Patent classifications
H04L2209/42
SEAMLESS ROTATION OF KEYS FOR DATA ANALYTICS AND MACHINE LEARNING ON ENCRYPTED DATA
In one embodiment, a network assurance service maintains a first set of telemetry data from the network anonymized using a first key regarding a plurality of network entities in a monitored network. The service receives a key rotation notification indicative of a key changeover from the first key to a second key for anonymization of a second set of telemetry data from the network. The service forms, during a key rotation time period associated with the key changeover, a mapped dataset by converting anonymized tokens in the second set of telemetry data into anonymized tokens in the first set of telemetry data. The service augments, during the key rotation time period, the first set of telemetry data with the mapped dataset. The service assesses, during the time period, performance of the network by applying a machine learning-based model to the first set of telemetry data augmented with the mapped dataset.
BIOMETRIC SCANNER APPARATUS AND METHODS FOR ITS USE
A biometric scanner apparatus comprising a biometric sensor configured to scan at least a biological sample and receive a unique biometric pattern, a secret data extractor configured to receive the unique biometric pattern from the biometric sensor and generate an output comprising a sample-specific secret, and a sample identifier circuit communicatively connected to the secret data extractor wherein the sample identifier circuit is configured to produce at least an output comprising a secure proof of the sample-specific secret.
Systems and methods for secure detokenization
A method for requesting a credential associated with token in a multiple token layer environment is disclosed. A tokenization certificate serves to validate the identity of a credential requestor and provide information about the requestor's authorization for de-tokenizing a token. Also, a public key in the tokenization certificate is used to encrypt the credential for secure transmission to the requestor.
METHOD AND DEVICE FOR ENCRYPTING AND DECRYPTING SOFTPHONE, AND COMPUTER-READABLE STORAGE MEDIUM
Disclosed are a method and a device for encrypting and decrypting softphone, as well as a computer-readable storage medium. The method for encrypting and decrypting softphone includes: in response to a softphone call instruction, obtaining a phone number corresponding to the call instruction, and encrypting the phone number to generate a cipher text phone number; sending the cipher text phone number to the phone-platform server for the phone-platform server to return the cipher text phone number to the local-system server through a private network; decrypting the cipher text phone number to obtain a plaintext phone number at local-system server, and sending the plaintext phone number to the phone-platform server through the private network.
DATABASE ENCRYPTION LAYER
An example operation may include one or more of receiving, by one or more endorser nodes of a blockchain network, an invoke chaincode transaction proposal, executing chaincode, encrypting, by an application programming interface between the chaincode and a shared ledger, blockchain state to the shared ledger, decrypting blockchain state from the shared ledger, endorsing, by the one or more endorser nodes, one or more results from executing the chaincode, and creating a blockchain transaction from the one or more endorsed results.
Cryptography method and system for securing data via electronic transmission
Provided are QR Codes configured with a Transactional Cryptopgrahy (TC) component and methods for using thereof in a secure manner without the need for specialized hardware. By using software-defined security, QR codes can be used for a wider array of purposes without the additional expense and maintenance of separate hardware platforms for secure information.
PRIVACY AWARENESS FOR PERSONAL ASSISTANT COMMUNICATIONS
Aspects of the technology described herein maintain the privacy of confidential information to be communicated to a user through a computing device. The technology keeps confidential information private by assessing the privacy context of the communication. The privacy context can be determined by determining a privacy level of the information to be communicated and the privacy level of the environment into which the information is to be communicated. The privacy context can be used to select an appropriate communication channel for the information. The privacy context can also be used to determine whether all available content is shared or just a portion of it.
Method and system for media, advertising and/or in vehicle content monitoring
A method for reporting in vehicle media consumption and user interaction with a vehicle. The method including receiving raw data of media and vehicle usage of a vehicle by a platform device, the platform device including storage, operation controls, a microprocessor, a memory component, I/O inputs and outputs and an operating system installed and running thereon; processing the raw data to remove at least one obfuscation function to anonymize at least a portion of a personally identifiable information; and producing a report with the processed raw data relating to the user interaction vehicle and the media content.
METHOD AND SYSTEM FOR DYNAMIC LICENSE PLATE NUMBERS
A method for dynamic license plate renumbering includes: identifying, by a processing device of a processing server, a new plate number for a dynamic license plate; storing, by the processing server, the identified new plate number in a data entry with a vehicle identifier associated with the dynamic license plate; transmitting, by a transmitter of the processing server, the identified new plate number to the dynamic license plate; and displaying, on a display device of the dynamic license plate, the new plate number.
METHOD AND SYSTEM FOR ANONYMOUS INFORMATION RIGHTS MANAGEMENT TO ALLOW TRACKING OF DOWNLOADED DOCUMENTS WITHOUT AUTHENTICATION
A computer implemented method and system for anonymous information rights management to allow tracking of downloaded documents without authentication is disclosed. The method comprises receiving, at an IRM server, a request from an anonymous user to access an encrypted document; in response to receiving the request from the anonymous user, determining an identity of a first user who downloaded the encrypted document from the IRM server, wherein the first user is different from the anonymous user; determining whether the first user currently has permission to access to the encrypted document; and providing a decryption key to the anonymous user when the first user is determined to have permission to access the encrypted document.