H04W12/02

User Identification with Voiceprints on Online Social Networks
20230222371 · 2023-07-13 ·

In one embodiment, a method includes, by one or more computing devices of an online social network, receiving, from a client system at a first location, an audio input from an unknown user, identifying a first user who is proximate to the first location, identifying the unknown user as a second user based on a comparison of the audio input to one or more voiceprints of one or more candidate users accessible by the client system, respectively, wherein each voiceprint comprises audio data for auditory identification of a unique user, and wherein each candidate user is a contact of the first user, and sending customized content to one or more of the first user or the second user, wherein the content is customized using interest information associated with the first or second user.

TRAVEL IDENTITY TOKENING

A system for leveraging a tokening system to authenticate a traveler while maintaining anonymity of the traveler is provided. The system may include a secure central server configured to store identification data associated with a plurality of users. The system may also include a mobile token application for providing a token identifier representing a user's identification data. The mobile token application may be activated by the central server on a mobile device of the user registered with the central server and stored in a secure storage on the mobile device of the user. The system may also include a travel service provider. The travel service provider may be configured to enable reserving a travel reservation file. The travel service provider may be enabled to retrieve a token identifier from the user's mobile device as representing the identification of the user and verify the token identifier with the central server.

SYSTEMS AND METHODS OF MEDIA PROCESSING

Media processing systems and techniques are described. A media processing system receives image data that represents an environment captured by an image sensor. The media processing system receives an indication of an object in the environment that is represented in the image data. The media processing system divides the image data into regions, including a first region and a second region. The object is represented in one of the plurality of regions. The media processing system modifies the image data to obscure the first region without obscuring the second region based on the object being represented in the one of the plurality of regions. The media processing system outputs the image data after modifying the image data. In some examples, the object is depicted in the first region and not the second region. In some examples, the object is depicted in the second region and not the first region.

Key distribution method, key receiving method, first key management system, and first network element
11700245 · 2023-07-11 · ·

The present invention disclose a key distribution method. The method includes obtaining, by a first key management system, a shared key of a first network element, where the shared key of the first network element is generated according to a key parameter obtained after the first network element performs authentication or a root key of the first network element; obtaining a service key, where the service key is used to perform encryption and/or integrity protection on communication data in a first service between the first network element and a second network element; performing encryption and/or integrity protection on the service key by using the shared key of the first network element, to generate a first security protection parameter; and sending the first security protection parameter to the first network element. According to present invention, data can be protected against an eavesdropping attack in a sending process.

Key distribution method, key receiving method, first key management system, and first network element
11700245 · 2023-07-11 · ·

The present invention disclose a key distribution method. The method includes obtaining, by a first key management system, a shared key of a first network element, where the shared key of the first network element is generated according to a key parameter obtained after the first network element performs authentication or a root key of the first network element; obtaining a service key, where the service key is used to perform encryption and/or integrity protection on communication data in a first service between the first network element and a second network element; performing encryption and/or integrity protection on the service key by using the shared key of the first network element, to generate a first security protection parameter; and sending the first security protection parameter to the first network element. According to present invention, data can be protected against an eavesdropping attack in a sending process.

Techniques for group message thread link administration

Techniques for group message thread link administration are described. In one embodiment, an apparatus may comprise a client front-end component operative to receive a join invitation command associated with a group message thread from an administrator client device, the group message thread associated with a message thread identifier, the message thread identifier identifying the group message thread on a messaging system; and send a join invitation link to the administrator client device; and a group management component operative to generate a join invitation link in response to the join invitation command, the join invitation link comprising a thread invitation identifier, wherein the thread invitation identifier is a hash of the message thread identifier. Other embodiments are described and claimed.

Techniques for group message thread link administration

Techniques for group message thread link administration are described. In one embodiment, an apparatus may comprise a client front-end component operative to receive a join invitation command associated with a group message thread from an administrator client device, the group message thread associated with a message thread identifier, the message thread identifier identifying the group message thread on a messaging system; and send a join invitation link to the administrator client device; and a group management component operative to generate a join invitation link in response to the join invitation command, the join invitation link comprising a thread invitation identifier, wherein the thread invitation identifier is a hash of the message thread identifier. Other embodiments are described and claimed.

Secure transient buffer management
11698996 · 2023-07-11 · ·

Methods and systems are described that secure application data being maintained in transient data buffers that are located in a memory that is freely accessible to other components, regardless as to whether those components have permission to access the application data. The system includes an application processor, a memory having a portion configured as a transient data buffer, a hardware unit, and a secure processor. The hardware unit accesses the transient data buffer during execution of an application at the application processor. The secure processor is configured to manage encryption of the transient data buffer as part of giving the hardware unit access to the transient data buffer.

Providing data of a motor vehicle

Technologies and techniques for anonymously providing data of a motor vehicle. A first dataset is generated by a motor vehicle, and the first dataset is anonymized using a vehicle computing unit. User related data and the anonymized first dataset are communicated to a first server system using the vehicle computing unit and the communicated user related data is deleted using the first server system. The anonymized first dataset is communicated to a second server system using the first server system after deletion of the user related data.

Providing data of a motor vehicle

Technologies and techniques for anonymously providing data of a motor vehicle. A first dataset is generated by a motor vehicle, and the first dataset is anonymized using a vehicle computing unit. User related data and the anonymized first dataset are communicated to a first server system using the vehicle computing unit and the communicated user related data is deleted using the first server system. The anonymized first dataset is communicated to a second server system using the first server system after deletion of the user related data.