H04L9/3221

Systems and methods for anonymous cryptocurrency transactions
11475444 · 2022-10-18 · ·

Systems and methods for anonymous cryptocurrency transactions are disclosed. A method may include: receiving, from the electronic device associated with a sender of a cryptocurrency transaction, a zero-knowledge statement comprising a shuffled and anonymized list of participants comprising the sender, a receiver of the cryptocurrency transaction, and a plurality of decoy participants, a transfer amount, and a remaining balance, and a secret witness, wherein each participant is associated with an index; generating one-out-of-many proofs for the sender and the receiver based on their associated indices; generating a Basic Zether proof for the transfer amount and the remaining balance; conducting many-out-of-many proofs with parameters chosen for an anonymous payment setting; and constructing a zero-knowledge proof for the zero-knowledge statement. The sender sends an ordered list of the participants and the zero-knowledge proof to a verifier using the FiatShamir transform, and the verifier verifies the zero-knowledge proof.

System, method, and computer program product for secured, encrypted transaction processing

A system, method, and computer program product is provided for secured, encrypted transaction processing. The method includes receiving a transaction request initiated by a first computing device associated with a first user and/or a second computing device associated with a second user. The transaction request includes a first user token including a first token identifier and a first account balance encrypted with a public key of the first user. The transaction request also includes a transaction value and a second user token including a second token identifier and a second account balance encrypted with a public key of the second user. The method includes generating a new first user token including a new first account balance encrypted with the public key of the first user and a new second user token including a new second account balance encrypted with the public key of the second user.

PROVENANCE VERIFICATION FOR SELECTIVE DISCLOSURE OF ATTRIBUTES
20220329416 · 2022-10-13 ·

Some embodiments are directed to a system (100) for selectively disclosing attributes of a record. An issuer device (110) generates a digital signature on a message comprising the attributes and a secret record identifier. The record, secret record identifier, and signatures are provided to a selector device. The selector device (111) selectively discloses attributes of the record to a receiver device (112), proving authenticity by means of a zero-knowledge proof of knowledge of the signature on the attributes. The receiver device (112) verifies the proof with respect to the public key of the issuer and the received attributes.

Digital posting match recommendation apparatus and method
11663397 · 2023-05-30 · ·

An apparatus for digital posting match recommendation and corresponding methods are provided. Apparatus may include a computing device, which may be configured to determine a record recommendation for the user based on a posting datum of a job position and user datum of a user. The computing device may be further configured to provide an interaction preparation related to job position to coach and assist a user in preparing for a real interview process with a potential employer.

ZERO-KNOWLEDGE PROOF-BASED VIRTUAL CARDS
20230114697 · 2023-04-13 ·

Disclosed are various embodiments for issuing virtual cards to client devices. Also disclosed are embodiments for provisioning a transaction terminal to process transactions with virtual cards. A zero-knowledge proof algorithm can be utilized to validate the transactions. A virtual card can be based upon a public key of a client device that is managed by a hardware security module.

METHODS AND SYSTEMS FOR TRACKING AND RECOVERING ASSETS STOLEN ON DISTRIBUTED LEDGER-BASED NETWORKS
20230071564 · 2023-03-09 ·

The instant disclosure illustrates how the privacy and security of activities occurring on distributed ledger-based networks (DLNs) can be enhanced with the use of zero-knowledge proofs (ZKPs) that can be used to verify the validity of at least some aspects of the activities without private information related to the activities necessarily being revealed publicly. Methods and systems that are directed at facilitating the tracking and recovery of assets stolen on ZKP-enabled DLNs while preserving the confidentiality of the tokens are presented herein.

Cryptographic platform system and method

A method includes linking a first application with a first Transport Layer Security (TLS) library, linking a second application with a second TLS library, obtaining a sequence of cryptographic keys by a first agent, the sequence of cryptographic keys based on an agent key and provided from the first agent to the first TLS library, obtaining the sequence of cryptographic keys by a second agent, the sequence of cryptographic keys based on the agent key and provided from the second agent to the second TLS library, establishing communication between the first TLS library and the first agent to create a first trusted relationship, establishing communication between the second TLS library and the second agent to create a second trusted relationship, and establishing a third trusted relationship between the first agent and the second agent.

Dongles and method for providing a digital signature
11646889 · 2023-05-09 · ·

Set of two or more dongles for providing a digital signature, wherein each dongle holds a secret key, wherein each dongle is configured to receive a message, to compute a digital signature of the received message using the secret key, and to transmit the computed digital signature, wherein at least one of the dongles is configured to, before computing the digital signature, verify the presence of at least one other dongle belonging to the set, and to compute the digital signature only upon successful verification of the presence of one or more other dongles.

METHOD FOR UPDATING A PUBLIC KEY
20170373847 · 2017-12-28 ·

A method for updating a public key is provided. The method includes: acquiring, by a transmitting-end device, a first hash value calculated based on a first current public key; generating a first update public key and a first update private key; generating an update string such that a hash value of a hash function calculated based at least on the first update public key and the update string is equal to the first hash value; calculating, by a receiving-end device, a second hash value based at least on the first update public key and the update string according to the hash function; and verifying the first update public key by comparing the first hash value and the second hash value.

Cryptographic platform system and method

A method includes requesting, by a first computing device having a first application and a first Transport Layer Security (TLS) library, a sequence of cryptographic keys obtained by a first agent, the sequence of cryptographic keys based on an agent key and provided from the first agent to the first TLS library, requesting, by a second computing device having a second application and a second TLS library, the sequence of cryptographic keys obtained by a second agent, the sequence of cryptographic keys based on the agent key and provided from the second agent to the second TLS library, and communicating between the first application of the first computing device to the second application of the second computing device using the sequence of cryptographic keys based on the agent key.