H04L2209/42

SYSTEMS AND METHODS FOR DETECTING AND REMEDYING THEFT OF DATA

The present disclosure relates to systems and methods for information security, specifically for automatically detecting theft of personal data. In one implementation, a computer-implemented method for automatically detecting theft of personal data on the Internet may include at least one processor configured to execute instructions, the instructions including receiving from a user, an electronic communication containing a first search term, extracting via pattern recognition one or more patterns corresponding with the first search term, and comparing the one or more patterns with a subset of data scraped from the Internet, with the subset of data scraped from the Internet being indexed by pattern for the first search term. The instructions may also include flagging matches of the one or more patterns with the subset of data based on the comparison and transmitting information associated with the matches in a report that indicates a possible theft of personal data.

SYSTEM AND METHOD FOR HYBRID MODEL ELECTRONIC VOTING
20200226866 · 2020-07-16 ·

Hybrid model electronic voting system and method for enabling individual voters to remotely cast a ballot electronically via inputs to a receiver where a user controls a mechanical system that produces a physical, readable ballot. The voting system comprises a voter interface device communicatively coupled to a data network, the voter interface device including a screen, the voter interface device configured to generate an input command containing a ballot selection; a portal server including a database containing an eligibility list, the portal server communicatively coupled to the data network and configured to connect to the voter interface device over the data network to validate an eligibility of a voter operating the voter interface device by comparing the voter to the eligibility list; a voting machine including a physical marking device and a camera, the voting machine communicatively coupled to the data network.

Cryptologic blockchain-based custody and authorization tracking for physical concessions

A system supports authorization and custody tracking for physical concessions. In some cases, a physical concession or other physical object may be tracked to ensure that custodians that gain possession of the physical concession have proper authorization. Further, custody tracking may ensure that a particular custodian is issued the authorized amount of physical concession(s). Authorization circuitry may, via a peer network, access proof of authorization and custody status stored on a blockchain. Based on the proof of authorization and custody status, the authorization circuitry may determine whether issuance of the physical concession to a receiving custodian is allowed. After allowing/disallowing issuance of the physical concession, tracking circuitry may send, via the peer network, a request to update the blockchain.

DATA SEARCHING SYSTEM, DATA SEARCHING METHOD AND COMPUTER READABLE MEDIUM

In a personal searching-purpose ID (511), a personal encryption ID (512) and encrypted personal information (513) stored in a personal information storage unit (51), a disclosure range of personal information is embedded. Also, in a medical searching-purpose ID and a medical encryption ID stored in a medical data storage unit, a disclosure range of medical data is embedded. A search query generation unit generates a search query Q by encrypting a search anonymous ID subject to searching acquired from a user with attribution information of the user embedded. Then, a searching unit executes confidential searching on the personal searching-purpose ID (511) and a pathological searching-purpose ID (521), using the search query Q. The searching unit outputs a searching result acquired based on the attribution information of the user, the disclosure range of personal information and the disclosure range of medical data.

Multivariate encryption systems and methods
10708050 · 2020-07-07 · ·

Multivariate encryption systems and methods are provided herein. An example method includes receiving a multivariate input set that includes a plurality of sensitive data objects arranged according to a record template, encrypting the multivariate input set into an encrypted representation, receiving a request for at least a portion of the plurality of sensitive data objects, extracting the at least a portion of the plurality of sensitive data object from the encrypted representation and generating a response message that includes only the at least a portion of the plurality of sensitive data objects that were extracted from the encrypted representation.

ACCESS DEVICE BLOCKCHAIN NETWORK SYSTEMS AND METHODS
20200213215 · 2020-07-02 ·

Systems and methods are disclosed in which access devices such as routers and switches form a blockchain network. Each router and switch stores and maintains a local copy of a network topology ledger for which a consensus agreement has been obtained among the routers and switches. The consensus agreement may be based on a validation of one or more fingerprints for one or more blocks of information in the ledger. The fingerprint for each block may be based on information in a preceding block. The network topology ledger includes device identification, routing, and/or other information for device authentication and packet routing by the routers and switches.

CONFIDENTIAL BLOCKCHAIN TRANSACTIONS
20200213134 · 2020-07-02 · ·

A computer-implemented method includes: determining assets held by a remitter, the assets to be spent in a remittance transaction between the remitter and one or more payees, in which each asset corresponds to a respective asset identifier, a respective asset amount, and a respective asset commitment value; determining a remitter pseudo public key and a remitter pseudo private key; determining a cover party pseudo public key, in which the cover party pseudo public key is obtained based on asset commitment values of assets held by the cover party; and generating a linkable ring signature for the remittance transaction.

Customized View Of Restricted Information Recorded Into A Blockchain
20200204563 · 2020-06-25 · ·

Systems, methods, and software are disclosed herein to generate a customized view of a blockchain transaction. A blockchain of block entries requested by a plurality of users from user devices is maintained in a distributed network of nodes. The block entries each comprise a plurality of data portions that are each associated with an access level. A request to view one or more data portions of a block entry is received which includes an access code associated with at least one access level. The access code in the request is evaluated with the blockchain of block entries to identify one or more data portions associated with the access level. A customized view of the block entry is generated which includes the one or more data portions associated with the access level.

Blockchain Overwatch
20200204524 · 2020-06-25 · ·

Various embodiments of the present technology provide a distributed overwatch system that allows transactions with government-grade privacy and security. The security and privacy can be achieved by a combination of distributed trusted proxies, to which anonymous users connect with the overwatch of a variety of network security engines. The structured ecosystem provides mechanism for the blockchain to be monitored by an overwatch capability combining big data analytics, intelligent learning, and comprehensive vulnerability assessment to ensure any risks introduced by vulnerabilities are effectively mitigated. The system may include multiple proxy servers geographically distributed around the world. Each proxy can be associated with local network security engines to probe and analyze network traffic. Each proxy can mask sensitive data (e.g., personally identifiable information) within the transaction before it is stored. Various embodiments can interface with most blockchain or distributed ledger technologies that support multi-signature transactions and/or smart contracts.

BLOCKCHAIN-BASED TRANSACTION PROCESSING
20200201846 · 2020-06-25 · ·

This disclosure relates to blockchain-based transaction processing. In one aspect, a method includes obtaining pieces of transaction data. At least a portion of the pieces of transaction data have a respective group identifier that identifies a node group for the piece of transaction data. Each node group includes multiple blockchain nodes. Pieces of transaction data that have a same first group identifier that identifies a first node group are identified in the obtained pieces of transaction data. The pieces of transaction data are packaged into a first packaging result based on the pieces of transaction data having the same first group identifier. The first packaging result is submitted to a blockchain for storage.