Patent classifications
H04L2209/42
APPARATUS AND METHOD FOR RECOMMENDING USER PRIVACY CONTROL
Disclosed herein are an apparatus and method for recommending privacy control. A privacy control server includes multiple common privacy control recommendation models learned based on personal information provision histories of multiple users, a user preference determination unit for generating at least one question item based on the multiple common privacy control recommendation models and determining a privacy control preference of a user based on a result of a user answer to the at least one question item, and a common privacy control recommendation model provision unit for providing a common privacy control recommendation model selected to match the privacy control preference of the user to the user.
DYNAMIC MANAGEMENT OF USER IDENTIFICATIONS
An example operation may include one or more of authenticating a user, by a first system node, based on a first set of user credentials, computing, by the first system node, a second set of user credentials for a second system node, determining, by the first system node, if the second system node has a user with the second set of the user credentials, and responsive to the second system node not having the user with second set of the user credentials, deleting, by the first system node, an existing user of the second system node.
Private and federated learning
Techniques regarding privacy preservation in a federated learning environment are provided. For example, one or more embodiments described herein can comprise a system, which can comprise a memory that can store computer executable components. The system can also comprise a processor, operably coupled to the memory, and that can execute the computer executable components stored in the memory. The computer executable components can comprise a plurality of machine learning components that can execute a machine learning algorithm to generate a plurality of model parameters. The computer executable components can also comprise an aggregator component that can synthesize a machine learning model based on an aggregate of the plurality of model parameters. The aggregator component can communicate with the plurality of machine learning components via a data privacy scheme that comprises a privacy process and a homomorphic encryption process in a federated learning environment.
System and method for hybrid model electronic voting
Hybrid model electronic voting system and method for enabling individual voters to remotely cast a ballot electronically via inputs to a receiver where a user controls a mechanical system that produces a physical, readable ballot. The voting system comprises a voter interface device communicatively coupled to a data network, the voter interface device including a screen, the voter interface device configured to generate an input command containing a ballot selection; a portal server including a database containing an eligibility list, the portal server communicatively coupled to the data network and configured to connect to the voter interface device over the data network to validate an eligibility of a voter operating the voter interface device by comparing the voter to the eligibility list; a voting machine including a physical marking device and a camera, the voting machine communicatively coupled to the data network.
Cryptographic methods and systems using blinded activation codes for digital certificate revocation
To revoke a digital certificate (160p), activation of the digital certificate is blocked by withholding an activation code from the certificate user (110). The certificates are generated by a plurality of entities (210, 220, 838) in a robust process that preserves user privacy (e.g. anonymity) even in case of collusion of some of the entities. The process is suitable for connected vehicles, e.g. as an improvement for Security Credential Management System (SCMS).
Providing quality of service for certificate management systems
A system for providing quality of service (QoS) levels to clients requesting certificates from a certificate management service is provided. The system includes an application programming interface (API) operable to receive certificate requests from each of a plurality of clients, each certificate request including a client identifier, a QoS manager operable to distribute the certificate requests to a corresponding client queue of a plurality of client queues based on the client identifier, select, based on at least one of a workflow and a client priority level, one or more of the certificate requests distributed to the plurality of client queues, and transmit the selected one or more certificate requests to a QoS queue of the certificate management service for processing.
TRUSTWORTHY DATA EXCHANGE USING DISTRIBUTED DATABASES
The present disclosure relates to a trustworthy data exchange. Embodiments include receiving, from a device, a query, wherein the query comprises a question. Embodiments include identifying particular information related to the query. Embodiments include receiving credentials from a user for retrieving the particular information related to the query. Embodiments include retrieving, using the credentials, the particular information related to the query from one or more data repositories that are part of a distributed database comprising an immutable data store that maintains a verifiable history of changes to information stored in the distributed database. Embodiments include determining, based on the particular information related to the query, an answer to the query. Embodiments include providing the answer to the device.
COMPUTER SYSTEM OF COMPUTER SERVERS AND DEDICATED COMPUTER CLIENTS SPECIALLY PROGRAMMED TO GENERATE SYNTHETIC NON-REVERSIBLE ELECTRONIC DATA RECORDS BASED ON REAL-TIME ELECTRONIC QUERYING AND METHODS OF USE THEREOF
In some embodiments, the present invention provides for an exemplary computer system which includes at least: a graphical user interface client; a dedicated application server; the dedicated application server is configured to connect to the graphical user interface client and an electronic source with electronic data records; where the electronic data records include real identification identifiers of real individuals; where the graphical user interface client is configured to generate at a graphical user interface that is configured to receive user authenticating credential information and to conduct a real-time electronic negotiation querying session between the user and the dedicated application server to generate a plurality of non-reversible synthetic electronic data records of a plurality of synthetic individuals, by utilizing at least one statistical technique so that the plurality of non-reversible synthetic electronic data records cannot be used to identify any real individual in the plurality of electronic data records.
Systems and methods providing centralized encryption key management for sharing data across diverse entities
A method and apparatus provide centralized encryption key management for sharing data across diverse entities. In particular, the present invention relates to a universal and regulatory compliant system and method for sharing personal data records across diverse entities while maintaining unique identifiers at each entity for protecting the identity of any particular person. The present invention enables multiple organizations to be able to share their respective disparate data in a manner in which the disparate personal data records can be aggregated and manipulated by a single entity without putting the personal data records at risk.
Anonymous communication system and method for subscribing to said communication system
[Problem] To provide an anonymous communication system which ensures anonymity, with which a user can be identified if necessary, and which has a high degree of social credibility. [Solution] A user computer 11 transmits to a management computer 21 electronically signed subscription application data signed using a first signature key capable of being used with another communication system. The management computer 21 verifies the electronic signature of the subscription application data using a first public key, and if the validity of the electronic signature can be verified, generates and encrypts a second signature key and transmits the encrypted second signature key to the user computer 11. The user computer 11 generates electronically signed receipt data that have been signed in duplicate using the first and second signature keys, and transmits the receipt data to the management computer 21. The management computer 21 verifies the electronic signature of the receipt data using first and second public keys, and if the validity of the electronic signature can be verified, records user data including the receipt data in a recording unit 24.