Supercharge Your Innovation With Domain-Expert AI Agents!

Techniques for preventing collusion using simultaneous key release

A user, cryptographic key technology, applied to key distribution, can solve problems such as hindering the fair distribution of data

Pending Publication Date: 2021-07-23
VISA INT SERVICE ASSOC
View PDF0 Cites 2 Cited by
  • Summary
  • Abstract
  • Description
  • Claims
  • Application Information

AI Technical Summary

Problems solved by technology

In addition, hosts may only deliver output to a colluding subset of intended recipients, preventing fair distribution of data

Method used

the structure of the environmentally friendly knitted fabric provided by the present invention; figure 2 Flow chart of the yarn wrapping machine for environmentally friendly knitted fabrics and storage devices; image 3 Is the parameter map of the yarn covering machine
View more

Image

Smart Image Click on the blue labels to locate them in the text.
Viewing Examples
Smart Image
  • Techniques for preventing collusion using simultaneous key release
  • Techniques for preventing collusion using simultaneous key release
  • Techniques for preventing collusion using simultaneous key release

Examples

Experimental program
Comparison scheme
Effect test

Embodiment Construction

[0020] In the following description, various embodiments will be described. For the purposes of explanation, specific configurations and details are set forth to provide a thorough understanding of the embodiments. However, those skilled in the art will appreciate that embodiments may be practiced without specific details. Moreover, well-known features may be omitted or simplified to avoid obscuring the description.

[0021] The description of some terms prior to the details of some embodiments of the present invention can be conducive to various embodiments.

[0022] The "block chain" can include a distributed database. The block chain can be used to maintain a list of records called blocks. The block chain can be used to maintain a record of affairs or events between the parties in a difficult manner. Each block in the block chain can include a number of records, and a hash of the previous block in the block chain. If the record in the previous block changes, the hash in any of ...

the structure of the environmentally friendly knitted fabric provided by the present invention; figure 2 Flow chart of the yarn wrapping machine for environmentally friendly knitted fabrics and storage devices; image 3 Is the parameter map of the yarn covering machine
Login to View More

PUM

No PUM Login to View More

Abstract

Described herein are a system and techniques for enabling user control over usage of their information by data consumers, even when untrusted parties are involved, while also preventing collusion between the untrusted party and a data consumer. A user's information may be collected by a client device and provided to a host server. An encrypted version of the user's information may be stored at the host server so that it is processed on a private enclave of the host server. When the data is to be provided to multiple data consumers, the data may be encrypted for each of the data consumers and may be released to each of those data consumers simultaneously once confirmation has been received that the data has been made available to each of the data consumers.

Description

[0001] Related application cross-reference [0002] The International Application Requirements The priority of US patent application submitted on December 21, 2018 and is part of PCT / US 2018 / 062847, filed on November 28, 2018, and these patent applications. The disclosure is incorporated herein by reference in all purposes. Background technique [0003] Modern network services have caused the public to lack transparency issues in the way they manage sensitive user data. In addition to the privacy strategy specified in the law, users don't know how to use or share their data with third parties, not to say control. Not surprisingly (users don't know), their sensitive data surge, misuse and sometimes leaked to the attacker due to security vulnerabilities. Although this user data is usually able to provide the user to provide the original unavailable functionality, once the data is no longer owned by the user, those users typically cannot control the use of the data. [0004] Althoug...

Claims

the structure of the environmentally friendly knitted fabric provided by the present invention; figure 2 Flow chart of the yarn wrapping machine for environmentally friendly knitted fabrics and storage devices; image 3 Is the parameter map of the yarn covering machine
Login to View More

Application Information

Patent Timeline
no application Login to View More
Patent Type & Authority Applications(China)
IPC IPC(8): H04L9/08H04L9/14
CPCH04L9/3239H04L9/0618H04L9/3247H04L9/3297H04L9/50H04L9/088H04L9/0897H04L2209/46H04L2209/60G06F21/6245H04L9/14H04L9/30
Inventor S·加达姆R·库马雷桑R·辛哈
Owner VISA INT SERVICE ASSOC
Features
  • R&D
  • Intellectual Property
  • Life Sciences
  • Materials
  • Tech Scout
Why Patsnap Eureka
  • Unparalleled Data Quality
  • Higher Quality Content
  • 60% Fewer Hallucinations
Social media
Patsnap Eureka Blog
Learn More