H04L63/0421

Systems and methods for propagating data packets in a network of nodes
11496945 · 2022-11-08 · ·

A method of propagating data packets in a network of nodes is disclosed. This may be a blockchain network such as, for example, the Bitcoin network. The method includes: collecting a set of first data packets during a first time period, the set including at least one data packet received from one or more first nodes in the network; generating a first mapping that assigns the first data packets of the set for relay to one or more neighbouring nodes connected to the node; computing a decorrelation metric value for the first mapping; determining whether the decorrelation metric value for the first mapping satisfies a first condition; in response to determining that the decorrelation metric value for the first mapping does not satisfy the first condition: generating a second mapping that assigns the first data packets of the set for relay to one or more neighbouring nodes connected to the node, the second mapping defining assignments that are different from those of the first mapping; computing a decorrelation metric value for the second mapping; and in response to determining that the decorrelation metric value for the second mapping satisfies the first condition, transmitting the first data packets of the set to neighbouring nodes according to the second mapping.

Service-to-service strong authentication

A request is received from a computing device for substitute data, with access to the substitute data being contingent upon successful multi-factor authentication of the first service. Signature data based on the request is generated using a first key of public-private key pair. Credential proof and the signature is provided to a second service, which verifies the credential proof as a first factor of the multi-factor authentication and verifies, using a second key, the signature as a second factor of the multi-factor authentication. The substitute data is obtained as a result of authentication by the second service. The computing device is caused, by providing the substitute data to the computing device, to input the substitute data into the interface in place of data associated with the first entity.

Blockchain-based method and system for specifying the recipient of an electronic communication
11574303 · 2023-02-07 · ·

The invention provides a method and corresponding system for controlling a blockchain transaction output and/or specifying the recipient of the output. It also provides a method of controlling and/or generating an electronic communication. The invention is a blockchain-implemented solution, which may or may not be the Bitcoin blockchain. In a preferred embodiment of the invention, the method may comprise the step of sending an electronic notification to a notification address which is provided as metadata within an unlocking script of an input of a transaction (Txi) on a blockchain. The unlocking script is provided in order to spend an output from a further transaction (Tx2) on the blockchain. The input of the transaction (Txi) and/or the output of the further transaction (Tx2) may be associated with a tokenised asset represented on, or referenced via, the blockchain. The notification address may be associated with an asset or resource represented on the blockchain, or a controller of an asset or resource represented on the blockchain. The notification address may be a network address, a cryptographic key, a uniform resource locator (URI), email address or any other address or identifier which can be represented in the metadata of a transaction script and used as a destination for an electronic communication.

Privacy preserving validation and commit architecture

A method of scheduling and validating a multiple-participant process, the method including: submitting, by a submitting node associated with a participant in the multiple-participant process, a proposed transaction by sending a cryptographically-protected message to one or more recipient nodes, wherein the cryptographically-protected message includes at least an unencrypted submessage readable by an external node and a cryptographically-protected submessage to preserve privacy from at least the external node; determining, by the external node, an order of the proposed transaction relative to other transactions; by way of at least some of the recipient nodes, validating the cryptographically-protected message; receiving a confirmation of validity of the cryptographically-protected message from at least some of the recipient nodes; finalizing the proposed transaction, as a confirmed transaction, based on receiving one or more confirmations from at least some of the recipient nodes that satisfy a confirmation condition; and writing the confirmed transaction to a distributed ledger according to the order determined by the external node.

SYSTEMS AND METHODS FOR PROTECTING USER DATA PRIVACY AGAINST ANTI-TRACKING EVASION TECHNIQUES FOR WEB TRACKERS
20230097984 · 2023-03-30 ·

The disclosed computer-implemented method for protecting user data privacy against anti-tracking evasion techniques for web trackers may include (i) detecting hypertext markup language (HTML) associated with a website displayed in a browser application, (ii) identifying one or more elements in the HTML capable of executing web tracking code from the website, (iii) determining, based on information describing scripting programming code responsible for embedding the HTML elements in the website, a presence of a hidden web tracking script, and (iv) performing a security action that protects against a potential invasion of user data privacy by preventing the hidden web tracking script from executing the web tracking code in the browser application. Various other methods, systems, and computer-readable media are also disclosed.

BEHAVIORAL BASELINING FROM A DATA SOURCE PERSPECTIVE FOR DETECTION OF COMPROMISED USERS

A method and system are disclosed. The method and system include receiving, at a wrapper, a communication and a context associated with the communication from a client. The communication is for a data source. The wrapper includes a dispatcher and a service. The dispatcher receives the communication and is data agnostic. The method and system also include providing the context from the dispatcher to the service. In some embodiments, the method and system use the service to compare the context to a behavioral baseline for the client. The behavioral baseline incorporates a plurality of contexts previously received from the client.

Secure anonymous communications methods and apparatus
11616763 · 2023-03-28 · ·

Methods and apparatus for supporting secure anonymous communications are described. A first communications device, e.g., a virtual desktop device, in a communications network, e.g., a private ISP network, serves on behalf of a first user device as an endpoint for a communications session with a second device. The first communications device includes a fabricated set of device attribute information which is different from an actual set of device attribute information corresponding to the first user device. The communications network includes a set of onion routers and onion routing is used within the network.

Third-party platform for tokenization and detokenization of network packet data

Methods, systems, and apparatus, including computer programs encoded on computer storage media, for securing data. One of the methods includes receiving one or more network data packets. The one or more network data packets include a token that identifies stored sensitive data. The one or more network data packets are desanitized, by: identifying and extracting, from the one or more network data packets, the token; requesting, from a distributed file system, the stored sensitive data, based upon the token; and receiving, in response to the request, the stored sensitive data as received stored sensitive data.

System and method for anonymized data repositories

A computing system includes an anonymizer server. The anonymizer server is communicatively coupled to a data repository configured to store a personal identification information (PII) data. The anonymizer server is configured to perform operations including receiving a repository configuration request comprising an anonymized data schema, and creating an anonymized data repository clone based on the anonymized data schema. The anonymizer server is also configured to perform operations including anonymizing the PII data to create an anonymized data by applying a one-way data masking, a one-way data morphing, or a combination thereof, and storing the anonymized data in the anonymized data repository clone.

Mathematical method for performing homomorphic operations
11615202 · 2023-03-28 ·

The present invention relates generally to a system and method of querying an anonymized database. More particularly, the invention provides a method and system for querying an anonymized database without the need to decrypt queried data while it's processed. Even more specifically, the invention provides a method and system of anonymizing a database such that it may be queried efficiently in near real time while still retaining the ability to not decrypt requested data while it's being processed.