Patent classifications
H04L2209/42
METHOD AND SYSTEM FOR RISK IDENTIFICATION OF PERSONAL INFORMATION
Method and system for risk identification of personal information are provided. According to an example of embodiments, framework and platform for personal information management satisfying GDPR (General Data Protection Regulation) are provide by determining whether GDPR policy is satisfied in IoT (Internet of Things) environment.
Computer architecture incorporating blockchain based immutable audit ledger for compliance with data regulations
A computer system architecture and method for providing compliance with data regulations, by: (a) collecting a data input stream with a data collection terminal; (b) using a compliance device driver resident in the data collection terminal to: (1) select data corresponding to pre-identified data compliance fields, and (2) apply a compliance markup language parser to generate pseudonymized data; and (c) using an automated compliance network appliance and an automated compliance server to: (1) transmit the pseudonymized data into immutable audit ledger, wherein the immutable audit ledger is assembled and verified by blockchain, and (2) transmit the data input stream into a data lake; (d) hosting access portals for accessing data: (1) stored in the data lake, and (2) stored in the immutable audit ledger.
CRYPTOGRAPHIC METHODS AND SYSTEMS FOR MANAGING DIGITAL CERTIFICATES
Pseudonym digital certificates (160p) are generated for devices (110/150) by a Pseudonym Certificate Authority (PCA), which communicates with devices via another entityregistration authority (RA)so that the PCA and RA cannot associate certificates with devices. Each certificate is associated with a public signature key, and with a public encryption key used by PCA to encrypt the certificate to hide it from the RA. Both keys are derived by PCA from a single key. For example, the signature key can be derived from the public encryption key rather than generated independently. However, high security is obtained even when the PCA does not sign the encrypted certificate. Reduced bandwidth and computational costs are obtained as a result. Other embodiments are also provided.
CONSENT-BASED DATA PRIVACY MANAGEMENT SYSTEM
For example, a data set comprising a plurality of data fields, including at least one field containing personal information, can be received. Meta-information for the data set can be reviewed, which includes a categorization for the data set comprising a first parameter specifying field data type, and, for fields comprising personal information, a second parameter specifying personal data consent information. The data set may be converted into a columnar data storage format using the meta-information, and the at least one data field comprising personal information may be stored in at least one column marked as comprising personal information, and at least one personal information privacy control may be applied to the at least one marked column.
REVERSIBLE ANONYMOUS TELEMETRY DATA COLLECTION
According to one aspect of the present disclosure, a telemetry data set, which includes a plurality of data fields associated with application operations, is collected for an application. A request for at least a portion of the telemetry data set is received and processed. Data fields in the telemetry data set that are to be anonymized are identified based on the request, with information in the identified data fields is to be anonymized according to corresponding anonymization rules. The information in each of the identified data fields is masked based on the corresponding anonymization rule for the data field, and an anonymized telemetry data set is generated. The anonymized telemetry data set includes the masked information for the identified data fields and unmasked information for other data fields indicated in the request.
PROTECTING CLIENT PERSONAL DATA FROM CUSTOMER SERVICE AGENTS
Techniques for providing a real-time service that protects personal data of clients from customer service agents are provided. Customer data that includes personal data indicative of sensitive information of a customer can be received from the customer. The personal data within the received customer data can be detected and a token that does not include the sensitive information of the customer can be generated. The personal data and the generated token can be stored along with data indicating a relationship between the token and the personal data. The personal data in the received customer data can be replaced by the token to form modified customer data. The modified customer data can be provided to a customer service representative. The token within the modified customer data can later be detected and associated with the personal data without revealing the personal data to the customer service representative.
SYSTEM AND METHOD FOR CONTROLLING OPERATIONS PERFORMED ON PERSONAL INFORMATION
The subject matter discloses a method for securing personal information, comprising securing the personal information stored on a data server using a cryptographic secret, said cryptographic secret is unique to a user, storing a first share of the cryptographic secret on a secret storage server communicating with the data server and a second share of the cryptographic secret on a computerized device controlled by the user, detecting a request from the data server to perform an action on the personal information, transmitting the request to the computerized device controlled by the user to use the second share of the cryptographic secret to decrypt the personal information, decrypting the personal information using the first share and the second share, without storing both the first share and the second share in a single device concurrently and performing the action on the personal information on the data server
Dynamic cryptocurrency aliasing
Described herein is a system in which temporary aliases may be associated with, and maintained with respect to, cryptocurrency addresses. In some embodiments, the system enables a temporary alias to be used by a mobile application (e.g., a wallet application) in a cryptocurrency transaction. In some embodiments, temporary aliases may be assigned from a pool of procedurally-generated aliases. In some embodiments, the temporary alias may be valid for a predetermined amount of time or number of transactions. For example, the system may assign a new temporary alias to a cryptocurrency address for each transaction and/or after a predetermined amount of time has elapsed.
Systems and methods for detecting and remedying theft of data
The present disclosure relates to systems and methods for information security, specifically for automatically detecting theft of personal data. In one implementation, a computer-implemented method for automatically detecting theft of personal data on the Internet may include at least one processor configured to execute instructions, the instructions including receiving from a user, an electronic communication containing a first search term, extracting via pattern recognition one or more patterns corresponding with the first search term, and comparing the one or more patterns with a subset of data scraped from the Internet, with the subset of data scraped from the Internet being indexed by pattern for the first search term. The instructions may also include flagging matches of the one or more patterns with the subset of data based on the comparison and transmitting information associated with the matches in a report that indicates a possible theft of personal data.
Method for authenticating attributes in a non-traceable manner and without connection to a server
The present invention relates to a method, for a provider entity belonging to a provider group, to authenticate its belonging to an attribute provider group to a verification entity in a non-traceable manner without necessitating to share secret or large constants compromising privacy. Both entities comprise at least one attribute group arborescence, this attribute group arborescence being shared by the provider entity and the verification entity when the provider entity has the attribute. According to the invention, when a verification is triggered, the verification entity calculates a certificate from the attribute group arborescence, said certificate being calculated from the authentication tokens of the groups along the arborescence from the attribute verification group's token to the consumer group's token.