H04L2209/42

BLOCKCHAIN TRANSACTIONS WITH RING SIGNATURES
20200202345 · 2020-06-25 · ·

A method includes: determining, by a computing device communicably coupled to a blockchain network, participants in a remittance transaction, in which each participant has a corresponding account in a blockchain ledger of the blockchain network, and in which each account includes one or more assets; assembling the remittance transaction based on one or more to-be-spent assets of the one or more assets in an account corresponding to a real remitter, one or more covered assets of the one or more assets in an account corresponding to a fake remitter, and one or more encrypted transfer amounts; generating a linkable ring signature for the remittance transaction based on a private key held by the real remitter, a public key held by the real remitter, and a public key held by the fake remitter; and submitting the remittance transaction and the linkable ring signature to the blockchain network for completion.

TERMINAL IDENTITY PROTECTION METHOD IN A COMMUNICATION SYSTEM
20200195427 · 2020-06-18 ·

A method for determining a terminal ID from a message received from a terminal in a communication system avoids sending the terminal ID in the clear. In this system each terminal ID has an associated encryption key. A transmitted message comprises at least a Message Authentication Code (MAC), a n-bit hash, and encrypted message text. At least the terminal key and a nonce is used to generate the MAC, and neither the terminal ID or the terminal key are included in the transmitted message. An authentication broker stores the set of all (terminal ID, terminal key) pairs for the plurality of terminals in the communication system. The set of all terminal keys is grouped into at least two partitions, and on receipt of a message the authentication broker identifies the partition that includes the terminal key of the terminal that transmitted the received message using the n-bit hash (the search partition). The authentication broker then searches the search partition for the terminal key that authenticates the MAC to identify the terminal ID. In some embodiments the nonce is not included in the message but is known or obtainable by the terminal and the authentication broker. A partitioning function generates the -bit hash from at least the nonce and a terminal key. In some embodiments the nonce is included in the received message and a partitioning function generates the n-bit hash by using the nonce to select n bits from the terminal ID. In some embodiments the partitions are arranged into hierarchical groups such as tree, and each node has a partition key, and the n-bit has is formed as the ordered set of MACs for the partition keys on the path from the root node to the leaf node partition that includes the terminal key.

APPARATUS AND METHOD FOR AUTOMATED PRIVACY PROTECTION IN DISTRIBUTED IMAGES
20200193053 · 2020-06-18 ·

A method executed by a computer includes receiving an image from a client device. A facial recognition technique is executed against an individual face within the image to obtain a recognized face. Privacy rules are applied to the image, where the privacy rules are associated with privacy settings for a user associated with the recognized face. A privacy protected version of the image is distributed, where the privacy protected version of the image has an altered image feature.

Data anonymizing blockchain system

An example operation may include one or more of storing encrypted IoT data as transactions in a blockchain, the IoT data being captured by one or more edge devices of an IoT network, receiving an identification of an event, and in response, retrieving encrypted IoT transaction data stored in the blockchain which is associated with the event, decrypting, via a blockchain node, the retrieved IoT transaction data associated with the event and generating anonymized data of the event from the decrypted IoT transaction data in which personally identifiable information is anonymized, and outputting information concerning the anonymized data of the event to one or more of a user device and a display device.

PRIVACY PROTECTION CAPABILITIES
20200186999 · 2020-06-11 ·

It is provided a method, comprising instructing a subscription device to indicate an applied privacy protection to a visited network; instructing the subscription device to provide a protected subscription identifier to the visited network, wherein the protected subscription identifier is based on a permanent subscription identifier protected according to the applied privacy protection.

SECURE COMPUTING HARDWARE APPARATUS
20200186350 · 2020-06-11 ·

A secure computing hardware apparatus includes at least a secret generator module, the at least a secret generator module configured to generate a module-specific secret, and a device identifier circuit communicatively connected to the at least a secret generator, the device identifier circuit configured to produce at least an output comprising a secure proof of the module-specific secret. Secret generator module may implement one or more physically unclonable functions to generate the module-specific secret.

TRANSACTION SCHEDULING METHOD AND APPARATUS
20200184093 · 2020-06-11 · ·

Implementations of this specification provide a method and apparatus for transaction scheduling in a blockchain. An example method performed by a node in the blockchain includes receiving a first privacy transaction, and determining a data volume of the first privacy transaction; determining a first summation value by adding the data volume of the first privacy transaction to a data volume of all privacy transactions in a buffer queue, and adding the first privacy transaction to the buffer queue; receiving a second privacy transaction, and determining a data volume of the second privacy transaction; determining a second summation value by adding the data volume of the second privacy transaction to a data volume of all privacy transactions in the buffer queue, and packaging all privacy transactions in the buffer queue and transferring the packaged privacy transactions into a trusted environment; and adding the second privacy transaction to the buffer queue.

Method for managing a trusted identity
10673632 · 2020-06-02 · ·

The invention is a method for deploying a trusted identity for a user issued by an issuer. The user has a user device configured to send a request for signature to an issuer device handled by the issuer. The request comprises a user public key allocated to the user. The issuer device is configured to compute an issuer signature by signing both the user's trusted identity and the user public key using an issuer private key allocated to the issuer. A block chain transaction containing the issuer signature is created and submitted to a Block Chain for transaction verification and storage.

Association establishment method in wireless local area network, terminal, and access point

A terminal, including a processor and a non-transitory computer-readable storage medium storing a program to be executed by the processor. The program includes instructions to generate encrypted capability information of the terminal, receive pre-association index information that is related to the terminal and that is sent by an access point, where the pre-association index information is used by the access point to identify the terminal when no association has been established between the terminal and the access point, send the encrypted capability information of the terminal and an association request message to the access point, where the association request message comprises the pre-association index information, and receive an association response message that is sent by the access point according to capability information of the terminal and the pre-association index information, so that the terminal establishes an association with the access point.

BLOCKCHAIN-BASED DATA PROCESSING METHOD, APPARATUS, AND BLOCKCHAIN NODE
20200169386 · 2020-05-28 · ·

Implementations of the present specification provide a blockchain-based data processing method, apparatus, and computer-readable medium. The method includes obtaining transaction data to be processed; and in response to determining that the transaction data includes a plurality pieces of proof data, invoking a verification program deployed in the blockchain and verifying the plurality pieces of proof data in parallel.