H04L63/0407

METHOD AND APPARATUS FOR DATA ANONYMIZATION AND PSEUDONYMIZATION IN M2M SYSTEM
20230224280 · 2023-07-13 ·

The present disclosure relates to a liveness identify in a machine-to-machine (M2M) system, and a method for operating an M2M device may include identifying a protection regulation applied to data, identifying a protection mechanism applied to the data, and transmitting a resource creation request message including information indicating the protection regulation and the protection mechanism to a second M2M device, and the data may include personal information or privacy information that is generated by an application executed in the M2M device.

TRAVEL IDENTITY TOKENING

A system for leveraging a tokening system to authenticate a traveler while maintaining anonymity of the traveler is provided. The system may include a secure central server configured to store identification data associated with a plurality of users. The system may also include a mobile token application for providing a token identifier representing a user's identification data. The mobile token application may be activated by the central server on a mobile device of the user registered with the central server and stored in a secure storage on the mobile device of the user. The system may also include a travel service provider. The travel service provider may be configured to enable reserving a travel reservation file. The travel service provider may be enabled to retrieve a token identifier from the user's mobile device as representing the identification of the user and verify the token identifier with the central server.

SYSTEMS AND METHODS OF MEDIA PROCESSING

Media processing systems and techniques are described. A media processing system receives image data that represents an environment captured by an image sensor. The media processing system receives an indication of an object in the environment that is represented in the image data. The media processing system divides the image data into regions, including a first region and a second region. The object is represented in one of the plurality of regions. The media processing system modifies the image data to obscure the first region without obscuring the second region based on the object being represented in the one of the plurality of regions. The media processing system outputs the image data after modifying the image data. In some examples, the object is depicted in the first region and not the second region. In some examples, the object is depicted in the second region and not the first region.

Systems and methods for automatically securing and validating multi-server electronic communications over a plurality of networks
11699154 · 2023-07-11 · ·

In one embodiment, a method includes receiving, at a privacy transaction platform server, from a transaction network server, a transaction approval request associated with a user device and a requesting server including proffered transaction strings and proffered server properties associated with the requesting server, retrieving a privacy transaction record associated with the user device including tagged transaction strings and server properties associated with a provider server, determining that there is a transaction string match between the proffered transaction strings and the corresponding tagged transaction strings, determining that there is a server match between the requesting server and the provider server based on a validity metric for the transaction approval request exceeding a specified confidence threshold based on an analysis of the proffered server properties and the provider server properties, and transmitting, to the transaction network server, a validation response approving the requested transaction.

Providing data of a motor vehicle

Technologies and techniques for anonymously providing data of a motor vehicle. A first dataset is generated by a motor vehicle, and the first dataset is anonymized using a vehicle computing unit. User related data and the anonymized first dataset are communicated to a first server system using the vehicle computing unit and the communicated user related data is deleted using the first server system. The anonymized first dataset is communicated to a second server system using the first server system after deletion of the user related data.

System and Method for Improving Internet Communication by Using Intermediate Nodes
20230216937 · 2023-07-06 ·

A method for fetching a content from a web server to a client device is disclosed, using tunnel devices serving as intermediate devices. The client device accesses an acceleration server to receive a list of available tunnel devices. The requested content is partitioned into slices, and the client device sends a request for the slices to the available tunnel devices. The tunnel devices in turn fetch the slices from the data server, and send the slices to the client device, where the content is reconstructed from the received slices. A client device may also serve as a tunnel device, serving as an intermediate device to other client devices. Similarly, a tunnel device may also serve as a client device for fetching content from a data server. The selection of tunnel devices to be used by a client device may be in the acceleration server, in the client device, or in both. The partition into slices may be overlapping or non-overlapping, and the same slice (or the whole content) may be fetched via multiple tunnel devices.

METHODS AND SYSTEMS FOR LEVERAGING EXISTING USER DATA TO VERIFY USER CREDENTIALS
20230214527 · 2023-07-06 · ·

Methods, systems, and devices for leveraging data already collected on a user in a secure and private manner, in particular to verify user credentials for third parties. The methods, systems, and devices innovate beyond traditional security and privacy platforms in computer systems by processing the data to create a useable metric for the purposes of the third parties, in which the useable metric preserves the security and privacy of the underlying data.

MASKING PRIVATE INFORMATION WHILE STREAMING A LIVE SESSION
20230216835 · 2023-07-06 ·

Aspects of the present disclosure involve a system comprising a computer-readable storage medium storing a program and method for streaming a live session. The program and method provide for receiving, from a first device of a first user, indication of first user input provided by the first user with respect to a first data input field of plural data input fields included in a displayed page; determining whether the first user input corresponds to personally identifiable information; causing, when the first user input does not correspond to personally identifiable information, a second device associated with a second user to display the plural data input fields and to display the first user input; and causing, when the first user input corresponds to personally identifiable information, the second device to display the plural data input fields and to mask display of the first user input.

Network identifier and authentication information generation for building automation system controllers

Generating network identifier information and authentication information for wireless communication with a controller includes accessing, by the controller, identity information associated with the controller. The controller obfuscates the identity information and generates the network identifier information and the authentication information associated with the controller using the obfuscated identity information. The controller is configured for wireless communication using the generated network identifier information and the generated authentication information.

Decentralized privacy-preserving rewards with cryptographic black box accumulators

A decentralized and trust-minimizing computer architecture for computing rewards for users of an advertising system includes cryptographic black box accumulators (BBA), which is a cryptographic counter that only the issuer can update. An attention application requests initialization of a BBA from a guardian and subsequently requests updates to the BBA to track interactions between a user of the attention application and ads on the attention application. The guardian signs updates to the BBA to reach agreement on the state of ad interactions. The attention application may randomize the BBA and submit requests via an anonymous channel such that no participant can link two encounters with the BBA to each other or link the BBA to a specific attention application, thus improving user privacy. Reward redemption requests can be made based on a known policy and committed to a public blockchain for verification by observers that the protocol is operating correctly.