US 11,921,884 B2
Techniques for preventing collusion using simultaneous key release
Sivanarayana Gaddam, San Francisco, CA (US); Ranjit Kumaresan, San Francisco, CA (US); and Rohit Sinha, San Jose, CA (US)
Assigned to Visa International Service Association, San Francisco, CA (US)
Appl. No. 17/296,510
Filed by Visa International Service Association, San Francisco, CA (US)
PCT Filed May 2, 2019, PCT No. PCT/US2019/030415
§ 371(c)(1), (2) Date May 24, 2021,
PCT Pub. No. WO2020/112166, PCT Pub. Date Jun. 4, 2020.
Claims priority of provisional application 62/784,194, filed on Dec. 21, 2018.
Claims priority of application No. PCT/US2018/062847 (WO), filed on Nov. 28, 2018.
Prior Publication US 2022/0012358 A1, Jan. 13, 2022
Int. Cl. G06F 21/62 (2013.01); H04L 9/14 (2006.01); H04L 9/30 (2006.01); H04L 9/32 (2006.01); H04L 9/00 (2022.01)
CPC G06F 21/6245 (2013.01) [H04L 9/14 (2013.01); H04L 9/30 (2013.01); H04L 9/3247 (2013.01); H04L 9/50 (2022.05)] 20 Claims
OG exemplary drawing
 
1. A method comprising:
receiving distribution instructions for output data relating to a user of a client device, the distribution instructions comprising an indication of a plurality of data consumers;
encrypting the output data using a first cryptographic key;
providing access to the encrypted output data to each of the plurality of data consumers;
receiving, from each of the plurality of data consumers, an indication that the access to the encrypted output data was received by that data consumer; and
posting, a record comprising a plurality of indications that are respectively received from the plurality of data consumers and indicate that an access to the encrypted output data was received by the plurality of data consumers to a blockchain ledger respectively,
wherein, upon confirming with the blockchain ledger that the indication that each of the plurality of data consumers has been provided access to the encrypted output data, a second cryptographic key is provided to a plurality of private enclaves associated with computing devices operated by the plurality of data consumers, the second cryptographic key configured to be used by the data consumers to decrypt the encrypted output data.