G06F21/6263

Securing user-entered text in-transit

Systems and methods described herein discuss securing user-entered data in-transit between a first device and a second device. A user may enter text in a document. A first device may analyze the document to identify the user-entered text. The user-entered text may be separated from the document and transformed into an image using a machine learning algorithm. Transforming the text into an image may secure the data in-transit from the first device to a second device. The second device may receive the image and the document from the first device. The second device may reconstruct the user-entered text from the received image and re-assemble the document from the received document and the reconstructed user-entered text.

PERSISTENCE OF OBFUSCATED CONTENT IN LIVESTREAM DATA

In an approach to persistence of obfuscated content in livestream data, one or more computer processors receive a video stream. One or more computer processors identify a physical writing space within the video stream. One or more computer processors capture text written on the physical writing space by a presenter. One or more computer processors store the captured text in a tracking corpus. One or more computer processors monitor a position of the presenter with respect to the physical writing space. One or more computer processors determine at least a subset of the captured text is obfuscated from a viewer of the video stream on a device of the viewer. One or more computer processors identify the at least subset of the captured text. One or more computer processors render the at least subset of the captured text in the device of the viewer.

Decoupled custom event system based on ephemeral tokens for enabling secure custom services on a digital audio stream

A method comprises receiving a session identifier from a streaming system that identifies a user session with the streaming system. The method further includes receiving a first message from a streaming system that is based on a token that is generated based on a combination of the session identifier and a timestamp at which an insertable content item was presented to the user in a content stream by the streaming system. The first message is decrypted using a plurality of timestamps that are within a range of a current time. An identifier is determined for the insertable content item based on the decrypted message. A second message is transmitted to an enabling system, the message including instructions for execution by the enabling system to execute one or more operations with the identified insertable content item.

Decentralized privacy-preserving rewards with cryptographic black box accumulators

A decentralized and trust-minimizing computer architecture for computing rewards for users of an advertising system includes cryptographic black box accumulators (BBA), which is a cryptographic counter that only the issuer can update. An attention application requests initialization of a BBA from a guardian and subsequently requests updates to the BBA to track interactions between a user of the attention application and ads on the attention application. The guardian signs updates to the BBA to reach agreement on the state of ad interactions. The attention application may randomize the BBA and submit requests via an anonymous channel such that no participant can link two encounters with the BBA to each other or link the BBA to a specific attention application, thus improving user privacy. Reward redemption requests can be made based on a known policy and committed to a public blockchain for verification by observers that the protocol is operating correctly.

Systems and Methods for Controlling Data Exposure Using Artificial-Intelligence-Based Periodic Modeling
20250233922 · 2025-07-17 ·

Systems and methods for periodically modifying data privacy elements are provided. The systems and methods may identify a set of data privacy elements. A data privacy element can characterizes a feature of a computing device and can be detectable by a network host. A first artificial profile can be generated by modifying a first data privacy element based on an artificial profile model that defines a relationship associated with one or more constraints between the set of data privacy elements. Subsequent to generating the first artificial profile, a second artificial profile can be generated by periodically modifying a second data privacy element in accordance with the relationship defined by the artificial profile model. The computer device can be masked from being identified by the network host by sending the second artificial profile including the second data privacy element to a requested network location.

SECURED MANAGEMENT OF DATA DISTRIBUTION RESTRICTIONS
20220414247 · 2022-12-29 ·

Methods, systems, and apparatus, including computer programs encoded on a computer storage medium, for allowing suitable digital components to be automatically selected and provided to a client device. Methods can include generating a universal identifier for a digital component that is presented in the application. The application updates a set of universal identifiers that has been created for digital components presented by the application over a specified time period. The application identifies digital components and the corresponding universal identifiers that are blocked and generates a probabilistic data structure representing the set of blocked universal identifiers. The application creates multiple shares of the probabilistic data structure and transmits different shares to different servers. The application receives a separate response generated by each of the different servers based on the multiple shares and identifies a digital component to present in the application based on a combination of the separate responses.

CROSS-DOMAIN FREQUENCY FILTERS FOR FRAUD DETECTION
20220414258 · 2022-12-29 ·

This disclosure relates to using probabilistic data structures to enable systems to detect fraud while preserving user privacy. In one aspect, a method includes obtaining a set of frequency filters. Each frequency filter defines a maximum event count for a specified event type over a specified time duration and corresponds to a respective content provider. A subset of the frequency filters are identified as triggered frequency filters for which an actual event count for the specified event type corresponding to the frequency filter exceeds the maximum event count defined by the frequency filter during a time period corresponding to a specified time duration for the frequency filter. A probabilistic data structure that represents at least a portion of the frequency filters in the subset of frequency filters is generated. A request for content is sent to multiple content providers. The request for content includes the probabilistic data structure.

PRIVACY TRANSFORMATIONS IN DATA ANALYTICS

Systems and methods are provided for performing privacy transformation of data to protect privacy in data analytics under the multi-access edge computing environment. In particular, a policy receiver in an edge server receives privacy instructions. Inference determiner in the edge server in a data analytics pipeline receives data from an IoT device and evaluates the data to recognize data associated with personally identifiable information. Privacy data transformer transforms the received data with inference for protecting data privacy by preventing exposure of private information from the edge server. In particular, the privacy data transformer dynamically selects a technique among techniques for removing information that is subject to privacy protection and transforms the received data using the technique. The techniques includes reducing resolution of image data such that inference enables object recognition without sufficient details to prevent other servers in the data analytics pipeline to determine identifies of the object deeper inferences.

PROXY SERVICES FOR CONTROLLING THE PERSISTENCY, UTILIZATION, & DISSEMINATION OF INFORMATION PROVIDED TO A SERVICE WORKER

The disclosure is directed towards controlling the persistency of information provided to a service worker. A method includes receiving a response that includes response data. The response is received at a security service and was transmitted by a second computing device in response to receiving an information request from a first computing device. The first computing device implements a service worker. Sensitive data included in the response data is identified. The response includes caching instructions that instruct the service worker to cache the sensitive data at the first computing device. In response to identifying the sensitive data, the caching instructions are updated such that any portion of the response data that the updated caching instructions instruct the service worker to cache at the first computing device excludes the sensitive data. The updated response is transmitted to the first computing device and includes the response data and the updated caching instructions.

System and Method for Generating Search Results Based on Access to User-Approved Information
20220414265 · 2022-12-29 ·

A system and a method for generating search results based on access to user-approved information enable users to get personalized relevant consumable offers by sharing user-approved user information. The user account is prompted to enter a search query. If the search query is entered, the search query is relayed to the remote server. If the public user information meets the minimum information-sharing requirement of the compatible account, an account from the vendor accounts is designated as compatible account. The search query is compared to each consumable-related entry of the compatible account to identify a matching entry from the consumable-related entries of the compatible account. An offer result from the matching entry of the compatible account is generated. The user account is prompted to view the offer result. A viewing payment is executed between the user account and the compatible account, if the offer result is viewed by the user account.