Patent classifications
H04L2209/42
Tracking and analyses of data consumption
Systems and methods for providing services are disclosed. One aspect comprises authenticating a user associated with a first service, receiving a selection of a second service, generating an opaque identifier associated with the user and the first service, wherein the opaque identifier facilitates the anonymous collection of data relating to the second service. Another aspect can comprise transmitting the opaque identifier to the second service, and receiving data relating to the second service.
METHOD TO ANONYMIZE CLIENT MAC ADDRESSES FOR CLOUD REPORTING
A method for anonymizing user identifiable information to be transmitted outside of a local network includes generating a network entity hash input based on (i) a first MAC address assigned to a client station of the local network, (ii) a second MAC address assigned to the network gateway device of the local network, and (iii) an identifier of a cloud entity of an external network to which data of the client station is to be transmitted. The method further includes generating a hash value output based on the network entity hash input and a random token value using a hashing function, generating an anonymized MAC address associated with the client station based on the hash value output, and transmitting the anonymized MAC address associated with the client station to the cloud entity of the external network.
IMPROVED COMPUTER IMPLEMENTED METHOD FOR ANONYMOUS PROXIMITY TRACING
A computer implemented method for anonymous proximity tracing implemented by a plurality of participating devices. The method includes, upon detection by a first participating device of a respective current public key broadcast by a second participating device, at each of the first participating device and second participating device: i. computing a current shared secret; ii. computing first and second tokens parametrized with the current shared secret and a value relating to the first, and respectively second, participating devices; and iii. based on a sorting value, storing the first and second tokens in selected ones of first and second encounter token lists of the first and second participating devices; and selectively uploading at least part of one of the first encounter token list or the second encounter token list by a given participating device to a proximity management server.
SYSTEM AND METHOD FOR ANONYMOUS LOCATION VERIFICATION
A computer implemented system for anonymous electronic verification of location credentials including at least one processor and data storage is described in various embodiments. The system includes cryptographic mechanisms and electronic communication between one or more computing systems that in concert, provide verification of a prover's location credentials in accordance to logical conditions of a verifier's policy without providing additional information to a verifier entity.
Diversification of Public Keys
Some embodiments provide a method for providing public keys for encrypting data. The method receives (i) a first request from a first source for a public key associated with a particular user and (ii) a second request from a second source for the public key associated with the particular user. In response to the first request, the method distributes a first public key for the particular user to the first source. In response to the second request, the method distributes a second, different public key for the particular user to the second source. Data encrypted with the first public key and data encrypted with the second public key are decrypted by a device of the particular user with a same private key.
DETECTING AND EVICTING MALICIOUS VEHICLES IN A VEHICLE COMMUNICATIONS NETWORK
A method, computer program product and computer system maintain a list that includes identifiers of vehicles determined by the processor of a detective vehicle to have an innocent status. The processor selects, for each sub-period of a predefined time period, a target vehicle from a plurality of vehicles, where the detective vehicle communicates either directly or indirectly with each vehicle of the plurality and accepts communications from the plurality, where a portion of the plurality of vehicles and the detective vehicle are within a vehicle-to-vehicle communication range, and where vehicle-to-vehicle communication does not utilize infrastructure network connectivity. The processor obtains, over a vehicle-to-vehicle communication or a network connection, messages regarding a status of the target vehicle. The processor determines the status of the target vehicle, where the status is one of: malicious or innocent. The processor notifies the vehicles associated with the identifiers on the list of the determination.
Digital watermarking without significant information loss in anonymized datasets
A computer-implemented process of altering original data in a dataset, in which original data is anonymised and a digital watermark is included in the anonymised data. Anonymising the original data incurs information loss, and the process of including the digital watermark does not add significant further information loss. The original data can be a tabular file, a relational or a non-relational database, or the results of interactive database queries. Anonymising the data is achieved using one or more techniques that perturb the original data, such as tokenisation, generalisation; data blurring, synthetic record insertion, record removal or re-ordering.
Obtaining a credential for V2X transmission on behalf of a vehicle
Techniques described herein include utilizing a mobile device as a proxy receiver and/or transmitter for a vehicle in a V2X network. In some embodiments, the mobile device associated mobile device capabilities may be configured to obtain vehicle capabilities and store such data in memory at the mobile device. The mobile device may obtain any suitable combination of a reception credential and one or more transmission credentials. In some embodiments, the one or more transmission credentials may be generated by a credential authority based at least in part on determining that the vehicle capabilities and mobile device capabilities indicate that the sensor(s) and/or processing resources of the vehicle and/or mobile device meet transmission requirement thresholds for the network. The mobile device may subsequently transmit any suitable data message on behalf of the vehicle using at least one of the transmission credentials.
Apparatus and methods for selectively revealing data
An apparatus and method for selectively revealing user data. User data may be stored on an immutable sequential listing and accessed through the immutable sequential listing. Processor of apparatus is configured to receive user-associated data to be stored in a resource data storage system. Processor is configured to sort the user-associated data into data sets and assigned an identifier to each data set. Identifier may be related to job history, education history, volunteer history, or the like. Processor is configured to receive a request to reveal data from a third-party and transmit data set to the requestor. Third party and data in data sets may be verified and validated.
Systems, methods, and devices for digital advertising ecosystems implementing content delivery networks utilizing edge computing
Disclosed herein are systems and techniques for using a content delivery network to perform various functions within a digital advertising ecosystem, in ways that yield technological benefits such as improved security, efficiency, and speed (for example, reduction in publisher load times). As one specific example, a content delivery network can be used for the creation of electronic tokens for user identity protection between demand side platforms, supply side platforms, content creators (for example, advertisers), and publishers.