H04L9/0618

Encrypting data
11539505 · 2022-12-27 · ·

A method and system. An instruction to encrypt plaintext to generate encrypted data from the plaintext is received. The encrypted data is to be stored in a database device in response to a first request received from a client terminal to store the plaintext in the database device. The first request includes the plaintext. Ciphertext is generated by applying both an initialization vector and an encryption key directly to the plaintext. An embedding rule used to generate the encrypted data is selected from a sequence of embedding rules. The encrypted data is stored in the database device, A second request to receive the plaintext data is received from the client terminal. The plaintext is obtained from the encrypted data, by separating the encrypted data into the ciphertext and the initialization vector; and generating the plaintext by decrypting the ciphertext that was separated from the encrypted data.

Encoding and decoding information in synthetic DNA with cryptographic keys generated based on polymorphic features of nucleic acids
11539516 · 2022-12-27 · ·

The invention is notably directed to a method for encoding information. This method first comprises generating an encryption key according to polymorphic features of nucleic acids from one or more entities. Next, information is encrypted based on the generated key. Finally, the encrypted information is encoded into synthetic DNA. Another aspect concerns a method for retrieving information. Consistently with the above encoding scheme, synthetic DNA in provided, which encodes encrypted information. Such information is read by sequencing the synthetic DNA and by decrypting the information read using a decryption key. The latter is generated according to polymorphic features of nucleic acids from one or more entities (e.g., from the legitimate individual(s) requesting access to information). Thus, the encoded information cannot be interpreted unless a suitable decryption key is available. The invention is further directed to related DNA samples and systems, including DNA vaults.

Apparatuses and methods for protecting an initial non-access stratum (NAS) message after a public land mobile network (PLMN) change

A User Equipment (UE) including a wireless transceiver and a controller is provided. The wireless transceiver performs wireless transmission and reception. The controller selects a PLMN via the wireless transceiver, and determines whether a predetermined ciphering algorithm is adopted for a Non-Access Stratum (NAS) security context. In response to selecting the PLMN and the predetermined ciphering algorithm being adopted for the NAS security context, the controller sends an initial NAS message in which Information Elements (IEs) are in cleartext only to the selected PLMN via the wireless transceiver.

System and method for healthcare security and interoperability

Embodiments facilitate interoperability and secure determination of healthcare costs. An entity may receive a first Electronic Health Record (EHR) sub-block with patient medical coverage information and first treatments and may transmit a first Device Drug Information (DIR) sub-block comprising first treatment classes corresponding to each first treatment, first treatment class members corresponding to each first treatment class, and corresponding first treatment class member cost information. In response, the entity may receive a second EHR sub-block comprising second treatments each: associated with a corresponding first treatment, and selected from corresponding first treatment class members. Upon receipt of a transaction confirmation, the entity may augment a multi-dimensional blockchain with a multi-dimensional block formed by linking: a DIR block including second treatment information, an EHR block including information based on the second EHR sub-block and a transaction block. Payment assistance information determined from the second EHR block may be transmitted to a patient.

Selective transport layer security encryption

A device may transmit a packet for communicating via a tunnel. The packet may be associated with a protocol. The device may determine that the packet has been dropped by a security device. The device may selectively encrypt, after determining that the packet has been dropped, the packet using a null encryption for transport layer security (TLS) or a combination of encryption associated with the protocol and TLS encryption to generate an encrypted packet. The device may transmit the encrypted packet for communicating via the tunnel.

ENCRYPTION AND VERIFICATION METHOD
20220407697 · 2022-12-22 ·

A method of encrypting data, in particular encrypting data in dependence on a user verification confidence level. An encryption algorithm is provided, data is input into the encryption algorithm, along with a public key and an access structure comprising the user verification confidence level. The encryption algorithm is run to output a cypher text of encrypted data, whereby the access structure is embedded into the cypher text such that only an entity satisfying the access structure can decrypt the cypher text.

FILE STORAGE METHOD, TERMINAL, AND STORAGE MEDIUM
20220407725 · 2022-12-22 ·

Embodiments of the present disclosure disclose a file storage method, terminal, and storage medium. The file storage method includes: obtaining a to-be-stored file, performing splitting processing on the to-be-stored file to obtain N sub-files corresponding to the to-be-stored file, wherein N is an integer greater than or equal to 1; sending the N sub-files to an IPFS, and receiving M pieces of address information corresponding to the N sub-files returned by the IPFS, wherein M is an integer greater than or equal to 1 and less than or equal to N; generating an address set corresponding to the to-be-stored file according to the M pieces of address information, and encrypting the address set to obtain an address set ciphertext; sending the address set ciphertext to a blockchain network and receiving a target index value returned by the blockchain network, wherein the target index value is used to identify the address set ciphertext.

DATA PROCESSING METHOD AND APPARATUS, DEVICE, AND MEDIUM

A data provider encrypts source data to obtain a ciphertext of the source data, and uploads the ciphertext of the source data to a data storage platform for storage. Subsequently, in response to a data application request of a data consumer, the data provider encrypts a storage address of the ciphertext of the source data by using a public key of the data consumer, and uploads the encrypted storage address to a blockchain network. The data consumer obtains the ciphertext of the source data from the data storage platform. In the process, a blockchain decentralization capability is used to implement secure and trusted data exchange by using a smart contract that is public and commonly visible to a plurality of parties.

VEHICLE DATA PROCESSING METHOD AND DEVICE

A vehicle data processing method and device are provided. The vehicle data processing method includes: acquiring vehicle data; determining a degree of completion of a preset goal according to the vehicle data; and determining incentive reference data associated with an incentive to a user according to the degree of completion of the preset goal.

SYSTEM AND METHOD FOR GENERATING AND DISTRIBUTING WEB FORM FOR COLLECTING DATA

The present disclosure describes method and system for generating and distributing a web form for securely collecting data. The system provides an interactive and visualized tool to add, edit, distribute web form and collect and analyze one or more response to the web form. Users of the system may edit the forms in a way that what you see is what you get. The system also automatically generates the data structure that can be easily transferred to and stored in the database, which only require minimal input from the user in terms of the data structure. The stored web form and the received responses are encrypted so as to be only available to the user. In some aspects, the system manages all the projects and workflow and allows for real time monitoring of this process through dashboard.