H04L2209/42

ACCURATE, REAL-TIME AND SECURE PRIVACY-PRESERVING VERIFICATION OF BIOMETRICS OR OTHER SENSITIVE INFORMATION
20200358611 · 2020-11-12 ·

A facility for performing accurate and real-time privacy-preserving biometrics verification in a client-server environment is described. The facility receives the user's biometrics data such as face, voice, fingerprint, iris, gait, heart rate, etc. The facility then processes and applies various privacy-preserving techniques to this data to complete enrollment and authenticate users, including but not limited to: encrypting data with a key using homomorphic encryption techniques and sending the encryption to the server; the server computes directly on the encryption and returns the result, which is also encrypted under the same key, to the client; the client optionally performs post-processing and decryption (in any order) and obtains the enrollment or authentication result. The facility may repeat this process to increase security level, resulting in more than 1 round trip between the client and the server. Lastly, the facility employs methods that generalize to other privacy-preserving applications beyond biometrics verification.

THREAT INFORMATION SHARING BASED ON BLOCKCHAIN
20200358801 · 2020-11-12 ·

Embodiments of the present systems and methods may provide a platform for threat information sharing. For example a method may comprise transmitting an access permission request to a blockchain network, the access permission request requesting permission to access cyber threat information stored in at least one cyber threat information storage system storing cyber threat information from a plurality of organizations, the blockchain network including a blockchain ledger storing access control information from the plurality of organizations, receiving a reference to an access permission token to be used to access the cyber threat information, the access permission token generated by the blockchain network using at least one smart contract, transmitting a transaction request to the cyber threat information server, the transaction request including the reference to the access permission token, and receiving the requested cyber threat information, wherein the requested cyber threat information was retrieved from the cyber threat information server using the access permission token.

PRIVACY-ENHANCED METHOD FOR LINKING AN ESIM PROFILE
20200359184 · 2020-11-12 ·

A temporary EID (TEID) is generated based on an indicator of a hash algorithm, a nonce, and a hash generated using the hash algorithm. The hash is generated based on the indicator, nonce, and EID of a mobile device. The TEID is sent to the mobile network operator to identify the mobile device in lieu of using the device's EID. The TEID is stored in a data store and an eSIM profile for the mobile device is associated the TEID. The mobile device sends to an eSIM server the device's EID over a secure communications channel. The eSIM server generates a hash using the indicator and nonce contained in the stored TEID and the EID of the mobile device. The eSIM server verifies that the generated hash matches the hash contained in the TEID stored in the data store. If the hash matches, the eSIM server sends, to the mobile device, subscription credentials for accessing the mobile network in accordance with the data plan.

PRIVATE AND FEDERATED LEARNING

Techniques regarding privacy preservation in a federated learning environment are provided. For example, one or more embodiments described herein can comprise a system, which can comprise a memory that can store computer executable components. The system can also comprise a processor, operably coupled to the memory, and that can execute the computer executable components stored in the memory. The computer executable components can comprise a plurality of machine learning components that can execute a machine learning algorithm to generate a plurality of model parameters. The computer executable components can also comprise an aggregator component that can synthesize a machine learning model based on an aggregate of the plurality of model parameters. The aggregator component can communicate with the plurality of machine learning components via a data privacy scheme that comprises a privacy process and a homomorphic encryption process in a federated learning environment.

COMPUTER-IMPLEMENTED METHOD FOR MANAGING USER-SUBMITTED REVIEWS USING ANONYMOUS REPUTATION SYSTEM
20200349616 · 2020-11-05 ·

The disclosure relates to implementing an anonymous reputation system for managing user reviews. In one arrangement, an anonymous reputation system is constructed from a group of group signature schemes run in parallel. Each item of a plurality of items is associated uniquely with one of the group signature schemes. A user is allowed to join the group signature scheme associated with the item when information indicating that the user has performed a predetermined operation associated with the item is received. The user can submit a review of the item when the user has joined the group signature scheme associated with the item (6). The anonymous reputation system is publicly linkable and non-frameable (8a, 8b).

VEHICLE INFORMATION INQUIRY METHOD
20200349285 · 2020-11-05 · ·

Disclosed is a vehicle information inquiry method including a logging step of acquiring an event ID for sharing anonymized vehicle information and vehicle travel information corresponding to the event ID from an external device, by a central server, a query step of receiving an inquiry about the event ID and the vehicle travel information corresponding to the event ID from an inquiry server, by the central server, and a responding step of transmitting the vehicle travel information corresponding to the event ID received from the inquiry server to the inquiry server, by the central server.

SYSTEM FOR ASSOCIATION OF CUSTOMER INFORMATION ACROSS SUBSCRIBERS
20200351375 · 2020-11-05 ·

The disclosed technology relates to a context service system configured to receive, from a subscriber, a shared customer lookup request that includes a first customer data identifier and identify, in a shared data partition, a second customer data identifier associated with the first customer data identifier. The context service system is further configured to determine that the second customer data identifier is associated with customer information in a subscriber data partition and transmit, to the subscriber system, the customer information from the subscriber data partition.

CONFLICT RESOLUTION FOR BLOCKCHAIN STORAGE STRUCTURE
20200349283 · 2020-11-05 ·

An example operation may include one or more of receiving a content request to add a content to a blockchain storage structure implemented on a blockchain database, temporarily storing the content of the content request in a queue implemented via the blockchain database based on when the request is received, receiving a request to flush the queue which is invoked by chaincode, and in response to the flush request, removing the content from the queue and adding the content to the blockchain storage structure.

PRIVACY-PRESERVING ANOMALOUS BEHAVIOR DETECTION
20200349284 · 2020-11-05 ·

An example operation may include one or more of storing a tree structure via a blockchain storage, the tree structure comprising anonymous behavior data of a plurality of blockchain participants stored in a plurality of nodes in a hierarchical structure, receiving a request to add new anonymous behavior data to the tree structure, the request comprising a zero-knowledge proof generated by a blockchain participant, identifying an active leaf on the tree structure which stores previously recorded anonymous behavior data of the blockchain participant associated with the request based on the zero-knowledge proof, generating a new active leaf for the blockchain participant based on the new anonymous behavior data and the previously recorded anonymous behavior, and storing the new active leaf as a leaf node on the tree structure in the blockchain storage.

Integrity of communications between blockchain networks and external data sources
10824763 · 2020-11-03 · ·

Methods, systems, and apparatus, including computer programs encoded on computer storage media, for retrieval of data from external data sources for processing within a blockchain network. One of the methods includes receiving a request for data from a data source, the request including plaintext data and encrypted data, the encrypted data including access data and a hash of the plaintext data; transmitting the request to one relay system component external to the blockchain network; receiving a result from the relay system component that is digitally signed using a private key of the relay system component; verifying an integrity of the result based on a public key of the relay system component; and transmitting the result to a user computing device in response to verifying the integrity of the result.