H04L2209/42

SYSTEMS, METHODS, AND DEVICES FOR DIGITAL ADVERTISING ECOSYSTEMS IMPLEMENTING CONTENT DELIVERY NETWORKS UTILIZING EDGE COMPUTING
20210090126 · 2021-03-25 ·

Disclosed herein are systems and techniques for using a content delivery network to perform various functions within a digital advertising ecosystem, in ways that yield technological benefits such as improved security, efficiency, and speed (for example, reduction in publisher load times). As one specific example, a content delivery network can be used for the creation of electronic tokens for user identity protection between demand side platforms, supply side platforms, content creators (for example, advertisers), and publishers.

SYSTEM AND METHOD FOR DETECTING BREACHED PASSWORDS WITHOUT DISCLOSING IDENTIFIABLE INFORMATION
20210091938 · 2021-03-25 ·

Systems and methods for detecting breached user login records in a zero-knowledge architecture. A breach detection module obtains login data that has been breached from breached data sources and service providers. The breached data is hashed with a system key and the breached data hashes are hashed in a hardware security module (HSM) using a hashing method and a non-exportable key. Clients provide user login data that has been hashed using the hashing method by the client device to the breach detection module. The breach detection module hashes the hashed user login data and compares the hashed user login hashes with the hashed breached data hashes and sends a breach alert to the client device if any hashes match.

SYSTEM ARCHITECTURES FOR POINT-OF-SALE DATA OBFUSCATION, DATA REMOVAL AND DATA ENCRYPTION
20210090077 · 2021-03-25 ·

A system for securing payments is provided. The system may include a payment-receiving entity. The payment-receiving entity may include a point-of-sale device, a point-of-sale encryption selection display and a storage medium. The point-of-sale device may include homomorphic encryption capabilities. The system may include a payment processing entity. The payment processing entity may include a payment receiver and a payment processor. Upon receipt of a payment from the user at the payment-receiving entity, the payment-receiving entity may be configured to present to the user the point-of-sale encryption selection display; receive one or more user selections; transmit payment details, associated with the payment, to the payment processing entity; receive payment confirmation; and encrypt and store point-of-sale details based on the user selections. The point-of-sale encryption selection display may be operable to present, to a user, one or more transaction encryption selectable choices.

SYSTEMS AND METHODS FOR SECURING PERSONALLY IDENTIFIABLE INFORMATION WITHIN TELEMATICS DATA
20210064778 · 2021-03-04 ·

System, methods, and other embodiments described herein relate to securing personally identifiable information associated with riding in a vehicle. In one embodiment, a method includes, in response to receiving, in a mobile device from the vehicle, telematics data about a current trip of the vehicle, securing the telematics data according to at least a mobile cryptographic key associated with the mobile device to provide the telematics data as secured data that is obfuscated. The method includes generating, by the mobile device, a secure packet including at least the secured data and a signature from the vehicle associated with the secured data. The method includes communicating, by the mobile device, the secure packet to a remote computing device to cause the remote computing device to securely store the secured data without identifying a user associated with the mobile device.

GENERATING SEQUENCES OF NETWORK DATA WHILE PREVENTING ACQUISITION OR MANIPULATION OF TIME DATA
20230421353 · 2023-12-28 ·

Methods, systems, and apparatus, including a method for determining network measurements. In some aspects, a method includes receiving, by a first aggregation server and from each of multiple client devices, encrypted impression data. A second aggregation server receives, from each of at least a portion of the multiple client devices, encrypted conversion data. The first aggregation server and the second aggregation server perform a multi-party computation process to generate chronological sequences of encrypted impression data and encrypted conversion data and to decrypt the encrypted impression data and the encrypted conversion data.

Cryptographic pseudonym mapping method, computer system, computer program and computer-readable medium
11856099 · 2023-12-26 · ·

The invention is a cryptographic pseudonym mapping method for an anonymous data sharing system, the method being adapted for generating a pseudonymised database (DB) from data relating to entities and originating from data sources (DS.sub.i), wherein the data are identified at the data sources (DS.sub.i) by entity identifiers (D) of the respective entities, and wherein the data are identified in the pseudonymised database (DB) by pseudonyms (P) assigned to the respective entity identifiers (D) applying a one-to-one mapping, irrespective of the originating data source. According to the invention, more than one mapper (M.sub.j) is applied, and a respective pseudonym (P) is generated by sequentially performing, in a permutation of the mappers (M.sub.j), a number k of mappings utilizing the mapping cryptographic keys (h.sub.ij) of the mappers (M.sub.j) belonging to the particular data source (DS.sub.i) on each encrypted entity identifier (C.sub.i0) encrypted by the data source (DS.sub.i).

Methods and systems providing centralized encryption key management for sharing data across diverse entities

A method and apparatus provide centralized encryption key management for sharing data across diverse entities. In particular, the present invention relates to a universal and regulatory compliant system and method for sharing personal data records across diverse entities while maintaining unique identifiers at each entity for protecting the identity of any particular person. The present invention enables multiple organizations to be able to share their respective disparate data in a manner in which the disparate personal data records can be aggregated and manipulated by a single entity without putting the personal data records at risk.

SURGICAL SYSTEM DISTRIBUTED PROCESSING
20210212717 · 2021-07-15 ·

Surgical hub systems are disclosed. A surgical hub system comprises a surgical hub configured to communicably couple to a modular device comprising a sensor configured to detect data associated with the modular device and a device processor. The surgical hub comprises a hub processor, a hub memory coupled to the hub processor. The surgical hub system also comprises a distributed control system executable at least in part by each of the device processor and the hub processor. The distributed control system is configured to: receive the data detected by the sensor; determine control adjustments for the modular device according to the data; and control the modular device according to the control adjustments. When in a first mode, the distributed control system is executed by both the hub processor and the device processor. In a second mode, the distributed control system is executed solely by the device processor.

Method and system for dynamic license plate numbers

A method for dynamic license plate renumbering includes: identifying, by a processing device of a processing server, a new plate number for a dynamic license plate; storing, by the processing server, the identified new plate number in a data entry with a vehicle identifier associated with the dynamic license plate; transmitting, by a transmitter of the processing server, the identified new plate number to the dynamic license plate; and displaying, on a display device of the dynamic license plate, the new plate number.

SYSTEM FOR PERFORMING SERVICE BY USING BIOMETRIC INFORMATION, AND CONTROL METHOD THEREFOR
20210211292 · 2021-07-08 ·

A system for performing a service by using biometric information is disclosed. A system according to the present disclosure comprises an electronic device, a first server and a second server, and a control method of the system comprises the steps of: allowing the electronic device to acquire first biometric information; allowing the electronic device to acquire first encrypted data, in which the first biometric information is encrypted, by using the acquired first biometric information and a first encryption key, and to transmit same to the first server, allowing the first server to acquire second encrypted data, in which the first encrypted data is encrypted, by using the first encrypted data received from the electronic device and a second encrypted key, and first user identification information corresponding to the first biometric information, and to transmit same to the second server; allowing the second server to match the second encrypted data and the first user identification information corresponding to the biometric information, which are received from the first server, and to store same; allowing the second server to acquire authentication information on the basis of the matched second encrypted data and first user identification information, and to transmit same to the first server, and allowing the first server to register the authentication information on the biometric information.