G06F21/6245

Method of ensuring confidentiality and integrity of stored data and metadata in an untrusted environment

A system and method for storing and recovering a computer file. The method includes calculating fingerprint data of the file, separating the file into a plurality of data sub-files each having the same size and a single data sub-file having a smaller size than the other data sub-files, and attaching file metadata to the single data sub-file or as a metadata sub-file. The method also includes padding the single data sub-file including the metadata so that it is the same size as the plurality of data sub-files or the metadata sub-file so that it is the same size as the plurality of data sub-files, adding a header to each data sub-file that includes information about the sub-file, assigning a unique filename to each data sub-file, encrypting each data sub-file, and storing each data sub-file as separate files under their unique filename.

Method and system for protecting privacy of users in session recordings

A computer system is provided. The computer system includes a memory and a processor. The processor is configured to scan user interface (UI) data representative of a plurality of UI controls; detect a portion of the UI data associated with private information, the portion corresponding to a UI control of the plurality of UI controls; record first session data comprising an obfuscated version of the UI control and unobfuscated versions of other UI controls of the plurality of UI controls; record second session data comprising an unobfuscated version of the UI control; encrypt the second session data to generate encrypted session data; and store the encrypted session data in association with the first session data.

Systems and methods for privacy-protecting hybrid cloud and premise stream processing

Systems and methods for privacy-protecting hybrid cloud and premise stream processing are disclosed. In one embodiment, in an information processing device comprising at least one computer processor, a method for processing a voice communication including restricted content may include: (1) receiving from an electronic device, a customer communication; (2) identifying restricted content in the customer communication; (3) masking or marking the restricted content in the customer communication; (4) communicating the customer communication with the masked or marked restricted content to a cloud processor; (5) receiving a processed responsive communication comprising the masked or marked restricted content from the cloud processor; (6) unmasking or unmarking the restricted content in the processed responsive communication; and (7) communicating the processed responsive communication comprising the unmasked or unmarked restricted content to the electronic device.

Providing services according to a context environment and user-defined access permissions

Disclosed are various embodiments for establishing a connection between a client device and a third-party entity device and providing services associated with a third-party entity to the client device according to user-defined access permissions. A context environment can be determined according to user data and third-party entity data. Services available to the user device can be selected according to the context environment, the user-defined access permissions and third-party defined instructions. Upon selecting the services, the services are provided to the client device and a connection between the client device and a third-party entity device can be established.

Systems and methods for privacy management in an autonomous mobile robot

A method of operating a mobile cleaning robot can include receiving a privacy mode setting from a user interface, where the privacy mode setting is based on a user selection between at least two different privacy mode settings for determining whether to operate the mobile cleaning robot in an image-capture-restricted mode. An image stream of an image capture device of the mobile cleaning robot is permitted in an absence of a user-selection of a more restrictive one of the privacy settings. At least a portion of the image stream is restricted or disabled based at least in part on a user-selection of a more restrictive one of the privacy settings.

Anti-cyberbullying systems and methods

Some embodiments use text and/or image processing methods to determine whether a user of an electronic messaging platform is subject to an online threat such as cyberbullying, sexual grooming, and identity theft, among others. In some embodiments, a text content of electronic messages is automatically harvested and aggregated into conversations. Conversation data are then analyzed to extract various threat indicators. A result of a text analysis may be combined with a result of an analysis of an image transmitted as part of the respective conversation. When a threat is detected, some embodiments automatically send a notification to a third party (e.g., parent, teacher, etc.)

CONVERSION DEVICE FOR SECURE COMPUTATION, SECURE COMPUTATION SYSTEM, CONVERSION METHOD FOR SECURE COMPUTATION AND CONVERSION PROGRAM FOR SECURE COMPUTATION
20230041118 · 2023-02-09 ·

A conversion device for secure computation for converting an input data which is an object data of secure computation into an input format applicable to the secure computation is provided. A conversion device for secure computation of the present invention includes an acquisition unit configured to acquire an object data of the secure computation; a storage unit configured to store a correspondence table specifying an input format required for executing the secure computation; a conversion processing unit configured to perform a conversion from the acquired object data into a secure computation data in accordance with the correspondence table; and an output unit configured to output the secure computation data.

METHOD, APPARATUS, COMPUTER DEVICE, STORAGE MEDIUM, AND PROGRAM PRODUCT FOR PROCESSING DATA
20230039182 · 2023-02-09 ·

A method, an apparatus, a computer device, a storage medium, and a program product for processing data are provided, which belong to the technical field of artificial intelligence. The method includes: acquiring model training information transmitted by each of at least two edge node devices, the model training information being transmitted in a form of plaintext, and being obtained by the edge node device by training sub-models through differential privacy; acquiring, based on the model training information transmitted by each of the at least two edge node devices, the sub-models trained by each of the at least two edge node devices; and performing, based on a target model ensemble policy, model ensemble on the sub-models trained by the at least two edge node devices, to obtain a global model. This solution expands the manner of model ensemble while ensuring the data security, thereby improving the model ensemble effect.

DATA OBFUSCATION
20230040974 · 2023-02-09 ·

The present invention relates to a computer-implemented method for obscuring sensitive data. The method comprises: acquiring, by a processor, image data; extracting, by the processor, structured data from the image data, the structured data being sensitive data and having a defined functional format and a defined visual format; generating, by the processor, artificial data that is different from the structured data, the artificial data having the same functional format as the structured data; generating, by the processor, artificial image data based on the image data in which the structured data is replaced with the artificial data, the artificial data being based on the visual format of the structured data; and outputting, by the processor, the artificial image data.

PRIVACY SAFE JOINT IDENTIFICATION PROTOCOL
20230045553 · 2023-02-09 ·

The technical problem of matching records in different datasets, for example a host dataset and a partner dataset storing records representing respective users, while maintaining the privacy of each dataset, is addressed by providing a privacy safe joint identification protocol. The privacy safe joint identification protocol computes respective anonymous joint identifiers for records in the two datasets. An anonymous joint identifier is generated such that the host-assigned and the partner-assigned identifies that have been determined to represent the same user are mapped to the same anonymous joint identifier.