Patent classifications
G06F21/62
ELECTRONIC VOTING SYSTEM AND ELECTRONIC VOTING METHOD
The present invention relates to an electronic voting system and an electronic voting method. The system for electronic voting includes an operation computer including at least one processor and a memory coupled to the processor, wherein the processor causes the system to: perform user authentication of voting participants who wish to participate in the online electronic voting; anonymize information of the voting participants whose the user authentication has been completed; give unique identification information to each of the voting participants who have completed anonymization process; and collect the voting information that the electronic voting has been conducted using the unique identification information given to the voting participants, and count the collected voting information as voting results.
DATA PROCESSING METHOD, APPARATUS, AND SYSTEM, DEVICE, AND MEDIUM
A data providing apparatus obtains first privacy data and second privacy data, encrypts the first privacy data by using an encryption algorithm to obtain a ciphertext of the first privacy data, and sends the ciphertext of the first privacy data and the second privacy data to a data processing apparatus. The data processing apparatus inputs the ciphertext of the first privacy data and the second privacy data into a ciphertext computation function to obtain a ciphertext of a data processing result. In this way, the first privacy data is used in computation in a ciphertext form, thereby ensuring security. In addition, the second privacy data is used in computation in a plaintext form, thereby reducing ciphertext input for the ciphertext computation function.
ANONYMIZATION APPARATUS, ANONYMIZATION METHOD, AND COMPUTER READABLE MEDIUM
An anonymization apparatus (100) includes an anonymization unit (120), a plurality of attack units (131), a degree of safety calculation unit (133), and a parameter adjustment unit (140). The anonymization unit (120) generates anonymized data. Each of the plurality of attack units (131) generates re-identification data that corresponds to the anonymized data using a re-identification attack algorithm that differs from each other. The degree of safety calculation unit (133) calculates a degree of safety of each piece of the re-identification data that each of the plurality of attack units (131) generated. The parameter adjustment unit (140) adjusts an anonymization parameter in a case where at least one of the degrees of safety does not satisfy a degree of safety standard.
ADDITIVE AND SUBTRACTIVE NOISE FOR PRIVACY PROTECTION
This disclosure relates to using additive and subtractive noise for preserving the privacy of users. In one aspects, a method includes obtaining a first set of genuine user group identifiers that identify user groups that include a user as a member. A second set of user group identifiers is generated for the user by removing zero or more genuine user group identifiers from the first set to generate the second set and adding, to the second set, one or more fake user group identifiers for user groups that do not include the user as a member. A probabilistic data structure is generated based on the second set of user group identifiers. The probabilistic data structure is transmitted to a recipient computing system. Data indicating a set of digital components including at least one digital component selected based on the probabilistic data structure is received. A given digital component is presented.
AUTHENTICATION PROCESSING SERVICES FOR GENERATING HIGH-ENTROPY CRYPTOGRAPHIC KEYS
Systems, methods, and computer-readable media for facilitating an authentication processing service are provided.
METHOD FOR ENCRYPTING DATABASE SUPPORTING COMPOSABLE SQL QUERY
Disclosed is a database encryption method supporting composable SQL query, which mainly comprises the following steps: (1) a user encrypting and preprocessing data based on the encryption scheme provided by the present disclosure and uploading an encryption result and preprocessed data to a service provider; (2) setting and uploading a SQL query instructions: the user uploads the query instruction to the service provider according to actual needs, and uploads auxiliary parameters for the query instruction at the same time; (3) data query: the service provider performs SQL query according to the query instruction and auxiliary parameters received from the user, saves a calculation result, updates the data and returns a query result to the user.
SYSTEMS AND METHODS FOR PROCESSING REQUESTS FOR REAL-TIME TRANSFERS OF RESOURCES
A computer-implemented method is disclosed. The method includes: receiving transfer parameters associated with a request for a first transfer of resources, the transfer parameters including an identifier of a designated transferor associated with the first transfer; determining that the transferor is eligible to access at least one protected data source based on the transfer parameters; generating a request message for the request including reference data for accessing the at least one protected data source; and providing, to a computing device associated with the transferor, the request message.
Support for Multi-Type Users in a Single-Type Computing System
Persistent storage contains a parent table and one or more child tables, the parent table containing: a class field specifying types, and one or more filter fields. One or more processors may: receive a first request to read first information of a first type for a first entity; determine that, in a first entry of the parent table for the first entity, the first type is specified in the class field; obtain the first information from a child table associated with the first type; receive a second request to read second information of a second type for a second entity; determine that, in a second entry of the parent table for the second entity, the second type is indicated as present by a filter field that is associated with the second type; and obtain the second information from a set of additional fields in the second entry.
SYSTEMS AND METHODS FOR CONTROLLING ACCESS TO A DATABASE
Systems and methods for throttling requests submitted to a database are designed to maximize the rate at which information can be obtained from the database. In the throttling methods, the time required for the database to perform a certain operation is monitored. If the time required to perform the operation exceeds a threshold time period, a request limit is imposed on the database, the request limit limiting the number of data read and/or write requests that can be submitted to the database per unit of time.
SYSTEM FOR TRACKING PATIENT REFERRALS
The instant invention relates to a system that in one form is a referral system for use in various healthcare sectors, which utilizes patient profiles, created using patient trackers, to monitor patient follow-up care. The instant invention allows physicians and providers to communicate about patient’s care in its entirety, beginning with the originating provider creating a patient tracker, sharing that patient tracker with referred physicians, and discharging the patient once the patient tracker’s plans have concluded. This uninterrupted flow of communication amongst all providers and physicians allows for a secured method of tracking each patient’s healthcare plan, provides for efficient healthcare referral follow-ups, and updates the originating HCPs records to ensure there are no gaps in terms of patient treatment.