H04L2209/42

Blockchain anonymous tokenization system

Various arrangements relate to a method performed by a processor of a computing system. An example method includes hashing a first salted value to generate a first hashed salted value. The first salted value includes a first salt value and a value. A first tuple is generated. The first tuple includes the first hashed salted value and a first token. The first token is associated with the value. A first BAT message is generated. The first BAT message includes the first salt value. The first BAT message is associated with the first tuple. A second salted value is hashed to generate a second hashed salted value. The second salted value includes a second salt value and a value. A second tuple is generated. The second tuple includes the second hashed salted value and a second token. The second token is associated with the value. A second BAT message is generated.

ANALYSIS QUERY RESPONSE SYSTEM, ANALYSIS QUERY EXECUTION APPARATUS, ANALYSIS QUERY VERIFICATION APPARATUS, ANALYSIS QUERY RESPONSE METHOD, AND PROGRAM

An analysis query response system comprises a user terminal 1 that generates and transmits an analysis query, and a database apparatus 2 including an analysis query verification apparatus 22 that includes a verification execution part 222 that performs a first verification of whether the analysis query satisfies a predetermined privacy preservation indicator, and an analysis query execution apparatus 21 that includes a personal data storage part 211 that stores personal data and an analysis query execution and preservation part 214 that, in a case where the first verification is successful, performs an analysis corresponding to the analysis query on the personal data read from the personal data storage part to acquire an analysis result, and applies a predetermined privacy-preserving mechanism to the acquired analysis result.

Safe Logon

Methods, computer-readable media, software, and apparatuses are provided to assist a user and vendor in completing an online trusted transaction. Trusted vendor websites are verified and user identities are confirmed through a cyber-security safe logon credentialing system. The vendor can be confident that the user identity has been verified to be who they say they are and the user can be confident that they are using a trusted verified vendor website.

Method, entity and system for managing access to data through a late dynamic binding of its associated metadata

A method, an entity, and a system for managing access to data. The data is associated with metadata. At least one predetermined access policy for accessing metadata includes, for each client, at least one identifier relating to the client. An entity receives from at least one client device, a data access request that includes at least one identifier relating to the client. The entity determines, based on the associated access policy, whether the metadata access is authorized. If yes, the entity determines, based on the associated access policy, associated first data allowing to access the metadata. The entity accesses, based on the first data, the associated metadata. The entity accesses, based on the accessed metadata and the associated access policy, at least a part of the associated data, as a late dynamic binding of the metadata with the associated data (or a part of it).

System for anonymizing and aggregating protected information

A system for anonymizing and aggregating protected information (PI) from a plurality of data sources includes a master index server coupled to a data repository. The master index server receives an anonymized records associated with an individual from a plurality of data hashing appliances. The system includes a cluster matching engine that applies a plurality of rules to hashed data elements of the received record for comparing hashed data elements of the record with hashed data elements of a plurality of clusters of anonymized records associated with different individuals stored in the data repository to determine whether the individual associated with the received record corresponds to an individual associated with one of the clusters of anonymized records. When a match is found, the cluster matching engine adds the received record to the cluster of anonymized records associated with that individual.

Systems and methods for secure data sharing

Systems and methods are provided for creating and using a sharable file-level key to secure data files. The file-level key is generated based on a workgroup key associated with the data file and unique information associated with the data file. The file-level key may be used to encrypt and split data. Systems and methods are also provided for sharing data without replicating the data on an end user machine. Data is encrypted and split across an external/consumer network and an enterprise/producer network. Access to the data is provided using a computing image generated by a server in the enterprise/producer network and then distributed to end users of the external/consumer network. This computing image may include preloaded files that provide pointers to the data. No access or replication of the data on the enterprise/producer network is needed in order for a user of the external/consumer network to access the data.

In-vehicle media content monitoring and report generation

The invention provides a novel and unique system and method for cross channel in-vehicle identification of media, source, and consumption measurement and analysis. Real-time measurement and analysis of all applicable forms of media that a driver or passenger may consume inside of an automobile can be achieved. This includes AM/FM radio, Satellite Digital Audio Radio Service (SDARS), stored media such as CDs, MP3s & DVDs, streaming media, internet radio, audio books, podcasts, text-to-speech content, use of hands-free calling and other forms of audio, including content routed to the In Vehicle Entertainment (IVE) system through integration with a smartphone, media player or similar external Consumer Electronic (CE) device via wired or wireless connectivity, including but not limited to USB, Bluetooth, Wi-Fi, and the like, and also including integration platforms such as APPLE CARPLAY, GOOGLE ANDROID AUTO, HARMAN AHA RADIO, PANASONIC AUPEO, PIONEER ZYPR, FORD SYNC, MIRRORLINK, AIRBIQUITY CHOREO, and the like.

Apparatus and method for automated privacy protection in distributed images
09785796 · 2017-10-10 · ·

A method executed by a computer includes receiving an image from a client device. A facial recognition technique is executed against an individual face within the image to obtain a recognized face. Privacy rules are applied to the image, where the privacy rules are associated with privacy settings for a user associated with the recognized face. A privacy protected version of the image is distributed, where the privacy protected version of the image has an altered image feature.

INFORMATION PROCESSING APPARATUS, INFORMATION PROCESSING SYSTEM, MEMBER IDENTIFICATION METHOD, AND NON-TRANSITORY COMPUTER READABLE MEDIUM STORING PROGRAM
20220051314 · 2022-02-17 · ·

An information processing device, an information processing system, a member identification method, and a program capable of preventing a member that has created an anonymous electronic signature from being arbitrarily identified from this signature are provided. A disclosure device (3) includes: a receiver (6) configured to receive signature information, which is information that constitutes an anonymous electronic signature; an identification information generation unit (7) configured to generate identification information, which is information for identifying a member that has created the anonymous electronic signature, based on the signature information; a storage unit (8) configured to store the number of times the identification information is generated by the identification information generation unit (7); and a transmitter (9) configured to transmit the identification information.

Systems and methods for secure detokenization

A method for requesting a credential associated with token in a multiple token layer environment is disclosed. A tokenization certificate serves to validate the identity of a credential requestor and provide information about the requestor's authorization for de-tokenizing a token. Also, a public key in the tokenization certificate is used to encrypt the credential for secure transmission to the requestor.