Patent classifications
H04L2209/42
USER CONTROL OF ANONYMIZED PROFILING DATA USING PUBLIC AND PRIVATE BLOCKCHAINS IN AN ELECTRONIC AD MARKETPLACE
The disclosure relates to securing and enabling user control of profiling data, blockchain-driven matching of users and advertiser-identified anonymous profiling data records of interest, and smart contracts encoded by blockchain for executing transactions. The system may include an anonymized database of profiling data, which is unlinked to any user. The system may implement a private blockchain to store user-defined settings that provide user control over whether and how the profiling data may be used. If a grant to use the data is received, a link is stored that allows the system to identify a user associated with the anonymous profiling data records. If the grant is revoked, the link may be removed. The system may also implement public blockchain technology to record a public information relating to grants, online marketing transactions, making them verifiable, immutable, and transparent for various stakeholders including advertisers, publishers, and users.
PROCESSING PERSONALLY IDENTIFIABLE INFORMATION FROM SEPARATE SOURCES
A method for data security including receiving a first recordset, said first recordset including a first poly-identifier representing a first personally identifiable information (PII), and a first contextual information, said first poly-identifier associated with a name field of a record in a PII structured data store. Also receiving at the server a second recordset, said second recordset including a second poly-identifier representing a second personally identifiable information (PII) and a second contextual information, said second poly-identifier comprised of unique characters associated with the name field of a record in the PII structured data store. Then comparing the first and second contextual information to calculate a correlation score to create a match table entry as a result of said comparing, said match table entry including both an internal ID and an external anonymous ID. The IDs may associate the contextual information between records to a single person.
SYSTEM AND METHOD FOR OBFUSCATING TRANSACTION INFORMATION
A computer-implemented method for anonymizing online transaction details may include performing a process to generate an identifier (ID) and reference address for a user, and receiving a request for transaction processing from an e-commerce server. The request may include first data including: information associated with a purchase of a product to be delivered to the user; the identifier; and the reference address. The method may further include: in response to the request, determining whether the ID and reference address are included in the request, and if so, obtaining the accurate address and shipping rate rules; applying, based on the first data and the accurate address, the shipping rate rules to determine accurate shipping rate cost information associated with delivering the product to the accurate address; performing an anonymizing process on the accurate information to obtain anonymous shipping rate information, and transmitting the anonymous shipping rate information to the e-commerce server.
Method and system for risk identification of personal information
In some embodiments, a method for risk identification of personal information of a service/platform provider side is provided. A specification is received related to data usage for at least one among service and application of a third party side from a device of the third party side, and is stored in data storage of the service/platform provider side. User consent information is received from a user side using at least one among the service and application. The received information is stored in the data storage of the service/platform provider side. A process is inspected and monitored related to data storing and processing in user environment or platform environment of the user side using at least one among the service and application. A monitoring function is provided for data stored in the data storage of the service/platform provider side in connection with at least one among the service and application.
Face reattachment to brain imaging data
A cloud computing system is described that communicates with a virtual machine to reattach the face of a patient to brain imaging data before the brain imaging data is transmitted for display on a brain navigation system.
NETWORK NODE AUTHENTICATION
An authentication technique is disclosed that uses a distributed secure listing of transactions that includes encrypted data that can be used to authenticate a principal to a verifier.
Longitudinal condition tracking system and method
A system and method for coordinating cooperative diagnosis construction, decreasing diagnostic error, reducing delays and repetition in performing tasks, and improving application of data gathering devices through structured data tracking of symptoms, diagnoses, conditions and records using encrypted, event-based blockchain ledgers distributed throughout a network of processors. Symptom and diagnosis devices are used to collect participant data. Data is encrypted and used to generate a secure chain of decentralized ledger blocks. The secure chain is stored in a network of secure processing devices. Data access is controlled by a gatekeeper. Structured data blocks are integrated, creating a comprehensive digital record that may be shared without sacrificing control. Pathology collections are generated from integrated data. Interfaces are used to provide reports and directives to allow participants to leverage data and perform tasks that were heretofore unavailable while simultaneously improving privacy, security, usability and accessibility of participant conditions, events and data.
Biometric One Touch System
Embodiments disclosed herein generally related to a system and method of authenticating a user with a third party server. In one embodiment, a method is disclosed herein. A computing system receives, from a remote client device of the user, a token. The token includes personal identification information and a digitized file of a biometric captured by a biometric scanner. The computing system identifies via the personal identification information that the user has a user account. The computing system queries a database with the personal identification information and the digitized file to determine whether the biometric matches a stored biometric in the user account. Upon determining that the biometric matches the stored biometric, the computing system generates a message to be transmitted to the third party server that authenticates the user. The computing system transmits the message to the third party server.
Customized View Of Restricted Information Recorded Into A Blockchain
Systems, methods, and software are disclosed herein to generate a customized view of a blockchain transaction. A blockchain of block entries requested by a plurality of users from user devices is maintained in a distributed network of nodes. The block entries each comprise a plurality of data portions that are each associated with an access level. A request to view one or more data portions of a block entry is received which includes an access code associated with at least one access level. The access code in the request is evaluated with the blockchain of block entries to identify one or more data portions associated with the access level. A customized view of the block entry is generated which includes the one or more data portions associated with the access level.
METHODS AND SYSTEMS FOR CRYPTOGRAPHICALLY SECURED DECENTRALIZED TESTING
A method of cryptographically secured decentralized testing includes receiving, by a computing device and from a secure test apparatus, an output of a cryptographic function of a secret test result identifier, authenticating the output, and recording, in a data repository, an indication of a test result as a function of the output.