H04L9/3221

Methods and systems for tracking and recovering assets stolen on distributed ledger-based networks
11502838 · 2022-11-15 ·

The instant disclosure illustrates how the privacy and security of activities occurring on distributed ledger-based networks (DLNs) can be enhanced with the use of zero-knowledge proofs (ZKPs) that can be used to verify the validity of at least some aspects of the activities without private information related to the activities necessarily being revealed publicly. Methods and systems that are directed at facilitating the tracking and recovery of assets stolen on ZKP-enabled DLNs while preserving the confidentiality of the tokens are presented herein.

User identity and trust models in decentralized and distributed systems

A method for sharing information has an assertion associated therewith such that the receiving communication device is able to verify the assertion without the sender revealing underlying data demonstrating the validity of the assertion. The assertion is derived from underlying data input to a pre-provisioned first algorithm. The assertion is encapsulated in a first data object by a PGE that controls an environment in which the first algorithm is executed. A first proof is generated that is configured to verify that the first algorithm used the underlying data to produce the assertion when provided to a PVE along with the first data object. The underlying data is excluded from the first proof and the first data object such that privacy of the underlying data is maintained. The information, the first proof and the first data object are sent to the receiving communication device from the sending communication device.

System for embedding searchable information, encryption, signing operation, transmission, storage database and retrieval
11574379 · 2023-02-07 · ·

A cell phone is disclosed for acquiring information to be transmitted to a receiving facility and for transmitting such thereto. A capture device captures information from an external source. A processor is provided for associating with the captured information a representation of the date and time of the capture of the information, such that the representation of the date and time information in association with the captured information forms augmented captured information. The processor also places the augmented captured information in association with subscriber information in a transmission of the augmented captured information to a receiving facility requiring such subscriber information. A transmitter transmits the transmission including the augmented captured information and the subscriber information to the receiving facility. An encryptor encrypts the augmented captured information with a symmetrical encryption algorithm to provide encrypted augmented captured information in the transmission with the subscriber information.

TRUSTED AGGREGATION WITH DATA PRIVACY BASED ON ZERO-KNOWLEDGE-PROOFS

A processor may commit, anonymously, an identity and associated data of a resource producer on a blockchain by an independent gateway. The processor may generate a Merkle tree hash commitment to the blockchain of all resources handled by an aggregator. The processor may execute individual commitments of a resource to a user. The processor may provide a zero-knowledge-proof that proves that the commitment of the identity and associated data of the resource producer and the Merkle tree hash commitment match.

USER AUTHENTICATION TECHNIQUES ACROSS APPLICATIONS ON A USER DEVICE

According to examples, a system for enabling user authentication may include a processor and a memory storing instructions. The processor, when executing the instructions, may cause the system to receive user login credentials and initiate a user authentication process by receiving a challenge configured using an attribute of a system including the processor. The processor executes further instructions to determine the attribute value and to derive a zero-knowledge proof in response to the challenge. The zero-knowledge proof is provided to the challenge issuer to access services of one or more applications.

METHODS AND SYSTEMS FOR A SYNCHRONIZED DISTRIBUTED DATA STRUCTURE FOR FEDERATED MACHINE LEARNING

A system and method for executing a record within an immutable sequential data structure, the system including a computing device, the computing device configured to transmit a communication to a remote device, receive a remark from the remote device, retrieve an input related to a user, wherein the input is stored as an encrypted proof-linked assertion on at least an immutable sequential data structure for authorized party access, generate a record as a function of the input, transmit the record to the remote device, and store an executed record within the at least an immutable sequential data structure.

PRIVACY-PRESERVING STATE REFERENCE

An example operation may include one or more of receiving a blockchain transaction that comprises a state reference to an unspent transaction output (UTXO), determining whether the UTXO is included within a first subset of transactions on a blockchain ledger based on a zero-knowledge (ZK) proof included in the state reference, determining whether the UTXO is included within a second subset of transactions on the blockchain ledger based on a hash value included in the state reference, and in response to a determination that the UTXO is not included in either of the first and second subsets of transactions, committing the blockchain transaction including the state reference to the blockchain ledger via a blockchain peer.

DISTRIBUTED KEY SECRET FOR REWRITABLE BLOCKCHAIN

A system includes circuitry for rewriting blockchains in a non-tamper-evident or tamper-evident operation using a key secret held in portions by multiple individually untrusted parties. The blockchains may include a series of blocks secured by integrity codes that may prevent non-tamper-evident rewrites by non-trusted parties that are not in possession of the key secret or individually-untrusted parties in possession of only a portion of the key secret. In some cases, multiple individually-untrusted parties may combine their portions into the key secret. As a group, the multiple individually-untrusted parties may perform non-tamper-evident operation with respect to at least one integrity code within the blockchain.

SYSTEMS, DEVICES, AND METHODS FOR SELECTING A DISTRIBUTED FRAMEWORK
20230132363 · 2023-04-27 · ·

A method of selecting a distributed framework includes identifying, by a selection device coupled to a memory, at least a first cryptographic evaluator of a plurality of cryptographic evaluators, wherein identifying the at least a first cryptographic evaluator further comprises and evaluating a secure proof generated by the at least a first cryptographic evaluator, and identifying the at least a first cryptographic evaluator as a function of the secure proof, assigning, by the selection device, a confidence level of the at least a first cryptographic evaluator, and selecting, by a selection device, a distributed framework from the plurality of cryptographic evaluators as a function of the confidence level, and assigning a task to the distributed framework.

Zero-knowledge environment based social networking engine
11637703 · 2023-04-25 · ·

Methods, systems, and apparatus are described providing social networking engines. Specifically, the present specification relates to a method for implementing software containers implementing social network engines that may be configured to act in a zero-knowledge environment. In such implementations, all information pertaining to the social network engine associated with a user that is stored in the container is solely that of a user unless explicitly shared by the user. In some implementations, the containers may be configured to participate in a publish-and-subscribe network in order to share information. In addition, the containers may be provisioned with controls so that global operators may comply with local privacy rules.