Patent classifications
H04L9/3218
System and method using zero knowledge proofs for alert sharing
Securely sharing proof of knowledge of information without revealing the information, for example to allow an institution to prove it has knowledge regarding an alert. Code or software may be generated (at a first computer system) which takes as input one or more details regarding an entity and returns a value based on a match to one or more actual details regarding the entity. A name may be generated for the code based on information describing the entity, and the code may be published to a blockchain, along with at least one key corresponding to the code. For each name an entry may be creating in an index, converting the name to a blockchain address. A proof based on the code may be generated at a second computer system, which, if verified, results in the first institution and the second institution sharing information regarding the entity.
Systems and methods for distributed control of manufacturing processes
Embodiments of the present disclosure provide systems and methods for controlling a manufacturing process in a manner that protects sensitive information from misuse by different entities involved in the manufacturing process. According to the present disclosure, a blueprint providing information regarding subcomponents of a product to be manufactured may be provided to a synthesizer device. The synthesizer device may engage in two-party computation with IP providers to generate a set of machine commands, which may be encrypted, and then provide a message including the set of machine commands to a manufacturer device. The manufacturer device may obtain authorization from the IP provider(s) based on the message, where the authorization may enable the manufacturer device to configure a manufacturing process in accordance with the set of machine commands to manufacture the subcomponents of the product.
Methods, systems, and apparatuses for cryptographic wireless detection and authentication of fluids
A system for cryptographic wireless detection and authentication of fluids includes a computing device configured to receive, from a transmitter attached to a container, a unique identifier associated with a fluid contained in the container, locate, at an immutable sequential listing, at least an identifier-specific record using the unique identifier, and a lot identifier associated with the unique identifier, retrieve, from the immutable sequential listing, at least a lot-specific record using the lot identifier, capture, from the container, at least a secondary datum describing the container, generate an authenticity probability score as a function of the at least an identifier-specific record, the at least a lot-specific record, and the at least a secondary datum, and display to a user an output based on the authenticity probability score.
DECENTRALIZED TECHNIQUES FOR VERIFICATION OF DATA IN TRANSPORT LAYER SECURITY AND OTHER CONTEXTS
A verifier device in one embodiment is configured to communicate over one or more networks with a client device and a server device. The verifier device participates in a three-party handshake protocol with the client device and the server device in which the verifier device and the client device obtain respective shares of a session key of a secure session with the server device. The verifier device receives from the client device a commitment relating to the secure session with the server device, and responsive to receipt of the commitment, releases to the client device additional information relating to the secure session that was not previously accessible to the client device. The verifier device verifies correctness of at least one characterization of data obtained by the client device from the server device as part of the secure session, based at least in part on the commitment and the additional information.
Blockchain for general computation
There may be provided a computer-implemented method. It may be implemented using a blockchain network such as, for example, the Bitcoin network. The computer-implemented method includes: i) monitoring a computational task distribution system to detect a challenge to a proposer string provided by a proposer computer system in response to a request made by a requester computer system, the request specifying a computational task and a first digital asset associated with the request, the proposer string indicated by a hash of a solution to the computational task, the proposer string specifying a second digital asset referenced in an input to a proposer transaction associated with the proposer string; and ii) as a result of detecting the challenge, at least: a) resolving the challenge using a first blockchain network by at least selecting a solution from a set of solutions provided to the first blockchain network, the set of solutions at least including the proposer string; and b) distributing digital assets from the first digital asset and the second digital asset to one or more parties of the computational task distribution system based at least in part on the solution.
ZERO KNOWLEDGE BLOCKCHAIN ATTRIBUTION
A content publisher may transfer an impression token value to a user in response to the content publisher displaying an advertisement for a merchant to the user. The content publisher may record the transfer on a zero knowledge blockchain. The merchant may transfer a conversion token value to the user in response to the user making a purchase from the merchant. The merchant may record the transfer on the zero knowledge blockchain. The user may transfer the impression token value and the conversion token value to a measurement company. The measurement company may calculate attribution and lift results for the advertisement.
SYSTEM AND METHOD FOR AUTHENTICATING USER IDENTITY
Advertisement targeting with a secure identity is described. A request pertaining to supplemental content targeted to an attribute of a user is posted from a requesting system to a blockchain. It is then determined that a user profile includes an attribute that matches with the attribute of the request via the blockchain. The supplemental content is then caused to be displayed in response to the determination that the user profile includes the attribute that matches with the attribute of the request and via a user interface of a device associated with a user associated with the user profile.
PRIVACY PRESERVING AUDITABLE ACCOUNTS
An approach for privacy-preserving auditable accounts on blockchain networks. The approach may include encoding tokens associated with a blockchain network. The encoding may include data relating to the current epoch, where an epoch is a specific time range. The tokens may be received from a user for inspection by an auditing entity. The approach may include performing an audit check on the encoded tokens. If the audit check succeeds, the auditing entity may submit an audit transaction verifying the tokens were generated in the current epoch and making the tokens auditable for the next epoch.
BLOCKCHAIN WITH RANDOM COMMITTEE SELECTION
An example operation may include one or more of storing blockchain blocks committed to a blockchain based on a protocol executed by a current consensus committee of a blockchain network, receiving random values from the blockchain blocks which are created by nodes of the current consensus committee, randomly determining nodes of a next consensus committee of the blockchain network with respect to the current consensus committee based on the random values created by the nodes of the current consensus committee, and storing a new block to the blockchain based on a protocol based executed by the nodes of the next consensus committee.
Database system for protecting and securing stored data using a privacy switch
Applications of the privacy switch technology are shown for handling data breaches in database systems, thereby providing fundamental improvements to the security and utility of database technology.