Patent classifications
H04L2209/42
ANONYMOUS DISTRIBUTED CONTACT TRACING AND VERIFICATION SYSTEM
An automated contact tracing system for anonymously identifying contacts between users includes at least a tracing server; and more than one mobile device or wearable of a user comprising means for short-range proximity communication and means for carrying out a computer program for generating Encounter-Tokens, when one user spent a pre-defined amount of time in a pre-defined proximity range of another user.
SYSTEMS AND METHODS FOR FUNCTIONALLY SEPARATING HETEROGENEOUS DATA FOR ANALYTICS, ARTIFICIAL INTELLIGENCE, AND MACHINE LEARNING IN GLOBAL DATA ECOSYSTEMS
Systems, program storage devices, and methods for improving data privacy/trust/anonymity/pseudonymity and data value, wherein data related to a Data Subject can be used and stored, while minimizing re-identification risk by unauthorized parties and enabling data related to the Data Subject to be disclosed to an authorized party by granting access only to the data relevant to that authorized party's purpose, time, place, and/or other criterion via the obfuscation of specific data values. The techniques described herein maintain this level of privacy/trust/anonymity/pseudonymity, while empowering Data Subjects, e.g., consumers or customers of such authorized parties, by enabling protection of data at the desired level of engagement with various business entities. The techniques described herein also allow Data Controllers to perform General Data Protection Regulation (GDPR) and Schrems II-compliant (and surveillance-proof) data processing, via the functional separation of heterogeneous data (e.g., via the use of “Variant Twins”) from embedded trust and privacy controls.
Systems, Methods and Devices for Trusted Transactions
The invention discloses a system for enhancing trust in transactions, most particularly in remote transactions between a plurality of transactional parties, for instance a seller and buyer(s) of goods and/or services over a public computer network such as the internet. Trust is disclosed to be a multivalent commodity, in that the trust that is to be enhanced relates to information about the subject matter of the transactions (e.g., the suitability of the goods and services sold), the bona fides of the supplier of the goods and services, the appropriateness of a pricing structure for a particular transaction or series of transactions, a quantum of additional transactional value that may be imparted to the transactional relationship, security of information exchange, etc.
DELEGATING AUTHORIZATIONS
Delegating authorizations sufficient to access services is contemplate. The authorization may be delegated in the form of a token or other transmissible construct relied upon to authenticate access to services, such as but not necessarily limited to conferring a user identity established via authenticated device for the purposes of enabling an unauthenticated or unsecured device to access a service associated with the user identity.
Systems and Methods for Enhancing Data Protection by Anonosizing Structured and Unstructured Data and Incorporating Machine Learning and Artificial Intelligence in Classical and Quantum Computing Environments
Systems, computer-readable media, and methods for improving both data privacy/anonymity and data value, wherein real-world, synthetic, or other data related to a data subject can be used while minimizing re-identification risk by unauthorized parties and enabling data, including quasi-identifiers, related to the data subject to be disclosed to any authorized party by granting access only to the data relevant to that authorized party's purpose, time period, purpose, place and/or other criterion via the required obfuscation of specific data values, e.g., pursuant to the GDPR or HIPAA, by incorporating a given range of those values into a cohort, wherein only the defined cohort values are disclosed to the given authorized party. Privacy policies may include any privacy enhancement techniques (PET), including: data protection, dynamic de-identification, anonymity, pseudonymity, granularization, and/or obscurity policies. Such systems, media and methods may be implemented on both classical and quantum computing devices.
PRIVACY-PRESERVING MOBILITY AS A SERVICE SUPPORTED BY BLOCKCHAIN
The present disclosure provides a communication network node for providing data to a distributed ledger, wherein the node has circuitry configured to: provide a user data management part for separating sensitive user data and non-sensitive user data, and provide the non-sensitive user data to the distributed ledger.
Method of protecting the identifying information of persons and computing devices, specifically those devices which are capable of sensing, capturing, receiving, transmitting, processing and storing digital information
The present invention relates to the secure identification, authentication, protection and transfer of personal and computing device identifying information between computing devices. Specifically the present invention is a method that removes the need to expose personal or computing device identifying information, while such information is in transit between computing devices.
METHODS AND SYSTEMS FOR ANONYMOUSLY TRACKING AND/OR ANALYSING INDIVIDUALS BASED ON BIOMETRIC DATA
Methods and systems are provided for anonymously tracking and/or analyzing flow or movement of individual subjects and/or objects using biometric data. A computer-implemented method enabling anonymous estimation of the amount and/or flow of individual subjects and/or objects, referred to as individuals, in a population moving and/or coinciding between two or more subject states using biometric data includes receiving identifying data, wherein the identifying data includes and/or is based on biometric data, from two or more individuals; generating, online and by one or more processors, an anonymized identifier for each individual; and storing: the anonymized identifier of each individual together with data representing a subject state; and/or a skew measure of such an anonymized identifier.
SYSTEM AND METHOD FOR DE-ANONYMIZING ACTIONS AND MESSAGES ON NETWORKS
A traffic-monitoring system that monitors encrypted traffic exchanged between IP addresses used by devices and a network, and further receives the user-action details that are passed over the network. By correlating between the times at which the encrypted traffic is exchanged and the times at which the user-action details are received, the system associates the user-action details with the IP addresses. In particular, for each action specified in the user-action details, the system identifies one or more IP addresses that may be the source of the action. Based on the IP addresses, the system may identify one or more users who may have performed the action. The system may correlate between the respective action-times of the encrypted actions and the respective approximate action-times of the indicated actions. The system may hypothesize that the indicated action may correspond to one of the encrypted actions having these action-times.
GEOSPATIAL-TEMPORAL PATHOGEN TRACING
Techniques for geospatial-temporal pathogen tracing include: obtaining, from multiple mobile devices in association with a first time, first contact tracing data including at least first geospatial traffic data and first values of a set of attributes associated with a pathogen; obtaining, from the multiple mobile devices in association with a second time, second contact tracing data including at least second geospatial traffic data and second values of the set of attributes associated with the pathogen; and applying at least the first contact tracing data and the second contact tracing data to a machine learning model, to obtain actionable intelligence associated with the pathogen.