Patent classifications
H04L63/0407
INTERACTION TRACKING CONTROLS
A browser executing on a client device can detect external calls to remote servers generated by an online document. The browser can detect, in external content received in response to the external calls and for presentation in the online document, metadata describing domains that contributed to the delivery of the external content to the client device. The browser can aggregate, for each of the domains, a contribution of the domain to enable the presentation of the external content with the online document over a specified time period. The browser can present a visual representation of the contribution of each of at least some of the domains. The browser can receive, in response to interaction with the visual representation, a selection of one or more domains among the at least some domains. The browser can prevent the one or more domains from receiving subsequent external calls from the browser.
SYSTEMS AND METHODS FOR SECURING ACCESS RIGHTS TO RESOURCES USING CRYPTOGRAPHY AND THE BLOCKCHAIN
The present disclosure generally relates to securing access to resource and access rights using cryptography and the blockchain. Certain embodiments of the present disclosure generally relate to systems and methods that enhance the security of resource access using hierarchical deterministic (HD) cryptography and the blockchain. Certain embodiments of the present disclosure relate to systems and methods that securely and anonymously represent the identity of a user and the user's access code data on a distributed ledger represented across the blockchain.
SYSTEM AND METHOD FOR AUTHORIZING ACCESS TO SMART DEVICES IN A LOCAL ENVIRONMENT
A computer-implemented system for authorizing access to one or more smart devices provided in a local environment is disclosed herein. The system comprises a client device, a local network node, and a remote network node. The remote network node is configured generate a link and send it to an address associated with a personal identifier of the client device, and in response to the client device having executed the link, the client device being configured to receive an authorization code. The authorization code is locally or remotely validated based on a challenge previously generated by the client device. An access token is generated and sent to the client device, thereby authorizing the client device access to the one or more smart devices in the local environment.
Device Network Mapping Obscuration
A sender device can determine that data associated with an application is to be sent to a service via a network. The sender device can generate resource queries directed to at least two participant devices and receive responses indicating whether each of the participant devices has a resource available to host a virtual network function (“VNF”). The sender device can generate commands directed to security interface applications executed by the participant devices. The commands can instruct the participant devices to instantiate the VNFs. The sender device can partition the data into data partitions directed to the participant devices. The sender device can send the data partitions to the VNFs of the participant devices. The VNFs can forward the data partitions to a network access device that can combine the data partitions and send the data to the service via the network.
Network Privacy Policy Scoring
A user of a client device accesses a service provided by a server computer. The server computer gathers data about the user. The data gathered may be kept private by the server computer, shared only with other computers and users owned by the same entity, shared with selected third parties, or made public. The server computer provides a privacy policy document that describes how the data gathered is used. A privacy server analyzes the privacy policy document and, based on the analysis, generates a privacy score. The privacy score or an informational message selected based on the privacy score are provided to the client device. In response, the client device presents the privacy score or the informational message to the user. In this way, the user is informed of privacy risks that result from accessing the server computer.
Methods and systems for leveraging existing user data to verify user credentials
Methods, systems, and devices for leveraging data already collected on a user in a secure and private manner, in particular to verify user credentials for third parties. The methods, systems, and devices innovate beyond traditional security and privacy platforms in computer systems by processing the data to create a useable metric for the purposes of the third parties, in which the useable metric preserves the security and privacy of the underlying data.
USER STATE TRACKING SYSTEM AND OPERATING METHOD THEREOF
A user log information output system includes a first user device configured to generate first user information by encrypting a unique identification (ID) of a first user according to a scheduled time; a first user server configured to generate first server information including a server group code of a hierarchical server group; a second user device configured to receive real-time token information through communication with the first user device, the real-time token information being generated based on the first user information and the first server information; and a second user server configured to generate proximity log information regarding the first user by reading the first user information and the first server information of the real-time token information received from the real-time token information from the second user device.
CONNECTED VEHICLE SERVICES PRIVACY AND PROTECTION
An example operation includes one or more of receiving a request into a transport network comprising at least one transport for a proposed use of personal data associated with the at least one transport prior to the at least one transport entering an area; receiving into the transport network a deletion time of the personal data, prior to the at least one transport entering the area; providing, from the transport network an acknowledgement of the deletion time; and providing, from the transport network, the personal data when the at least one transport is in the area based on the received acknowledgement. This enables an occupant of a transport to share personal data relating to the transport with confidence that the data will be deleted by an agreed time.
Secure resource access by amalgamated identities and distributed ledger
A server receives encrypted data from a protected-resource-requesting device that includes an encrypted combination of the device and user identification. The first server requests a most recent copy of data of a distributed ledger from a randomly selected logged-in workstation. The first server searches for a match of the encrypted data from the first device in the distributed ledger data received from the randomly selected workstation. In response to determining a match, the first server updates a table of a second server with a one-time-password (OTP) and a copy of the encrypted data received from the device. The first server sends the OTP and an instruction to the device to send the OTP and the encrypted data to the second server, which determines whether a match exists. In response to a confirmed match, the first server grants access to the device.
Method, apparatus, and computer program product for anonymizing trajectories
Embodiments described herein relate to anonymizing of trajectories of mobile devices through the introduction of gaps between sub-trajectories. Methods may include: receiving a set of probe data points defining a trajectory; identifying a temporal length range of sub-trajectories; receiving a mode, where the mode is established based on a preceding set of probe data points defining a trajectory, where the mode includes an indication of whether to generate a sub-trajectory or a gap from the beginning of the received set of probe data points; and establishing at least one sub-trajectory including a sub-set of the set of probe data points, where the at least one sub-trajectory is established to satisfy the temporal length range of sub-trajectories.