Patent classifications
H04W12/02
Location aware cryptography
A first entity may provide a request to transmit data from the first entity to a second entity. The first entity may receive a session key from the second entity in response to the request where the session key is encrypted by a second key that is based on a combination of a public key and a location associated with the second entity. A location associated with the first entity may be identified. Furthermore, a first key may be generated based on a combination of the location associated with the first entity and a private key that corresponds to the public key. The first key may decrypt data encrypted by the second key when the location associated with the first entity corresponds to the location associated with the second entity.
Decryption/display pathway for user-device health status display
Systems and Methods are disclosed for real-time decryption of a health registry-issued certificate for signaling a user vaccination and/or test status on a user device comprising the steps of: coupling a first user mobile device to a health registry for real-time decryption of a health registry-issued health certificate over a network; outputting on the first user mobile device at least one of an audible output, visual output, vibrational output, and/or textual output based on a pre-defined signaling protocol to signal a user vaccination status based on a token derived from the real-time decrypted health certificate; and decoding a device identifier/tag or token from the first user mobile device by a second user mobile device, fixed access device, or hand-held scanner, signaling to a second user a first user vaccination status based on a pre-defined signaling protocol and the tag/token.
Edge cloud data protection
An embodiment of a semiconductor apparatus may include technology to receive data with a unique identifier, and bypass encryption logic of a media controller based on the unique identifier. Other embodiments are disclosed and claimed.
Edge cloud data protection
An embodiment of a semiconductor apparatus may include technology to receive data with a unique identifier, and bypass encryption logic of a media controller based on the unique identifier. Other embodiments are disclosed and claimed.
Information processing method
An information processing method is provided. The method includes: receiving a connection request of establishing a call connection, the connection request including a communication identifier of a requester; upon determining the communication identifier of the requester meeting a privacy condition, verifying an identity of a responder; and determining whether to permit a response of the responder to the connection request based on a verification result of the identity of the responder.
Information processing method
An information processing method is provided. The method includes: receiving a connection request of establishing a call connection, the connection request including a communication identifier of a requester; upon determining the communication identifier of the requester meeting a privacy condition, verifying an identity of a responder; and determining whether to permit a response of the responder to the connection request based on a verification result of the identity of the responder.
Systems and methods for managing privacy policies using machine learning
Systems, methods, and devices for managing privacy policies are disclosed. In one embodiment, a method for management of a user's privacy preferences may include: identifying a computer application installed on a user electronic device, or a website accessed using a browser executed by the user electronic device; retrieving a privacy policy document analysis for a privacy policy document associated with the computer application or the website, the privacy policy document analysis comprising a valuation of a plurality of privacy policy segments within the privacy policy document; receiving a privacy preference analysis for the user, the privacy preference analysis comprising a valuation of a plurality of privacy preferences for the user; identifying a recommended action in response to the valuation of one of the privacy policy segments being outside the scope of the valuation of one of the plurality of privacy preferences; and executing the recommended action.
Systems and methods for managing privacy policies using machine learning
Systems, methods, and devices for managing privacy policies are disclosed. In one embodiment, a method for management of a user's privacy preferences may include: identifying a computer application installed on a user electronic device, or a website accessed using a browser executed by the user electronic device; retrieving a privacy policy document analysis for a privacy policy document associated with the computer application or the website, the privacy policy document analysis comprising a valuation of a plurality of privacy policy segments within the privacy policy document; receiving a privacy preference analysis for the user, the privacy preference analysis comprising a valuation of a plurality of privacy preferences for the user; identifying a recommended action in response to the valuation of one of the privacy policy segments being outside the scope of the valuation of one of the plurality of privacy preferences; and executing the recommended action.
COMPUTER-IMPLEMENTED METHOD FOR DETERMINING A MERCHANT LOCATION USING A VIRTUAL CARD, IN REAL-TIME
The present disclosure is related to a computer-implemented method, card processing server, and non-transitory computer readable medium for determining a merchant location using a virtual card, in real-time. A card processing server may receive test transaction data from an acquirer bank of a merchant when a test transaction is initiated through a virtual card provided to the merchant. The card processing server may detect a record of the test transaction in a transaction database, in real-time, using one or more attributes of the virtual card stored in the card processing server and may retrieve signature data from the test transaction data upon detecting the record of the test transaction. Finally, the card processing server determines a transaction source data location of the merchant at which the test transaction was initiated and a registered name of the merchant based on the signature data.
METHOD FOR OBTAINING IDENTIFIER OF TERMINAL DEVICE, APPARATUS, AND SYSTEM
A method for obtaining an identifier of a terminal device includes a key management network element receiving, from a first terminal device, a first key request including a first identifier, where the first identifier is an anonymous identifier or a temporary identifier of a second terminal device. The key management network element sends, to a unified data management network element, a first request including the first identifier. The unified data management network element determines a SUPI of the second terminal device based on the first identifier, and sends, to the key management network element, a first response including the SUPI. In response to an authorization check performed on the second terminal device based on the SUPI succeeds, the key management network element sends a first key response to the first terminal device, where the first key response includes a secure communication parameter.