Patent classifications
H04L2209/42
INFORMATION PROCESSING APPARATUS, METHOD, AND PROGRAM
The present technology relates to an information processing apparatus, a method, and a program that can improve anonymity. An acquisition unit acquires a user identification ID that identifies a user and user data regarding the user. A derived ID generation unit carries out an operation using a one-way function, for data obtained from the user identification ID according to an increase in the number of the user data recorded in a recording unit, to generate a derived ID. A recording control unit causes the recording unit to record the generated derived ID and the acquired user data in association with each other to. In this way, the derived ID is generated according to the increase in the number of recorded user data, and the user data is recorded in association with the derived ID. Therefore, K-anonymity of the user data can be improved. The present technology can be applied to a server.
SYSTEM FOR MONITORING FLOWS OF PEOPLE WITHIN A PREDETERMINED AREA
A system for monitoring flows of people inside a predetermined area includes at least one receiving unit with at least one antenna adapted to receiving identification data transmitted by mobile communication devices present in a monitored area, the receiving unit also provided with a device for processing the data collected by the antenna; a processing unit programmed to perform statistical processing of the data collected by the antenna and processed by the respective processing device; and a data transmission network which connects the at least one receiving unit with the statistical data processing unit. Additionally, the processing device which receives the data collected by the antenna is programmed to perform an anonymization process with compression of the data, such that the data transmitted on the data transmission network are data that cannot be related back to the individual mobile devices that have generated them.
System, Method, and Computer Program Product for Maintaining User Privacy in Advertisement Networks
A method for maintaining user privacy in advertisement networks may include receiving first persona data associated with a first user from at least one publisher system. The first persona data may be generalized to form first generalized persona data. A session key may be generated. The first generalized persona data and the session key may be encrypted with a first public key of an advertisement network system to form a first ciphertext. The first ciphertext and first user identity data may be communicated to a mediator system. The first user identity data may be associated with first user's identity. A first encrypted targeted advertisement may be received based on the first generalized persona data from the advertisement network system via the mediator system. The first encrypted targeted advertisement may be decrypted with the session key to form a first targeted advertisement. A system and computer program product are also disclosed.
Pseudonym credential configuration method and apparatus
A pseudonym credential configuration method and apparatus are provided. The method includes: receiving an identifier of a terminal device and information about N to-be-requested pseudonym credentials from the terminal device, sending N second request messages to a pseudonym credential generation server, and storing a tag of each second request message in association with the identifier of the terminal device in the registration server, so that the registration server can obtain, based on the tag, the identifier that is of the terminal device and that is associated with the tag; and generating N pseudonym credentials. The pseudonym credential generated in this application may enable a behavior investigation server to learn of a real identity of the terminal device.
MULTI-TENANCY TRUSTED DATA ANONYMIZATION
A security management system including a first TEE and a common TEE is provided. The first TEE is a secured environment for data associated with a first entity. The common TEE is a seemed environment for data associated with any one of a plurality of entities. First anonymization parameters are shared between the first TEE and the common TEE The first anonymization parameters arc based at least in part on at least one privacy requirement of the first entity and at least one utility requirement of the security management system. The security management system includes processing circuitry configured to: anonymize first data associated with the first entity based at least in part on the first anonymization parameters, analyze at least the anonymized first data for performing data investigation, and generate analysis results based at least in part on the analysis of at least the anonymized first data.
Distributed anonymous scoring technique
In some examples, a system for implementing a protocol for data transmission can include a processor to transmit a public key or an encrypted name to a ledger of a source computing device and receive a scoring code, training data, and data definitions from the source computing device. The processor can also transmit predicted labels encrypted with the public key to the source computing device, the predicted labels based on the training data and the data definitions, and receive labeled test data from the source computing device. The processor can also transmit decrypted predicted labels to the source computing device, receive a list of evaluation results from a set of remote computing devices, transmit scoring results based on the list of evaluation results to the set of remote computing devices, and execute an instruction based on a techniques corresponding to a highest score from the scoring results.
Tracking and analyses of content presentation
Systems and methods for providing services are disclosed. One aspect comprises authenticating a user associated with a first service, receiving a selection of a second service, generating an opaque identifier associated with the user and the first service, wherein the opaque identifier facilitates the anonymous collection of data relating to the second service. Another aspect can comprise transmitting the opaque identifier to the second service, and receiving data relating to the second service.
Privacy-Preserving Image Distribution
Some embodiments enable distributing data (e.g., recorded video, photographs, recorded audio, etc.) to a plurality of users in a manner which preserves the privacy of the respective users. Some embodiments leverage homomorphic encryption and proxy re-encryption techniques to manipulate the respective data so that selected portions of it are revealed according to an identity of the user currently accessing the respective data.
Customized view of restricted information recorded into a blockchain
Systems, methods, and software are disclosed herein to generate a customized view of a blockchain transaction. A blockchain of block entries requested by a plurality of users from user devices is maintained in a distributed network of nodes. The block entries each comprise a plurality of data portions that are each associated with an access level. A request to view one or more data portions of a block entry is received which includes an access code associated with at least one access level. The access code in the request is evaluated with the blockchain of block entries to identify one or more data portions associated with the access level. A customized view of the block entry is generated which includes the one or more data portions associated with the access level.
LOW ENTROPY BROWSING HISTORY FOR ADS QUASI-PERSONALIZATION
The present disclosure provides systems and methods for content quasi-personalization or anonymized content retrieval via aggregated browsing history of a large plurality of devices, such as millions or billions of devices. A sparse matrix may be constructed from the aggregated browsing history, and dimensionally reduced, reducing entropy and providing anonymity for individual devices. Relevant content may be selected via quasi-personalized clusters representing similar browsing histories, without exposing individual device details to content providers.