H04L2209/42

System and method for distributed, secure computing system
10825066 · 2020-11-03 · ·

A method for injecting data into a secure distributed computing system includes obtaining characteristics of an object via a secure operable connection from a smart silo. The method further includes verifying an identity of the smart silo based on credentials included in a message from the smart silo received via the secure operable connection. The method further includes making a determination that the characteristics match a trigger condition of a smart contract. The method further includes executing the smart contract in response to the determination.

Key attestation statement generation providing device anonymity

A computing device sends a request for an attestation certificate to an attestation service along with information regarding the hardware and/or software of the device. The attestation service processes the request and verifies the information received from the device. After verifying the information, the attestation service selects a public/private key pair from a collection of reusable public/private key pairs and generates an attestation certificate for the device and public key of the public/private key pair. This attestation certificate is digitally signed by the attestation service and returned to the device. The private key of the selected public/private key pair is also encrypted to a trusted secure component of the device, ensuring that the key cannot be stolen by malware and re-used on another device, and is returned to the device. The device uses this attestation certificate to access relying parties, and optionally generates additional public/private key pairs and attestation certificates.

DATA PROCESSING METHOD

There is disclosed a method of processing a data packet received by a packet sniffer, the packet containing an associated identifier, the method including transmitting the packet to a recipient, determining if the identifier corresponds to a particular network, wherein if the identifier is determined to correspond to the particular network, the identifier is provided to the recipient; and if the identifier is determined to not correspond to the particular network, the identifier is withheld from the recipient.

MULTIVARIATE ENCRYPTION SYSTEMS AND METHODS
20200336307 · 2020-10-22 ·

Multivariate encryption systems and methods are provided herein. An example method includes receiving a multivariate input set that includes a plurality of sensitive data objects arranged according to a record template, encrypting the multivariate input set into an encrypted representation, receiving a request for at least a portion of the plurality of sensitive data objects, extracting the at least a portion of the plurality of sensitive data object from the encrypted representation and generating a response message that includes only the at least a portion of the plurality of sensitive data objects that were extracted from the encrypted representation.

System and method for general data protection regulation (GDPR) compliant hashing in blockchain ledgers

A computer implemented system and method for providing general data protection regulation (GDPR) compliant hashing in blockchain ledgers. The invention guarantees a user's right to be forgotten, in compliance with the GDPR regulations, utilizing blockchain technologies.

COMPUTER-IMPLEMENTED PRIVACY ENGINEERING SYSTEM AND METHOD

A system allows the identification and protection of sensitive data in a multiple ways, which can be combined for different workflows, data situations or use cases. The system scans datasets to identify sensitive data or identifying datasets, and to enable the anonymisation of sensitive or identifying datasets by processing that data to produce a safe copy. Furthermore, the system prevents access to a raw dataset. The system enables privacy preserving aggregate queries and computations. The system uses differentially private algorithms to reduce or prevent the risk of identification or disclosure of sensitive information. The system scales to big data and is implemented in a way that supports parallel execution on a distributed compute cluster.

METHOD FOR VERIFYING OPINION BY USE OF BLOCK CHAIN WHICH GUARANTEES ANONIMITY AND PREVENTS SYBIL ATTACK
20200328874 · 2020-10-15 ·

The method of verifying an opinion includes, by an account module, receiving a request for identification information of the opinion (Ballot Stamp) from the user terminal; requesting a first random value to the user terminal; receiving a first homomorphic ciphertext from the user terminal; generating a second random value; storing a first value; generating a second homomorphic ciphertext from the Ballot Stamp; receiving a third homomorphic ciphertext obtained from a tag from an opinion verifying program module; and transmitting the second homomorphic ciphertext and the third homomorphic ciphertext to the user terminal. The method further includes, by the opinion verifying program module, receiving the tag obtained by decrypting the third homomorphic ciphertext, Ballot Stamp, and the opinion message, from the user terminal; and determining the opinion as being verified if the value calculated by the first arithmetic operation to the random value and Ballot Stamp is identical to the tag.

METHODS AND SYSTEMS FOR ENHANCING NETWORK PRIVACY OF MULTIPLE PARTY DOCUMENTS ON DISTRIBUTED LEDGER-BASED NETWORKS
20200328893 · 2020-10-15 ·

Embodiments of the instant disclosure include methods and systems directed at providing enhanced security and privacy to multiple party communications that occur on zero knowledge proof (ZKP)-enabled distributed ledger-based networks (DLNs). In particular, the methods and systems include subject matter related to the deployment, and approval, of a multi-party document or instrument for consideration and approval by multiple participants of the DLN.

Guided vehicle evaluation

A computer-implemented method for guided vehicle evaluation includes executing on a computer processor the step of receiving a vehicle identification number (VIN) for a vehicle and analyzing maintenance items and repair items for the vehicle from anonymized vehicle data identified by the VIN which identifies deviations from normal maintenance items and repair items identified by a decoded VIN. The anonymized vehicle data includes repair items and maintenance items performed on the vehicle and a vehicle mileage for each repair item and for each maintenance item. Expected service needs for the vehicle are computed based on the identified deviations from normal of maintenance items and repair items, and the expected service needs for the vehicle are displayed.

Retrieving public data for blockchain networks using trusted execution environments
10803205 · 2020-10-13 · ·

Disclosed herein are methods, systems, and apparatus, including computer programs encoded on computer storage media, for performing an attestation verification. One of the methods includes sending an attestation request to a relay system node by a relay system controller. The relay system controller receives an attestation evidence of the relay system node from the relay system node. The relay system controller sends the attestation evidence of the relay system node to an attestation verification server. The relay system controller receives an attestation verification report from the attestation verification server. The relay system controller sends the attestation verification report to a relay system smart contract.