Patent classifications
H04L9/3297
DATA PROCESSING METHOD AND APPARATUS, INTELLIGENT DEVICE, AND STORAGE MEDIUM
Embodiments of this application disclose a data processing method. The method includes obtaining data that need to be verified from a target trusted computing node; obtaining first ledger data corresponding to the data that need to be verified, the first ledger data being obtained by signing a first message digest by using a private key of the target trusted computing node and being stored in the blockchain network by the target trusted computing node, and the first message digest being obtained by performing message digest calculation on raw data; decrypting the first ledger data by using a public key of the target trusted computing node to obtain the first message digest; performing message digest calculation on the data that need to be verified to obtain a second message digest; and determining a verification result according to the first message digest and the second message digest.
PRIVACY INFORMATION TRANSMISSION METHOD, APPARATUS, COMPUTER DEVICE AND COMPUTER-READABLE MEDIUM
A privacy information transmission method, an apparatus, a computer device and a computer-readable medium are disclosed. The method may include: generating authentication information in response to receiving of an identity registration request message sent by a terminal device via a base station, and encrypting the authentication information with a first private key to generate encrypted authentication information; sending a first identity identification request message carrying the encrypted authentication information to the terminal device; and receiving an identity identification response message returned by the terminal device, and acquiring privacy information from the identity identification response message.
ESTABLISHING TRUST NETWORKS IN A COMMUNAL MEDIA SESSION
A trust network is formed in a communal media system connected to a streaming application and executed within the streaming application. Source location is received for multimedia content selected in the streaming application and transmitted to user devices participating in a communal session. During the communal session, offerings are presented to the user devices in the communal session and user data associated with user interactions with the offerings are obtained and analyzed. Information presented to the user devices in the communal session is optimized based on the user data. Delivery of the multimedia content and social media content generated on the user devices is synchronized. The multimedia content and the social media content are delivered to the user devices at the same time, without any noticeable lag time during receipt of the multimedia content and the social media content by the user devices.
ELECTRONIC CERTIFICATION DATA STRUCTURES FOR VERIFYING RESOURCE INTEGRITY
Techniques for certifying a document and for securely transmitting access to the document across a blockchain network are disclosed. A document, which details results of a soft inquiry executed against a user's credit history, is accessed. A hash algorithm is applied to the document to certify it. The hash algorithm is based on a timestamp indicating when the document was created. Applying the hash algorithm also generates a portable identifier reflecting the document is certified at the time indicated by the timestamp. The portable identifier is added as a record to a blockchain. The record is transmitted to a second computer system using public and private keys.
ENCRYPTION AND DECRYPTION TECHNIQUES USING SHUFFLE FUNCTION
Encryption and decryption techniques based on one or more transposition vectors. A secret key is used to generate vectors that describe permutation (or repositioning) of characters within a segment length equal to a length of the transposition vector. The transposition vector is then inherited by the encryption process, which shifts characters and encrypts those characters using a variety of encryption processes, all completely reversible. In one embodiment, one or more auxiliary keys, transmitted as clear text header values, are used as initial values to vary the transposition vectors generated from the secret key, e.g., from encryption-to-encryption. Any number of rounds of encryption can be applied, each having associated headers used to “detokenize” encryption data and perform rounds to decryption to recover the original data (or parent token information). Format preserving encryption (FPE) techniques are also provided with application to, e.g., payment processing.
Privacy Preserving Validation And Commit Architecture
A method of scheduling and validating a multiple-participant process, the method including: submitting, by a submitting node associated with a participant in the multiple-participant process, a proposed transaction by sending a cryptographically-protected message to one or more recipient nodes, wherein the cryptographically-protected message includes at least an unencrypted submessage readable by an external node and a cryptographically-protected submessage to preserve privacy from at least the external node; determining, by the external node, an order of the proposed transaction relative to other transactions; by way of at least some of the recipient nodes, validating the cryptographically-protected message; receiving a confirmation of validity of the cryptographically-protected message from at least some of the recipient nodes; finalizing the proposed transaction, as a confirmed transaction, based on receiving one or more confirmations from at least some of the recipient nodes that satisfy a confirmation condition; and writing the confirmed transaction to a distributed ledger according to the order determined by the external node.
Systems and methods for linkage data elements
An improved data structure approach, and corresponding computational systems and methods are described to provide a technical approach that can be used for improving computational performance where a blockchain data structure is being accessed continuously or periodically for validation of recordals of one or more events that have taken place. A hybrid off-chain (or off-contract)/on-chain solution is utilized to provide a mechanism for establishing data linkages between the off-chain (or off-contract) records and on-chain data payloads.
Communication node, method of operating thereof and collaborative system
The present invention relates to a communication node, a method of operating the same, and a collaborative system. In an example of the present invention, there may be provided an operation method of a first communication node (a transmission node) comprising: a step of confirming whether data is to be transmitted to the receiving side communication node by a transmitting side communication node among communication nodes connected to each other on the network; a step for generating first control information for verifying authentication and integrity of the data; a step for generating a first control information including information for authenticating and verifying integrity of the data to be transmitted by the transmitting side communication node; a step for sharing the first control information with at least one or more participating communication nodes including the receiving side communication node through a channel formed in a block chain network; and a step for transmitting a message including the data through a channel formed in a network different from the block chain network.
Behavior driven graph expansion
An example operation may include one or more of acquiring, by an organization node, a user profile from a blockchain, determining, by the organization node, a role of the user based on the user profile, detecting, by the organization node, user actions directed to graph expansions, and executing, by the organization node, a smart contract to analyze user behavior based on the detected user actions and the role to produce role-based user behavior parameters.
Systems and methods for smart contracts including arbitration attributes
Systems and methods for establishing an arbitration agreement for an agreement. A method includes creating, by a first computing system associated with a first party, an ArbitrationInformation attribute comprising the arbitration agreement. The method includes signing, by the first computing system, the ArbitrationInformation attribute with the first computing system's digital signature; creating, by the first computing system, a first SignedData message comprising the ArbitrationInformation attribute and information indicative of the agreement; and transmitting, by the first computing system, the first SignedData message to a second computing system associated with a second party different than the first party and on a different network node than the first party. The method includes signing, by the second computing system, a portion of the SignedData message or the ArbitrationInformation attribute with the second computing system's digital signature; and generating, by the second computing system, a second SignedData message around the first SignedData message.