotional health support resources to a member of a service (MOS) are provided. A data packet is received from a user device of a user. A group identification (ID) is extracted from the data packet. The group ID is sent to an authentication server for authentication. Upon not receiving a token from the authentication server, the user is blocked from support resources of a private network. Upon receiving a token from the authentications server, the user is identified as an anonymous authorized member of service (MOS). Information is interactively requested and received from the anonymous MOS. One or more support resources of the private network are identified based on the received information from the anonymous MOS. Access is provided to the one or more support resources of the private network via the user device.

Privacy-Preserving Benchmarking with Interval Statistics Reducing Leakage
20200358594 · 2020-11-12 ·

Disclosed herein are computer-implemented method, system, and computer-program product (computer-readable storage medium) embodiments for benchmarking with statistics in a way that reduces leakage, preserving privacy of participants and secrecy of participant data. An embodiment includes receiving a plurality of encrypted values and computing a composite statistic corresponding to at least a subset of the plurality of encrypted values. An embodiment may further include outputting the at least one composite statistic. The composite statistic may be calculated to be distinct from any encrypted value of the plurality of encrypted values, thereby preserving privacy. Further embodiments may also include generating a comparison between the composite statistic and a given encrypted value of the plurality of encrypted values, as well as outputting a result of the comparison. In some embodiments, encrypted values may be encrypted using at least one encryption key, for example, according to a homomorphic or semi-homomorphic encryption scheme.

DIFFERENTIAL PRIVACY USING A MULTIBIT HISTOGRAM

Embodiments described herein ensure differential privacy when transmitting data to a server that estimates a frequency of such data amongst a set of client devices. The differential privacy mechanism may provide a predictable degree of variance for frequency estimations of data. The system may use a multibit histogram model or Hadamard multibit model for the differential privacy mechanism, both of which provide a predictable degree of accuracy of frequency estimations while still providing mathematically provable levels of privacy.