Patent classifications
H04L63/0421
MONITORING USER EXPERIENCE USING DATA BLOCKS FOR SECURE DATA ACCESS
Techniques for enabling secure access to data using data blocks is described. Computing device(s) can provide instruction(s) to a component associated with an entity, wherein the instruction(s) are associated with an identifier corresponding to a data block of a plurality of data blocks. The computing device(s) can receive, from the component, data associated with the component, wherein the data is associated with the identifier and is indicative of a state of the component. The computing device(s) can store the data in the data block and monitor, using rule(s), changes to the state of the component based at least partly on the data in the data block. As a result, techniques described herein enable near real-time—and in some examples, automatic—reporting and/or remediation for correcting changes to the state of the component using data that is securely accessed by use of data blocks.
Individual data unit and methods and systems for enhancing the security of user data
An individual data unit for enhancing the security of a user data record is provided that includes a processor and a memory configured to store data. The individual data unit is associated with a network and the memory is in communication with the processor. The memory has instructions stored thereon which, when read and executed by the processor cause the individual data unit to perform basic operations only. The basic operations include communicating securely with computing devices, computer systems, and a central user data server. Moreover, the basic operations include receiving a user data record, storing the user data record, retrieving the user data record, and transmitting the user data record. The individual data unit can be located in a geographic location associated with the user which can be different than the geographic locations of the computer systems and the central user data server.
Privacy preserving uni-directional communication device
In an industrial system, a data capture apparatus can be configured to operate as a unidirectional communication connection between a private network and a public network. The data capture apparatus can be further configured to collect raw data from the private network. The raw data can define a data distribution. The data capture apparatus can be further configured, based on the data distribution of the raw data, to generate anonymized or synthetic data that represents the raw data. The anonymized data can be transmitted over the unidirectional communication connection to a receiver machine of the data capture apparatus. In some cases, the receiver machine can send the anonymized data to an analysis system within the public network, such that the raw data can be analyzed by the analysis system, based on the anonymized data that represents the raw data, without the analysis system obtaining the raw data.
Method and system for directing an exchange associated with an anonymously held token on a blockchain
The invention provides a method and corresponding system for controlling the generation of a blockchain transaction, and/or the recipient of a transaction output. It can also be used to control and record the ownership of an asset represented on the blockchain without the need for a separate registry of ownership. The ownership and transfers thereof can be handled and recorded without the need for knowledge of the parties involved or their identities. According to one embodiment, the method comprises the steps of identifying at least one transaction (Tx) on a blockchain which comprises: an unspent transaction output (UTXO) relating to a tokenised asset associated with an asset controller; and an input which spends an output from a previous transaction that is locked by a redeem script hash. For each identified transaction (Tx), an incomplete blockchain transaction is generated comprising: a first output comprising a copy of the redeem script hash; and a second output which is modifiable such that only the asset controller is able to specify a recipient for the second output. The incomplete blockchain transaction is communicated to the controller of the asset. The incomplete blockchain transaction is incomplete in that it is missing a required cryptographic signature. Thus, payment of income relating to the asset can be re-directed by the controller to a destination of their choice.
Anonymization method and apparatus, device, and storage medium
This disclosure provides an anonymization method and apparatus, a device, and a storage medium, and pertains to the field of communications network technologies. The method includes: receiving a data obtaining request of a first terminal, and obtaining requested target data based on the data obtaining request; determining behavior data generated when the target data is obtained; determining, based on the behavior data, a first permutation character sequence corresponding to the target data; and anonymizing, based on the first permutation character sequence, a to-be-anonymized character string in the target data, and outputting the anonymized target data. In this disclosure, because the behavior data is different each time and is not easy to crack, anonymization is implemented without relying on plaintext information, thereby improving anonymization security and meeting anonymization requirements specified by laws.
SYSTEMS AND METHODS FOR ANONYMOUS PASS-PHRASE AUTHENTICATION
Disclosed are systems and methods for anonymous, hands-free voice authentication to network resources. The framework can operate and provide a secure authenticated operating environment for any type of computerized platform, device and/or service while preserving anonymity of both the user and the user's login credentials. Once authenticated, the user is then permitted to perform desired operations, such as, CRUD (create, read, update, delete) operations. The disclosed framework operates in a three stage process, which involves single-sign on (SSO)/virtual private network (VPN) connectivity, which is then followed by a 4way voice matching user-device integrated “conversation” and a proof of work macro-micro problem verification step. The framework enables a user to login and access a system by responding to randomly verifiable requests output by the system dependent on the user's current surroundings.
Multi-domain message routing with E2E tunnel protection
Systems and techniques to enable message routing among multiple devices and device domains, via end-to-end tunneling techniques, are disclosed. In an example, techniques and device configurations involving the use of RESTful protocols that communicate OSCORE (Object Security for Constrained RESTful Environments) payloads over OSCORE tunnels, involve receiving an OSCORE message having an encrypted COSE (Concise Binary Object Representation (CBOR) Object Signing and Encryption) object payload and inserting the OSCORE message into an OSCORE tunnel message to implement a tunneled communication with a receiving device. Here, the tunnel message includes the OSCORE message within an envelope encrypted COSE object payload. The OSCORE tunnel message may then be transmitted to the receiving device. Further techniques and device configurations for the receipt, processing, conversion, and decryption of such tunneled messages are also disclosed.
Distributed database structures for anonymous information exchange
Provided herein are database structures, systems, and methods for an anonymous, information exchange platform. The information exchange platform described herein may comprise blockchain structures, decentralized networks, peer-to-peer technology, cryptographic techniques, and/or a combination thereof. Past and present actors associated with a topic of information (e.g., a product) may flexibly exchange information on the information exchange platform by implementing question and answer protocols.
Method and system for managing vehicle generated data
A system for collecting and managing vehicle-generated data from multiple vehicles are provided. The vehicle-generated data is pseudonymized by pseudonymized identifiers, and the pseudonymized vehicle-generated data is collected and managed by a neutral data server operated by an operator who is independent of vehicle manufacturers. Vehicle manufacturers can reestablish the link of the pseudonymized event data with the vehicle that had generated the event data and the vehicle driver.
Secure deployment of a user profile in a vehicle
A vehicle can have a user profile securely deployed in it according to a security protocol. The vehicle can include a body, a powertrain, vehicle electronics, and a computing system. The computing system of the vehicle can be configured to: retrieve information from a user profile according to a security protocol. The computing system of the vehicle can also be configured to receive a request for at least a part of the retrieved information from the vehicle electronics and send a portion of the retrieved information to the vehicle electronics according to the request. The computing system of the vehicle can also be configured to propagate information sent from the vehicle electronics back into the user profile according to the security protocol. And, the computing system of the vehicle can also be configured to store in its memory, according to the security protocol, information sent from the vehicle electronics.