H04L2209/42

Information Encryption Method and Device

Disclosed are an information encryption method and device. A particular embodiment of the method comprises: acquiring customer information, wherein the customer information comprises an item number and a telephone number; selecting a random salt corresponding to the current date from a pre-generated random salt list, wherein the random salt list is used for storing a date and a random salt; using an irreversible encryption algorithm to encrypt the item number and the random salt corresponding to the current date so as to generate a first ciphertext; generating, based on the first ciphertext, a digital second ciphertext; and using the second ciphertext to process the telephone number so as to generate a first encrypted telephone number. This embodiment prevents private customer information from being leaked.

METHODS, DEVICES AND SYSTEMS FOR A DISTRIBUTED COORDINATION ENGINE-BASED EXCHANGE THAT IMPLEMENTS A BLOCKCHAIN DISTRIBUTED LEDGER
20200014745 · 2020-01-09 ·

A distributed system that implements an online exchange may comprise a plurality of server nodes, each of which being configured to receive exchange transaction proposals from customers of the online exchange over a computer network and each being configured to store a copy of a blockchain distributed ledger of completed exchange transactions. A distributed coordination engine may be coupled, over the computer network, to the plurality of server nodes and may receive a plurality of exchange transaction proposals from the plurality of server nodes. The distributed coordination engine may be being further configured to achieve consensus on the plurality of exchange transaction proposals and to generate, in response, an ordering of agreed-upon exchange transaction proposals that includes the plurality of exchange transaction proposals on which consensus has been reached. This ordering of agreed-upon exchange transaction proposals is identically provided to each of the server nodes and specifies the order in which the server nodes are to execute exchange transactions and to update their copy of the distributed ledger. The ordering of agreed-upon exchange transaction proposals may optionally be re-ordered and identically provided to each server node to conform to the local orderings at the exchange transaction proposal's node server of origin.

SYSTEMS AND METHODS FOR PRIVACY-ENABLED BIOMETRIC PROCESSING
20200014541 · 2020-01-09 · ·

A set of distance measurable encrypted feature vectors can be derived from any biometric data and/or physical or logical user behavioral data, and then using an associated deep neural network (DNN) on the output (i.e., biometric feature vector and/or behavioral feature vectors, etc.) an authentication system can determine matches or execute searches on encrypted data. Behavioral or biometric encrypted feature vectors can be stored and/or used in conjunction with respective classifications, or in subsequent comparisons without fear of compromising the original data. In various embodiments, the original behavioral and/or biometric data is discarded responsive to generating the encrypted vectors. In another embodiment, distance measurable or homomorphic encryption enables computations and comparisons on cypher-text without decryption of the encrypted feature vectors. Security of such privacy enabled embeddings can be increased by implementing an assurance factor (e.g., liveness) to establish a submitted credential has not been spoofed or faked.

Method and device for information system access authentication

A method and a device for information system access authentication are disclosed. The method includes: performing anonymous authentication to a random verification code generated according to a login request for accessing an information system of a client, and authenticating acquired user name and password information when the anonymous authentication is successful. The device includes an verification code authentication module and a user name and password authentication module connected to the verification code authentication module, wherein the verification code authentication module is configured to perform anonymous authentication to a random verification code generated according to a login request for accessing an information system of client; and the user name and password authentication module is configured to authenticate acquired user name and password information when the anonymous authentication is successful. The present disclosure uses a two-stage and two-factor authentication method such that the security of the login information is improved without increasing the complexity of the user's login.

COMPUTER SYSTEM OF COMPUTER SERVERS AND DEDICATED COMPUTER CLIENTS SPECIALLY PROGRAMMED TO GENERATE SYNTHETIC NON-REVERSIBLE ELECTRONIC DATA RECORDS BASED ON REAL-TIME ELECTRONIC QUERYING AND METHODS OF USE THEREOF
20240037278 · 2024-02-01 ·

In some embodiments, the present invention provides for an exemplary computer system which includes at least: a graphical user interface client; a dedicated application server; the dedicated application server is configured to connect to the graphical user interface client and an electronic source with electronic data records; where the electronic data records include real identification identifiers of real individuals; where the graphical user interface client is configured to generate at a graphical user interface that is configured to receive user authenticating credential information and to conduct a real-time electronic negotiation querying session between the user and the dedicated application server to generate a plurality of non-reversible synthetic electronic data records of a plurality of synthetic individuals, by utilizing at least one statistical technique so that the plurality of non-reversible synthetic electronic data records cannot be used to identify any real individual in the plurality of electronic data records.

Text scrambling/descrambling

Disclosed are methods, systems, and computer-readable medium to perform operations including: generating a font that includes a plurality of glyphs for characters of a language; generating a plurality of duplicate glyphs for the characters, wherein each duplicate glyph is associated with: (i) a respective letterform representing one of the characters, and (ii) a respective glyph code; swapping the respective letterforms of the plurality of duplicate glyphs such that the respective letterforms are mismatched with the respective glyph codes; designating the plurality of duplicate glyphs as a scrambling font style of the font; and providing a representation of the font for output on a graphical user interface (GUI) displayed on a display device.

Residence-Based Digital Identity and Strong Authentication System
20190394043 · 2019-12-26 ·

A system and associated methods provide digital identity and strong authentication management services for Internet users. The system includes a central, cloud-based, online service, referred to as a central service, which can manage user accounts. The system also includes dedicated, always-on, always-connected, cryptographically unique devices, referred to as beacons, located within the physical residences of its users. The central service associates each beacon with the residence address of its user by physically sending a unique address verification code by postal mail to the user's residence. The user presents the unique code to the beacon, and the beacon cryptographically confirms its identity and the unique code sent to the residence address back to the central service. The beacons can attest to users' identities and provide seamless strong authentication to third-party online service providers on behalf of those users.

PRIVACY PRESERVING TRANSACTIONS WITH PROBABILISTIC TRANSACTION FEES

An example operation may include one or more of receiving transaction parameters for a blockchain transaction into a transaction wallet interface of a transaction wallet of a sender, the transaction parameters comprising a transaction amount and an intended recipient address. The example operation may include generating a blockchain transaction that specifies the transaction amount and a single recipient address selected from the intended recipient address and a mining pool address of a mining pool, and providing the generated blockchain transaction to the mining pool.

SYSTEM AND METHOD FOR INFORMATION PROTECTION
20190385162 · 2019-12-19 ·

A computer-implemented information protection method comprises: obtaining a plurality of encrypted transaction amounts associated with transactions among a plurality of accounts, wherein each of the encrypted transaction amounts is associated with one of the accounts that sends or receives one of the transaction amounts, and the encryption of each of the transaction amounts at least conceals whether the one account sends or receives the one of the transaction amounts; generating a sum proof based on the obtained encrypted transaction amounts, the sum proof at least indicating that the transaction amounts are balanced; and transmitting the encrypted transaction amounts and the sum proof to one or more nodes on a blockchain network for the nodes to verify the transactions.

Dynamic blockchain system and method for providing efficient and secure distributed data access, data storage and data transport

A dynamic blockchain system includes: at least one complete asset node server, including a complete asset manager and a complete asset storage; a plurality of hash asset node servers, each including a hash asset manager and an asset blockchain and; a dynamic blockchain management server, including a blockchain manager, a representation calculation function, and an asset map with a plurality of map records; and a blockchain management device; such that the dynamic blockchain management server validates a digital asset by lookup in the at least one complete asset node server and by verification of the digital asset by a random sampling in a statistically representative number of hash asset node servers in the plurality of hash asset node servers.