Patent classifications
H04L9/0847
Data stream identity
Systems and methods for managing data stream identity are provided. Ownership information regarding a data stream may be analyzed to identify at least one owner. The data stream may be filtered to identify at least one portion that is associated with the identified owner. A unique identifier may be assigned to the identified portion. The identified portion may be stored in memory in association with the assigned unique identifier and information regarding the identified owner. Access to the identified portion may be controlled based on settings set by the identified owner.
SECURE DATA TRANSFER SYSTEM AND METHOD
Disclosed are methods and systems for securely providing identity attributes. A server computer may receive, from a relying entity, a request for identity attributes associated with a target entity, wherein the request for identity attributes includes a session identifier associated with the target entity and an identifier of the relying entity. The server computer may validate the request based on the session identifier. The server computer may identify, based on the identifier of the relying entity, a package defining types of identity attributes for the relying entity and a data access token associated with the package. Based on validating the request, the server computer may transmit, to a digital identity provider, a request for a set of identity attributes corresponding to the package, the request comprising the data access token. The server computer may receive, from the digital identity provider, the set of identity attributes.
DATA ENCRYPTION METHOD, DECRYPTION METHOD, APPARATUS, AND SYSTEM
A data encryption method performed at a computing device includes: receiving a data encryption request, the data encryption request indicating original data that needs to be encrypted and at least two target storage devices that are communicatively connected to the computing device; in response to the data encryption request: separately obtaining unique device information of the at least two target storage devices; generating, based on the unique device information, a public key according to a preset policy; encrypting the original data by using the public key to obtain ciphertext; and destructing relevant data of the public key from the computing device, and storing the ciphertext into the at least two target storage devices.
System and Method for Authenticating Public Artworks and Providing Associated Information
Processing artist artwork authentication and published artwork information at a user computing device comprises an artist artwork authentication and artist information system employing a client device configured to use imaged date converted to text to identify an artist central authority server for authenticating published artworks as well as an artwork unique identifier. The artist artwork authentication and artist information system communicates with the central authority server using the identity of the artist central authority server and requests a public key for the central authority server. The client device, upon receiving the public key, then communicates another message to the central authoritative server that includes an encrypted version of the unique identifier that can be used to identify a piece of artwork and an artist associated with the artwork. The client device receives in response receives information regarding the artwork, information relating to the artist, and other information relevant to the artwork.
SECURED DATA TRANSMISSION USING IDENTITY-BASED CRYPTOGRAPHY
A system is provided for secure data transmission. The system stores a public master key, private decryption key and secure messaging module for securely transmitting and receiving a digital model data file for transmission via a work order message. For transmitting and receiving the work order message, the system generate public encryption keys using a key generation algorithm in which each of the public encryption keys are unique to a designated message recipient and generated using an input including the public master key, a validity period, and an identifier of the designated message recipient. The system may also store a revocation list that includes identifiers of message recipients that have revoked access to the public master key or private decryption key, and based thereon determine whether or not to encrypt and transmit the work order message, or receive and decrypt the work order message.
Methods and systems for bootstrapping an end-to-end application layer session security keyset based on a subscriber identity master security credential
An exemplary security key bootstrapping system determines an application layer session security keyset uniquely associated with a client device and based on a subscriber identity master security credential. The subscriber identity master security credential is permanently stored within a component of the client device and is also stored on a subscriber identity management server associated with a provider network by which the client device is communicatively coupled with an application server system. The security key bootstrapping system uses the application layer session security keyset as a credential to provide end-to-end security for an application layer session between the client device and the application server system over the provider network. Neither the component of the client device nor the subscriber identity management server obtains the subscriber identity master security credential from an exchange of the subscriber identity master security credential over the provider network.
KEY GENERATION METHOD, DEVICE, AND SYSTEM
Embodiments of the invention relate to the communications field, and provide a key generation method, device, and system. The method includes: after receiving a first command, obtaining, by UE located in a first-standard network, a type identifier of a second-standard network that needs to provide a service to the UE, where the first command is a service request response message, or a handover command, or any message in an air interface secure activation process; determining, by the UE, an access key according to the type identifier of the second-standard network, a key of the first-standard network, and a NAS count of the first-standard network by using a preset key derivation algorithm; and generating, by the UE, an AS key of the second-standard network according to the access key. The present invention can resolve problems of relatively long total communication latency and relatively high communication load of a heterogeneous network.
Method and system for maintaining privacy and traceability of blockchain-based system
With the popularity of Blockchain comes grave security-related concerns. Achieving privacy and traceability simultaneously remains an open question. Efforts have been made to address the issues, while they may subject to specific scenarios. The present disclosure proposes a method, a system, and a device for maintaining privacy and traceability of a Blockchain-based system. The method includes: registering in a Blockchain-based system; transmitting a message from a transmitter T to a receiver R via an anonymous network, after a registration request of the transmitter T has been approved and storing message transmission data generated during a message transmission process in a Blockchain; and performing an identity disclosure by using the message transmission data when the message is detected to be false. The anonymous network may transmit the message by onion routing. The solution proposed by the present disclosure can achieve traceability and privacy for a Blockchain-based system simultaneously.
METHOD AND MANAGEMENT SERVER FOR REVOKING GROUP SERVER IDENTIFIERS OF COMPROMISED GROUP SERVERS
Method and management server for revoking group server identifiers of compromised group servers. One method includes determining, with a management server, an identity-based cryptographic signing key based on a group server identifier. The method also includes distributing, via the management server, the identity-based cryptographic signing key to a group server. The method further includes receiving, at the management server, a security status indicating that the security of the group server is compromised. The method also includes, responsive to receiving the security status, distributing, via the management server, a revocation of the group server identifier to a plurality of communication devices.
SYSTEM AND METHOD FOR IDENTITY-BASED KEY AGREEMENT FOR SECURE COMMUNICATION
The present invention provides a method and system for secure communication over communication network by an identity-based key agreement between the parties transmitting information over the network. The system and method there of employs (k, n) threshold secret sharing scheme and assures information theoretic secrecy that cannot be broken by unlimited computing power.