Patent classifications
H04L2209/42
Apparatus and method for automated privacy protection in distributed images
A method executed by a computer includes receiving an image from a client device. A facial recognition technique is executed against an individual face within the image to obtain a recognized face. Privacy rules are applied to the image, where the privacy rules are associated with privacy settings for a user associated with the recognized face. A privacy protected version of the image is distributed, where the privacy protected version of the image has an altered image feature.
AUTOMATED MANAGEMENT OF BLOCKCHAIN KNOWLEDGE REPOSITORIES
In one example aspect, a first content item is received. First metadata from the first content item; detecting a match between the first metadata and at least one predetermined metadata element in a knowledge repository pertaining to a target blockchain context; determining a first blockchain wallet address associated with the first content item; locating a second content item based on the first blockchain wallet address; extracting second metadata from the second content item; and updating the knowledge repository based on the second metadata extracted from the second content item.
METHODS AND SYSTEMS FOR ENHANCING PRIVACY AND EFFICIENCY ON DISTRIBUTED LEDGER-BASED NETWORKS
One or more embodiments described herein disclose methods and systems that are directed at providing enhanced privacy, efficiency and security to distributed ledger-based networks (DLNs) via the implementation of zero-knowledge proofs (ZKPs) in the DLNs. ZKPs allow participants of DLNs to make statements on the DLNs about some private information and to prove the truth of the information without having to necessarily reveal the private information publicly. As such, the disclosed methods and systems directed at the ZKP-enabled DLNs provide privacy and efficiency to participants of the DLNs while still allowing the DLNs to remain as consensus-based networks.
METHODS AND SYSTEMS FOR ENHANCING PRIVACY ON DISTRIBUTED LEDGER-BASED NETWORKS
One or more embodiments described herein disclose methods and systems that are directed at providing enhanced privacy and security to distributed ledger-based networks (DLNs) via the implementation of zero-knowledge proofs (ZKPs) in the DLNs. ZKPs allow participants of DLNs to make statements on the DLNs about some private information and to prove the truth of the information without having to necessarily reveal the private information publicly. As such, the disclosed methods and systems directed at the ZKP-enabled DLNs provide privacy to participants of the DLNs while still allowing the DLNs to remain as consensus-based networks.
METHODS AND SYSTEMS FOR IMPLEMENTING ZERO-KNOWLEDGE PROOFS IN TRANSFERRING PARTITIONED TOKENS ON DISTRIBUTED LEDGER-BASED NETWORKS
One or more embodiments described herein disclose methods and systems that are directed at providing enhanced privacy, efficiency, convenience and security to distributed ledger-based networks (DLNs) via the implementation of zero-knowledge proofs (ZKPs) in the DLNs. ZKPs allow participants of DLNs to make statements on the DLNs about some private information and to prove the truth of the information without having to necessarily reveal the private information publicly. As such, the disclosed methods and systems directed at the ZKP-enabled DLNs provide privacy, ease and efficiency to participants of the DLNs while still allowing the DLNs to remain as consensus-based networks.
Audio Path Sealing
In accordance with some embodiments, an apparatus for privacy protection is provided. The apparatus includes a first housing portion and a second housing portion arranged to receive and enclose one or more personal communication devices. The apparatus further includes at least one sound attenuation layer disposed in the second housing portion, the at least one sound attenuation layer absorbs sound. The apparatus also includes a noise generator to provide one or more noise signal streams and audio output device(s), which are at least partially supported by the first housing portion and coupled to the noise generator to receive the one or more noise signal streams. The audio output device(s) are operable to output noise signal based on the one or more noise signal streams and direct the noise signal at the one or more personal communication devices placed adjacent the at least one sound attenuation layer.
ANONYMOUS ALLOCATION AND MAJORITY VOTING IN A COMPROMISED ENVIRONMENT
Described is a system for anonymous job allocation and majority voting in a cloud computing environment. The system broadcasts a job to physical nodes, each of the physical nodes having a control operations plane (COP) node and one or more service nodes associated with the COP node. A set of redundant job assignments is distributed to individual COP nodes pursuant to a private job assignment schedule, such that each individual COP node is only aware of its own assignment and corresponding job. The service nodes execute the job assigned to the COP nodes such that the service nodes each complete a task associated with the job and forward an individual result to their associated COP node. A privacy-preserving result checking protocol is performed amongst the COP nodes such that secret shares of a majority result are obtained and the majority result is provided to a client.
DATA DISTRIBUTION METHOD, AUTHENTICATION SERVER, AND DATA STRUCTURE
Provided is a data distribution method for a data distribution system which includes a device and a plurality of authentication servers. The data distribution method includes: receiving, by a first authentication server included in the plurality of authentication servers, transaction data including encrypted history information which is history information of the device encrypted using a secure computation method which enables computation without decrypting the encrypted history information; recording, by the first authentication server, the transaction data in a distributed ledger in synchronization with the plurality of authentication servers excluding the first authentication server, when a validity of the transaction data received from the device is verified by the first authentication server; and performing, by the first authentication server, secure computation on the encrypted history information included in the transaction data, the secure computation being computation processing performed without decrypting the encrypted history information.
PRIVACY-PRESERVING IDENTITY ASSET EXCHANGE
A processor-implemented method facilitates identity exchange in a decentralized setting. A first system performs a pseudonymous handshake with a second system that has created an identity asset that identifies an entity. The second system has transmitted the identity asset to a third system, which is a set of peer computers that support a blockchain that securely maintains a ledger of the identity asset. The first system transmits a set of pseudonyms to the third system, where the set of pseudonyms comprises a first pseudonym that identifies the first system, a second pseudonym that identifies a user of the second system, and a third pseudonym that identifies the third system. The first system receives the identity asset from the third system, which securely ensures a validity of the identity asset as identified by the first pseudonym, the second pseudonym, and the third pseudonym.
Biometric One Touch System
Embodiments disclosed herein generally related to a system and method of authenticating a user with a third party server. In one embodiment, a method is disclosed herein. A computing system receives, from a remote client device of the user, a token. The token includes personal identification information and a digitized file of a biometric captured by a biometric scanner. The computing system identifies via the personal identification information that the user has a user account. The computing system queries a database with the personal identification information and the digitized file to determine whether the biometric matches a stored biometric in the user account. Upon determining that the biometric matches the stored biometric, the computing system generates a message to be transmitted to the third party server that authenticates the user. The computing system transmits the message to the third party server.