H04L2209/42

Biometric one touch system
11736476 · 2023-08-22 · ·

Embodiments disclosed herein generally related to a system and method of authenticating a user with a third party server. In one embodiment, a method is disclosed herein. A computing system receives, from a remote client device of the user, a token. The token includes personal identification information and a digitized file of a biometric captured by a biometric scanner. The computing system identifies via the personal identification information that the user has a user account. The computing system queries a database with the personal identification information and the digitized file to determine whether the biometric matches a stored biometric in the user account. Upon determining that the biometric matches the stored biometric, the computing system generates a message to be transmitted to the third party server that authenticates the user. The computing system transmits the message to the third party server.

Preventing fraud in aggregated network measurements
11736459 · 2023-08-22 · ·

Methods, systems, and apparatus, including a method for preventing fraud. In some aspects, a method includes: receiving, from multiple client devices, a measurement data element that includes a respective group member key and a group identifier for a given conversion as a result of displaying a digital component. Each client device uses a threshold encryption scheme to generate, based at least on network data that includes one or more of impression data or conversion data for the conversion, a group key that defines a secret for encrypting the network data and generate, based on data related to the application, the respective group member key that includes a respective share of the secret. In response to determining that at least the threshold number of measurement data elements having the same group identifier have been received, the network data is decrypted using the group member keys in the received measurement data elements.

INFORMATION PROCESSING METHOD, INFORMATION PROCESSING SYSTEM, AND NON-TRANSITORY COMPUTER READABLE MEDIUM

According to one embodiment, an information processing method performed by a computer includes receiving a holding request that includes target data and first identification information regarding the target data to generate second identification information different from the first identification information; generating first pseudonymized data that includes the second identification information and the target data, and holding the first pseudonymized data in a first hardware holding device; generating first pseudonymous association data that associates the first identification information with the second identification information, and storing the first pseudonymous association data in a first hardware storage; calculating a first value by an operation based on the first pseudonymous association data; and providing first record information for a storage system, the storage system being configured to store the first record information, the first record information including the first value and including first information based on the first identification information.

Information processing system, method for changing public key, program, and method for building information processing system

An information processing system 100 comprising at least one first node 1, second nodes 2 for providing a public key change assistance service, and a blockchain 3, wherein the first node 1 comprises a new public key creation unit 151, a second node group selection unit 152, an old and new key information request unit 153, a draft contract preparation unit 154, a signature request unit 155, a first signature execution unit 156, and a registration unit 157; each second node 2 comprises an old and new key information transmission unit 251, a second signature execution unit 252, and a draft contract return unit 253; the draft contract preparation unit 154 randomly determines the order of new public keys as transmission destinations; and the signature request unit 155 and the first signature execution unit 156 perform signature request and execution, respectively, so that the order of the nodes that sign a draft transaction contract is random.

Consent-based data privacy management system
11328081 · 2022-05-10 · ·

For example, a data set comprising a plurality of data fields, including at least one field containing personal information, can be received. Meta-information for the data set can be reviewed, which includes a categorization for the data set comprising a first parameter specifying field data type, and, for fields comprising personal information, a second parameter specifying personal data consent information. The data set may be converted into a columnar data storage format using the meta-information, and the at least one data field comprising personal information may be stored in at least one column marked as comprising personal information, and at least one personal information privacy control may be applied to the at least one marked column.

SMART CONTRACT SYSTEM AND METHOD FOR MANAGING DIGITAL USER ENGAGEMENT
20230259981 · 2023-08-17 ·

A computer-implemented method for presenting advertisements based on user data is disclosed. The method may comprise extracting a mobile phone number associated with an internet user; generating an anonymous and unique identifier for the user based on the mobile phone number, wherein the identifier complies with a privacy rule; analyzing the user's behavior and/or interests to assign behavioral attributes to the identifier; receiving an input to select an advertiser based on a category of the advertisement; transmitting the identifier to the advertiser to generate an advertisement for the user based on the identifier; and receiving the advertisement from the advertiser and presenting the advertisement to the user.

DETERMINISTIC CRYPTOGRAPHY DEIDENTIFICATION WITH GRANULAR DATA DESTRUCTION
20230261856 · 2023-08-17 · ·

Disclosed embodiments relate to systems and methods for deterministic cryptography deidentification enabling granular destruction. Techniques include preparing a table of name-token pair groupings with unique tokens, storing data deidentified in association with the deidentification process in a centralized repository, identifying a token from the table of name-token pair groupings, and enabling reidentifying of a specific data item of the deidentified data based on the token provided from the table.

System and method for providing anonymous validation of a query among a plurality of nodes in a network
11727149 · 2023-08-15 · ·

A system and method for providing anonymous validation of a query among a plurality of nodes in a network may receive at a support node a query from a requester node; wherein the query comprises a one-way function representation of at least one data point of information of the requester node; receive at the support server, from at least one validator node, a one-way function representation of at least one data point of information of the validator node; compare by the support server the query from the requestor node with the one-way function representation of the at least one data point of information; determine by an aggregator server, based on the comparison, whether the at least one data point of information of the requester node matches the at least one data point of information of the at least one validator node; and output a match result to the requestor node.

REVIEW ENGINE WITH BLOCKCHAIN-BASED VERIFICATION
20220138791 · 2022-05-05 ·

The systems and methods described herein relate to providing review content which is verifiable in a public blockchain network. The system receives an identity verification for a user of a review engine, then assigns a unique pseudonymous identity to the user based on the identity verification. Next, the system receives an identity verification for a provider on the review engine, and generates an authentication token unique to the provider to be displayed on a user client device associated with the user of the review engine. In response to the user capturing the authentication token via the client device, the system generates a review-in-progress to be displayed on the client device. Upon receiving a completed review from the user, the system records hashed data associated with the review into a transaction record on a public blockchain network, such that the transaction record can be publicly audited on the public blockchain network.

BLOCKCHAIN-BASED SECURE, ANONYMIZING MESSAGE BUS
20220141198 · 2022-05-05 ·

Systems and methods for enabling a blockchain-based secure, anonymizing message bus are disclosed. An example method includes sharing public keys associated with messaging participants for communicating information using a message-bus smart contract implemented on a blockchain network. The method also includes a first participant sending a message via a smart contract call against an instance of the message-bus smart contract, and a second participant determining and receiving the message using the blockchain network.