H04L63/04

Methods and apparatus to collect distributed user information for media impressions and search terms

Methods and apparatus to collect distributed user information for media impressions and search terms are disclosed. An example method includes accessing, from a media device, a first identifier and a search term at a first server, the first identifier corresponding to at least one of the media device or a user of the media device, the search term associated with a search request, generating a second identifier based on the first identifier, sending the second identifier and the search term from the first server to a data collection server to facilitate the data collection server to logging the search request, and receiving user information associated with the search request from a database proprietor based on the second identifier.

DYNAMIC SECURE KEYBOARD RESOURCE OBTAINING INTERFACE DEFINITIONS FOR SECURE AD-HOC CONTROL OF A TARGET DEVICE IN A SECURE PEER-TO-PEER DATA NETWORK
20230231844 · 2023-07-20 · ·

A secure executable container executed by an endpoint device establishes a two-way trusted relationship in a secure peer-to-peer data network with a user entity, generates an endpoint identifier for the endpoint device in the secure peer-to-peer data network, and associates the endpoint device with a federation identifier identifying the user entity in the secure peer-to-peer data network. The secure executable container also: establishes a two-way trusted relationship between the endpoint device and a target network device; securely obtains, via the secure peer-to-peer data network, a user interface element definition describing a user interface element executable by the target network device; and supplies the user interface element definition to a secure keyboard resource executed in the endpoint device, causing the secure keyboard resource to generate a local representation of the user interface element for control of the target network device via the secure keyboard resource.

SECURE DATA TRANSFER REQUEST ROUTING FOR PEER-TO-PEER SERVICES

A device configured to receive a data transfer initiation request from a first user and to identify a user profile that is associated with a first user identifier for the first user. The device is further configured to obtain an account number and a routing number for the first user from the user profile. The device is further configured to obtain routing instructions for a service provider based on a service provider identifier. The device is further configured to generate a data transfer request that includes the account number for the first user, the routing number for the first user, a second user identifier for a second user, a data type identifier, and a data transfer type identifier. The device is further configured to send the data transfer request to the service provider in accordance with the routing instructions for the service provider.

Dynamic photograph classification

Embodiments of the present invention provide a computer system a computer program product, and a method that comprises identifying privacy data within received data by identifying markers that are indicative of privacy data within the received data; generating a respective classification of an object within the identified privacy data; assigning values to the generated respective classification of the object based on a perceived threat level associated with the identified privacy data; and in response to determining that the assigned value of the received data triggers an alert associated with a predetermined threshold for privacy, automatically preventing distribution of the received data from a computing device to another computing device.

Methods, systems, and media for protected near-field communications
11706622 · 2023-07-18 · ·

Methods, systems, and media for protected near-field communications are provided. In some embodiments, the method comprises: receiving, from an NFC tag device, a request for an NFC reader device identifier (ID); transmitting the NFC reader device ID to the NFC tag device; receiving an NFC tag device ID; determining whether the NFC tag device ID matches an NFC tag device ID stored in memory of the NFC reader device; in response to determining that the NFC tag device ID matches the NFC tag device ID, transmitting a password to the NFC tag device; receiving, from the NFC tag device, a shared secret; determining whether the received shared secret matches a shared secret stored in the memory of the NFC reader device; and in response to determining that the received shared secret matches the shared secret, causing an action to be performed by a device associated with the NFC reader device.

PERSONAL DATA WALLET
20230015523 · 2023-01-19 ·

Methods and systems are presented for providing a secured electronic transaction processing framework that enables online service providers to process electronic transactions for users while allowing the users to retain control over their user data. The secured electronic transaction processing framework includes a data access system configured to dynamically access user data, that is stored on user devices and controlled by users, on an as-needed basis. When a service provider server receives a request for processing a transaction through a user account, the service provider serer may use the data access system to dynamically obtain user data required for processing the transaction from a wallet application of a user device. The wallet application may include data access policies that specify data access settings for different service providers. After processing the transaction using the user data, the service provider server may remove the user data.

SYSTEMS AND METHODS FOR FEDERATED PRIVACY MANAGEMENT
20230224170 · 2023-07-13 ·

Systems and methods for federated privacy management are disclosed. In one embodiment, a method for federated privacy management may include: (1) receiving, at a user management node, and from a client application executing on an electronic device, a device identifier; (2) receiving, by the user management node, and from a second layer node in a multi-layer federated privacy management network, data comprising at least one of browsing data and application data from a web host or a server, wherein the data is in response to an internet protocol request from the client application via a first layer node and the second layer node to the web host or the server, and the data is associated with the device identifier; (3) receiving, at the user management node, a request for the data from the client application using the device identifier; and (4) communicating the data to the client application.

Default sharing between frequently used line of business products

Systems and methods related facilitating default sharing between frequently used line of business products according to one or more example embodiments are shown. Such systems and methods make use of sharing of information between the line of business products. In some embodiments, this sharing of the data between line of business products facilitates a universal portal that may be personalized and/or customized in function and appearance. In some embodiments, the universal portal is an application on a user device that, at least, provides access to other applications running on the user device in a consolidated manner as well as additional functions present in the universal portal itself. In some embodiments, visual aspects of the presentation of applications and functionality are changed in the universal portal based on information that has been shared between different line of business products.

Allocation of tokens for network packets based on application type
11700150 · 2023-07-11 · ·

Described herein are systems, methods, and software to manage the deployment and use of application identifier tokens in a distributed firewall environment. In one implementation, a computing environment generates tokens associated with application types executing on virtual nodes in the computing environment. After generating the tokens, the computing environment provides at least one token of the tokens to each of the virtual nodes based on at least one application type executing on the virtual node. When a communication is identified in the virtual node associated with an application, the virtual node may encapsulate the communication and a corresponding token in a packet and forward the packet via a virtual network interface associated with the virtual node.

Providing enhanced functionality in an interactive electronic technical manual

Embodiments of the present disclosure provide methods, apparatus, systems, computer program products for transferring a performance of a procedure found in technical documentation for an item via an interactive electronic technical manual system (IETM) configured to provide electronic and credentialed access to the technical documentation. In one embodiment, a method is provided comprising: providing the steps of the procedure in an order in which the steps are to be carried out; and while a user is participating in the performance of the procedure: causing a particular step that is being carried out to be highlighted; receiving input of a selection of a transfer mechanism and in response: causing an indication to be displayed between the particular step and a next step to be carried out identifying where the performance has been suspended; providing a transfer window displaying transfer information; and recording the transfer information and an identifier for the indication.