Patent classifications
H04L2209/42
Messaging controller for anonymized communication
A method may include receiving, from a first client, a first message. The first message may be matched to a second user based on a similarity between a first keyword included in the first message and a second keyword included in a profile of a second user. The first keyword may be determined to be similar to the second keyword based on a distance between a first vector representation of the first keyword and a second vector representation of the second keyword not exceeding a threshold value. In response to the first message being matched with the second user, the first message may be sent to a second client associated with the second user. In response to receiving, from the second client, a second message responsive to the first message, the second message may be sent to the first client. Related systems and articles of manufacture are also provided.
System and method for healthcare security and interoperability
Embodiments facilitate interoperability and secure patient selection for clinical trials and drug/device deployments. An entity may obtain a first set of health parameters and collective demographic information associated with one or more population segments and receive Electronic Health Record (EHR) sub-blocks with patient profile information and corresponding patient medical histories for patients. The entity may determine a subset of eligible candidate patients for a treatment based on information in the EHR sub-blocks and eligibility criteria for the treatment, which may be based the first set of health parameters, and/or the collective demographic information. The entity may transmit sub-blocks comprising eligible candidate patient profiles and medical information associated with the at least one treatment, and, in response to a received transaction block with a transaction confirmation, the entity may augment a multi-dimensional blockchain by linking: the transaction block, with a drug device information block and an EHR block.
Notification Prompt Method, Server, and Storage Medium
This application provides a notification prompt method, a server, and a storage medium. The method includes: when a notification is received, determining a target terminal that meets a preset notification prompt condition from terminal devices on which an account of a target user is logged in; obtaining identity information of a user currently using the target terminal; and when detecting, based on the identity information, that only the target user is currently using the target terminal, controlling the target terminal to prompt the notification in a first prompt mode, where preview content of the notification is displayed in the first prompt mode; or when detecting, based on the identity information, that a plurality of users are currently using the target terminal, controlling the target terminal to prompt the notification in a second prompt mode, where preview content of the notification is not displayed in the second prompt mode.
DYNAMIC DIFFERENTIAL PRIVACY TO FEDERATED LEARNING SYSTEMS
Embodiments of the present disclosure provide hierarchical, differential privacy enhancements to federated, machine learning. Local machine learning models may be generated and/or trained by data owners participating in the federated learning framework based on their respective data sets. Noise corresponding to and satisfying a first privacy loss requirement are introduced to the data owners' respective data sets, and noise corresponding to and satisfying a first privacy loss requirement are introduced to the local models generated and/or trained by the data owners. The data owners transmit model data corresponding to their respective local models to a coordinator, which in turn aggregates the data owners' model data. After introducing noise corresponding to and satisfying a third privacy loss requirement to the aggregated model data, the coordinator transmits the aggregated model data to the data owners to facilitate updating and/or re-training on their respective machine learning models.
Systems and Methods for Encrypting and Controlling Access to Encrypted Data Based Upon Immutable Ledgers
Systems and methods for automated blockchain-based recommendation generation, advertising and promotion in accordance with various embodiments of the invention are described. A user device in accordance with an embodiment of the invention includes: a network interface; memory; and a processor. In addition, the processor is configured to implement an execution environment that enables: initiation of transactions via an immutable ledger; recordation of events; updating a user profile, where the user profile comprises at least one characterization associated with the user profile; encrypting the updated user profile and securely storing the encrypted user profile; receiving a request to access the encrypted user profile from a process; determining access permissions of the process; and when the process has sufficient access permissions, decrypting the user profile and providing user profile data to the process.
Methods and systems for enhancing privacy and efficiency on distributed ledger-based networks
One or more embodiments described herein disclose methods and systems that are directed at providing enhanced privacy, efficiency and security to distributed ledger-based networks (DLNs) via the implementation of zero-knowledge proofs (ZKPs) in the DLNs. ZKPs allow participants of DLNs to make statements on the DLNs about some private information and to prove the truth of the information without having to necessarily reveal the private information publicly. As such, the disclosed methods and systems directed at the ZKP-enabled DLNs provide privacy and efficiency to participants of the DLNs while still allowing the DLNs to remain as consensus-based networks.
LOW ENTROPY BROWSING HISTORY FOR ADS QUASI-PERSONALIZATION
The present disclosure provides systems and methods for content quasi-personalization or anonymized content retrieval via aggregated browsing history of a large plurality of devices, such as millions or billions of devices. A sparse matrix may be constructed from the aggregated browsing history, and dimensionally reduced, reducing entropy and providing anonymity for individual devices. Relevant content may be selected via quasi-personalized clusters representing similar browsing histories, without exposing individual device details to content providers.
Cryptographic Security Mechanism for Groupcast Communication
The present disclosure provides a security mechanism to mitigate the risk of trackability of a UE engaged in groupcast communication. The security mechanism makes use of cryptographic functions and thus provides a cryptographic-grade protection for groupcast communications. The security mechanism can be implemented without any additional signaling for even additional parameters in existing signaling message.
USER IDENTITY SHARING SYSTEM USING DISTRIBUTED LEDGER TECHNOLOGY SECURITY PLATFORM FOR VIRTUAL ASSET SERVICE
Disclosed herein is a user identity sharing system utilizing a distributed ledger technology security platform. The present invention includes an OFF-CHAIN configured to operate as a regional or national blockchain within a single jurisdiction, in which one or more virtual asset service providers and one or more identity management service providers are participating; and an ON-CHAIN configured to operate as a global blockchain with no borders, in which one or more virtual asset service providers are participating, wherein user identity information of the OFF-CHAIN are shared as de-identified identity information between a virtual asset service provider participating in both the OFF-CHAIN and the ON-CHAIN and another virtual asset service provider participating in the ON-CHAIN, thus preventing forgery of user identity information, and sharing user identity information between virtual asset service providers, other blockchains, distributed ledger technology platforms, and existing IT systems.
Methods, media, apparatuses and computing devices of user data authorization based on blockchain
A method of user data authorization based on blockchain includes: storing, by a first application client, encrypted user data of user data in a blockchain database through a blockchain node, generating authorization information in response to a request of acquiring the user data by a second application client, and notifying the second application client to obtain the authorization information such that the second application client obtains the user data based on the encrypted user data and the authorization information. The encrypted user data is stored in the blockchain database such that the encrypted user data cannot be tampered with and a leak of real user data is prevented. The second application client obtains the user data based on the authorization information and the encrypted user data.