Data anonymizing blockchain system
First Claim
1. A blockchain processing method comprising:
- assigning, via a blockchain, a unique transaction key to one or more edge devices to sign captured encrypted Internet of Things (IoT) data to be sent to the blockchain, thereby enabling the blockchain to verify that the encrypted IoT data is received from a trusted source;
storing the encrypted IoT data as transactions in the blockchain, the IoT data being captured by the one or more edge devices of an IoT network;
receiving an identification of an event, and in response, retrieving encrypted IoT transaction data stored in the blockchain which is associated with the event;
decrypting, via a blockchain node, the retrieved IoT transaction data associated with the event and generating anonymized data of the event from the decrypted IoT transaction data in which personally identifiable information is anonymized; and
outputting information concerning the anonymized data of the event to one or more of a user device and a display device.
1 Assignment
0 Petitions
Accused Products
Abstract
An example operation may include one or more of storing encrypted IoT data as transactions in a blockchain, the IoT data being captured by one or more edge devices of an IoT network, receiving an identification of an event, and in response, retrieving encrypted IoT transaction data stored in the blockchain which is associated with the event, decrypting, via a blockchain node, the retrieved IoT transaction data associated with the event and generating anonymized data of the event from the decrypted IoT transaction data in which personally identifiable information is anonymized, and outputting information concerning the anonymized data of the event to one or more of a user device and a display device.
21 Citations
20 Claims
-
1. A blockchain processing method comprising:
-
assigning, via a blockchain, a unique transaction key to one or more edge devices to sign captured encrypted Internet of Things (IoT) data to be sent to the blockchain, thereby enabling the blockchain to verify that the encrypted IoT data is received from a trusted source; storing the encrypted IoT data as transactions in the blockchain, the IoT data being captured by the one or more edge devices of an IoT network; receiving an identification of an event, and in response, retrieving encrypted IoT transaction data stored in the blockchain which is associated with the event; decrypting, via a blockchain node, the retrieved IoT transaction data associated with the event and generating anonymized data of the event from the decrypted IoT transaction data in which personally identifiable information is anonymized; and outputting information concerning the anonymized data of the event to one or more of a user device and a display device. - View Dependent Claims (2, 3, 4, 5, 6, 7, 8, 9)
-
-
10. A blockchain computing system comprising:
-
a processor configured to; assign, via a blockchain, a unique transaction key to one or more edge devices to sign captured encrypted Internet of Things (IoT) data to be sent to a blockchain, thereby enabling the blockchain to verify that the encrypted IoT data is received from a trusted source; and a storage configured to; store the encrypted IoT data as transactions in the blockchain, the IoT data being captured by the one or more edge devices of an IoT network, and wherein the processor is further configured to; receive an identification of an event, and in response, retrieve encrypted IoT transaction data stored in the blockchain which is associated with the event, decrypt the retrieved IoT transaction data associated with the event, and generate anonymized data of the event from the decrypted IoT transaction data in which personally identifiable information is anonymized, and output information concerning the anonymized data of the event to one or more of a user device and a display device. - View Dependent Claims (11, 12, 13, 14, 15, 16, 17, 18)
-
-
19. A non-transitory computer readable medium configured to store one or more instructions that when executed by a processor cause the processor to perform a method comprising:
-
assigning, via a blockchain, a unique transaction key to one or more edge devices to sign captured encrypted Internet of Things (IoT) data to be sent to a blockchain, thereby enabling the blockchain to verify that the encrypted IoT data is received from a trusted source; storing the encrypted IoT data as transactions in the blockchain, the IoT data being captured by the one or more edge devices of an IoT network; receiving an identification of an event, and in response, retrieving encrypted IoT transaction data stored in the blockchain which is associated with the event; decrypting, via a blockchain node, the retrieved IoT transaction data associated with the event and generating anonymized data of the event from the decrypted IoT transaction data in which personally identifiable information is anonymized; and outputting information concerning the anonymized data of the event to one or more of a user device and a display device. - View Dependent Claims (20)
-
Specification