H04L2209/42

Methods and systems for implementing an anonymized attestation chain
10735205 · 2020-08-04 ·

A system for implementing an anonymized attestation chain. The system includes a first device having a first hardware-generated secret and a first verification datum linked to the first hardware-generated secret. The first device is designed and configured to receive an originating signature from an originating device and an originating verification datum. The originating signature includes a secure proof of an originating device secret. The originating signature signs a message referencing the first verification datum, and the originating signature is verified by the originating verification datum. First device generates a first anonymized signature set. The first anonymized signature set includes a modified first verification datum, a modified originating signature, and a modified originating verification datum. First devices delegates the at least a credential to a second verification datum.

Anonymous consent and data sharing on a blockchain

An example operation may include one or more of storing a user profile in a blockchain by an authorized member of the blockchain, receiving a request by another authorized member of the blockchain to access the user profile, identifying the request for the user profile is from the another authorized member of the blockchain, creating a signed message that includes consent to share the user profile with the another authorized member of the blockchain, and transmitting the signed message to the another authorized member of the blockchain, and wherein an exchange of the user profile between the blockchain members is performed without revealing blockchain member identities of the authorized member of the blockchain and the another authorized member of the blockchain to any of the blockchain members.

METHOD FOR ISSUING AUTHORISATION TICKETS IN AN INTELLIGENT TRANSPORT SYSTEM
20200242572 · 2020-07-30 ·

The present application discloses a method of issuing pseudonymous authorisation tickets to nodes of a cooperative ITS, for signing messages, comprising: receiving a ticket request from a node in an authorisation server, and sending a validation request to an enrolment server, conducting a validity check in the enrolment server, and, when the validity check is passed, incrementing a counter value of a counter assigned to an account at an account server enrolled with the enrolment server for the requesting node, sending a validation message to the authorisation server, and issuing a pseudonymous authorisation ticket from the authorisation server to the requesting node, repeating the aforementioned steps until a predetermined charging period expires, and, upon expiry, sending, from the enrolment server to the authorisation server, said counter value, and sending a charging request calculated from said counter value from the authorisation server to the account server for charging said account.

SYSTEMS AND METHODS FOR PRESERVING THE ANONYMITY OF PROVISIONAL BALLOTS
20200242872 · 2020-07-30 ·

A computer-implemented method for preserving the anonymity of a provisional ballot cast by a voter in an election whose eligibility to vote in the election is not yet determined comprises including a machine-readable identification marking representing an identification code associated with the voter on the paper card utilized by a voting device associating the identification code represented by the machine-readable identification marking with the contest choices stored in the results database. In this manner, upon a determination that the voter is either eligible or ineligible to vote in the election, the contest choices of the voter can be included in or excluded from, respectively, the results of the election by identifying the identification code associated with the voter and including or excluding, respectively, the contest choices associated with the identification code.

Differential privacy using a multibit histogram

Embodiments described herein ensure differential privacy when transmitting data to a server that estimates a frequency of such data amongst a set of client devices. The differential privacy mechanism may provide a predictable degree of variance for frequency estimations of data. The system may use a multibit histogram model or Hadamard multibit model for the differential privacy mechanism, both of which provide a predictable degree of accuracy of frequency estimations while still providing mathematically provable levels of privacy.

Method for authenticating client system, client device, and authentication server
10728232 · 2020-07-28 · ·

Provided are a client system authentication method, a client device, and an authentication server. The client system authentication method includes acquiring a shared key to be shared between a client system and an authentication server in cooperation with the authentication server, generating a virtual address of the client system using identification information of the client system and the shared key, transmitting registration request information including the virtual address to the authentication server, and receiving an authentication key for the client system from the authentication server.

System for association of customer information across subscribers

The disclosed technology relates to a context service system configured to receive, from a subscriber, a shared customer lookup request that includes a first customer data identifier and identify, in a shared data partition, a second customer data identifier associated with the first customer data identifier. The context service system is further configured to determine that the second customer data identifier is associated with customer information in a subscriber data partition and transmit, to the subscriber system, the customer information from the subscriber data partition.

Distributed Anonymous Scoring Technique

In some examples, a system for implementing a protocol for data transmission can include a processor to transmit a public key or an encrypted name to a ledger of a source computing device and receive a scoring code, training data, and data definitions from the source computing device. The processor can also transmit predicted labels encrypted with the public key to the source computing device, the predicted labels based on the training data and the data definitions, and receive labeled test data from the source computing device. The processor can also transmit decrypted predicted labels to the source computing device, receive a list of evaluation results from a set of remote computing devices, transmit scoring results based on the list of evaluation results to the set of remote computing devices, and execute an instruction based on a techniques corresponding to a highest score from the scoring results.

SECURITY MANAGEMENT SYSTEM FOR VEHICLE COMMUNICATION, OPERATING METHOD THEREOF, AND MESSAGE-PROCESSING METHOD OF VEHICLE COMMUNICATION SERVICE PROVISION SYSTEM HAVING THE SAME
20200235946 · 2020-07-23 ·

A method of operating a vehicle communication security management system includes receiving a request for registration in a vehicle communication service from a vehicle, generating a security policy corresponding to the request for registration and a pseudonym corresponding to the vehicle, transmitting a request to generate a pseudonym certificate corresponding to the generated pseudonym to a certification center, receiving the pseudonym certificate from the certification center in response to the request to generate the pseudonym certificate, and transmitting vehicle communication service registration information, corresponding to the request for registration in the vehicle communication service, to the vehicle.

SYSTEM AND METHOD FOR HEALTHCARE SECURITY AND INTEROPERABILITY
20200235909 · 2020-07-23 ·

Disclosed embodiments facilitate healthcare system security and interoperability. In some embodiments, a first entity may receive, in response to a transaction at a first time, encrypted information blocks pertaining to the transaction from one or more second entities. Each encrypted information block may be received from a distinct second entity and may comprise at least one sub-block decryptable by the first entity. The first entity may decrypt the decryptable sub-blocks and augment a multi-dimensional blockchain. The multi-dimensional blockchain may be augmented with a multi-dimensional block formed by linking at least one of the encrypted information blocks received from the one or more second entities to a current block being added to a blockchain associated with the transaction and maintained by the first entity. The first entity may then enable access to the multi-dimensional blockchain for at least one of the one or more second entities.