H04L63/0421

EFFICIENT IMPLEMENTATION FOR DIFFERENTIAL PRIVACY USING CRYPTOGRAPHIC FUNCTIONS

The system described may implement a 1-bit protocol for differential privacy for a set of client devices that transmit information to a server. Implementations of the system may leverage specialized instruction sets or engines built into the hardware or firmware of a client device to improve the efficiency of the protocol. For example, a client device may utilize these cryptographic functions to randomize information sent to the server. In one embodiment, the client device may use cryptographic functions such as hashes including SHA or block ciphers including AES. Accordingly, the system provides an efficient mechanism for implementing differential privacy.

EVENT-CENTRIC MATCHING SYSTEM UTILIZING PRIVACY-PRESERVING DATA EXCHANGE

Provided herein are platforms and methods for exchanging escrowed data between multiple users while preserving privacy and systems, methods, and applications for event-centric matching that enables secure communications between users, and event location sharing. Further, the systems, methods, and applications herein enable users to easily find relevant and local events.

Private anonymous electronic messaging

Private anonymous electronic messaging between a message originator and a message recipient within an organization encourages open communication which can provide information to the organization that might otherwise be secreted from the organization, and can allow the message originator to obtain desired help (e.g., counseling). By profiling of the message originator based on current and previous electronic messaging within the system as well as external organizational information (e.g., behavioral or financial information), the system can assess concerns yet act as a gateway to protect the message originator's true identity through escalating levels of concern unless a genuine concern about the health, well-being, and/or safety of the message originator, others, or the organization is indicated, in which case the system can reveal the true identity of the message originator as appropriate.

System and method for anonymous provider to receiver communication

An automated system comprising a processor and a database are described. The processor executes communication software reading: at least one image corresponding to an identifier of a blood product from a donor; and at least one database storing at least one communication from a receiver of the blood product. The communication software executed by the processor determines an intermediary from the identifier and contacts the intermediary to obtain contact information of the donor.

Methods and apparatus for efficiently implementing a distributed database within a network

An apparatus includes a processor and a memory operatively coupled to the processor and associated with an instance of a distributed database at a first compute device. The processor is configured to select an anonymous communication path. Each blinded public key from a sequence of blinded public keys associated with the anonymous communication path is associated with a pseudonym of a compute device from a set of compute devices that implement the anonymous communication path. The processor is configured to generate an encrypted message encrypted with a first blinded public key. The processor is configured to generate an encrypted data packet including the encrypted message and a compute device identifier associated with a second compute device. The encrypted data packet is encrypted with a second blinded public key. The processor is configured to send the encrypted data packet to a third compute device.

Method and system for maintaining privacy and traceability of blockchain-based system
11683189 · 2023-06-20 · ·

With the popularity of Blockchain comes grave security-related concerns. Achieving privacy and traceability simultaneously remains an open question. Efforts have been made to address the issues, while they may subject to specific scenarios. The present disclosure proposes a method, a system, and a device for maintaining privacy and traceability of a Blockchain-based system. The method includes: registering in a Blockchain-based system; transmitting a message from a transmitter T to a receiver R via an anonymous network, after a registration request of the transmitter T has been approved and storing message transmission data generated during a message transmission process in a Blockchain; and performing an identity disclosure by using the message transmission data when the message is detected to be false. The anonymous network may transmit the message by onion routing. The solution proposed by the present disclosure can achieve traceability and privacy for a Blockchain-based system simultaneously.

DOMAIN SPECIFIC BROWSER IDENTIFIERS AS REPLACEMENT OF BROWSER COOKIES
20230188507 · 2023-06-15 ·

The present disclosure provides a secure, user-transparent, and highly efficient content provider-specific identifier (“CPSID”), sometimes referred to as a “read-only cookie” (“ROC”). These content provider-specific identifiers may be generated by the client device and encrypted with a public key of the content provider, preventing third parties from indirectly identifying matches, and obviating the need for provider-side cookie matching tables and resource-intensive tracking communications. The generation of content provider-specific identifiers may be controlled by user policies, such that identifiers are only created for content providers with compliant terms of service (ToS), e.g., retrievable from a predetermined address within the domain; content providers that are on a whitelist (e.g. for which the user has explicitly provided consent); and/or content providers that are not on a blacklist (e.g. for which the user has explicitly refused consent).

PRIVACY-PRESERVING STREAM ANALYTICS

Privacy-preserving stream analytics (personal data collection method, apparatus, and/or system) from an electronic (e.g., mobile) device providing communications, such as to a network (e.g., Internet). Data queries from a data analyst are received but not directly answered with a truthful query response. Truthful responses are privatized and anonymized based on a randomized response mechanism which releases privatized data and not the original answer. Anonymously transmitting randomized responses from the data owner to data aggregator using shares, each share of which is individually transmitted to an independent aggregator, which is configured for independently and asynchronously process each share, and sharing results with one another to arrive at a query response over an aggregate number of data owners.

Privacy Firewalls for Identified Information Detection
20230188501 · 2023-06-15 ·

Systems, methods and non-transitory computer readable media for detecting identified information in privacy firewalls are provided. A repeating field in a data collection may be analyzed to determine whether the field is likely to include information that identifies particular individuals. An access request of a user may be received. A permission record associated with the user may be accessed. In response to the field being likely to include information that identifies particular individuals and a first value in the permission record, access to the field may be denied, in response to the field not being likely to include information that identifies particular individuals and the first value in the permission record, access to the field may be provided, and in response to a second value in the permission record, access to the field may be provided.

Method for Exchanging and Storing Electronic Keys
20230188981 · 2023-06-15 ·

In one example, a first wireless device transmits one or more electronic keys, and a second wireless device receives and stores the electronic key(s) in a memory. A server or a user device uploads, receives or synchronizes the electronic key(s) from the second wireless device. In another example, one or more electronic keys are transmitted using a first wireless device, the electronic key(s) are received and stored in a memory of a second wireless device, and the electronic key(s) or other data are transmitted, uploaded or synchronized to a server or a user device. In another example, a device comprises: a wireless transceiver; a memory; and a processor communicably coupled to the wireless transceiver and the memory, wherein the processor receives one or more electronic keys from one or more wireless devices, and stores the electronic key(s) in the memory.