H04L63/0407

LOW ENTROPY BROWSING HISTORY FOR ADS QUASI-PERSONALIZATION

The present disclosure provides systems and methods for content quasi-personalization or anonymized content retrieval via aggregated browsing history of a large plurality of devices, such as millions or billions of devices. A sparse matrix may be constructed from the aggregated browsing history, and dimensionally reduced, reducing entropy and providing anonymity for individual devices. Relevant content may be selected via quasi-personalized clusters representing similar browsing histories, without exposing individual device details to content providers.

TRAFFIC SPLITTING IN KERNEL FOR TARGETED TRAFFIC PROTECTION
20220394063 · 2022-12-08 · ·

Techniques are provided for securely routing network traffic data. A kernel routine in a computing device obtains content metadata from the network traffic data associated with an application. The kernel routine can evaluate the content metadata and determine whether security and privacy policies should be applied to the network traffic data associated with the content metadata. The kernel routine can automatically create or identify tags for the content metadata based on intent and context information that is determined by the kernel routine. The tags can be associated with particular security and privacy policies, such as anonymization and encryption.

Third-party data manipulation with privacy controls
11522841 · 2022-12-06 · ·

The disclosed computer-implemented method may include receiving, from a third party, a portion of data or computer-executable logic that is part of a specified model. Each model may include various portions of independently verifiable computer-executable logic. The method may further include receiving data at a processing engine. The processing engine may be configured to apply the specified model to the received data. The method may then execute the specified model at the processing engine to modify the received data and send the modified data to an application that is configured to process the modified data. Various other methods, systems, and computer-readable media are also disclosed.

Secure identity transfer
11522864 · 2022-12-06 · ·

A first request is received for a temporary alternate identifier for a user, wherein the user is identified within a service using a user service identifier, and wherein the temporary alternate identifier assists in transferring the user service identifier from the service to a resource. In response to the first request, the temporary alternate identifier is generated and associated with the user service identifier. The temporary alternate identifier is then provided the user, and the temporary alternate identifier is also provided by the user to the resource. A second request is received, from the resource, for an associated service identifier that is associated with the temporary alternate identifier. An indication is then provided, to the resource, that the user service identifier is the associated service identifier.

IMAGE PROCESSING APPARATUS, CONTROL METHOD, AND SYSTEM
20220385640 · 2022-12-01 ·

An image processing apparatus includes a controller, a displayer, a communicator, and a near field communicator. The controller receives, from a terminal device, a display image associated with destination information stored by the terminal device, via the near field communicator, displays, on the displayer, a screen including the display image, receives, from the terminal device, the destination information, based on an operation input to the screen, and transmits an image for transmission via the communicator, based on the destination information received from the terminal device.

Real-time messaging platform with enhanced privacy

A real-time messaging system platform receives from, a communication application installed on a first user communication device, a first user identifier, an indication that a messaging service message composed by the first user is being directed to a first destination associated with a second user, and an identification of data present in the messaging service message. The identification of the data and a message transmission history of the first user is used to enable selection of a message of a first entity. The selected message of the first entity is caused to be displayed by the communication application within a message framework that frames the first user messaging service message. The first entity message is caused to be included in the messaging service message transmitted to the second user device, wherein the first entity is not provided with access to the identity of the first user or the second user.

Identity information processing method, device, and system
11510052 · 2022-11-22 · ·

An identity information processing method, a device, and a system, the method including obtaining, by a first network element, a first parameter, where the first parameter is associated with a domain to which a network slice belongs, and determining, by the first network element, according to the first parameter, whether the network slice is managed by an operator.

Detecting identified information in privacy firewalls
11509628 · 2022-11-22 · ·

Systems, methods and non-transitory computer readable media for detecting identified information in privacy firewalls are provided. A repeating field in a data collection may be analyzed to determine whether the field is likely to include information that identifies particular individuals. An access request of a user may be received. A permission record associated with the user may be accessed. In response to the field being likely to include information that identifies particular individuals and a first value in the permission record, access to the field may be denied, in response to the field not being likely to include information that identifies particular individuals and the first value in the permission record, access to the field may be provided, and in response to a second value in the permission record, access to the field may be provided.

CONTROLLING ACCESS TO SECURED DATA VIA TIMED FILTERING OF DATA
20230054085 · 2023-02-23 ·

According to certain implementations, an access control system controls access to secured data that is stored on a secured source. A requestor system may request information representing the secured data. The access control system receives the secured data from the secured source, and selects a portion of the secured data based on a lens including a filter criteria or a modification instruction. Adjusted data may be generated based on a modification of the selected portion of data, where the modification is based on the lens. The access control system provides the adjusted data to the requestor system via an access interface. In some cases, upon completion of a time period, the access control system prevents the requestor system from accessing the adjusted data, by disabling the access interface used to access the adjusted data. The adjusted data may be deleted from the access control system.

SYSTEMS AND METHODS FOR FUNCTIONALLY SEPARATING GEOSPATIAL INFORMATION FOR LAWFUL AND TRUSTWORTHY ANALYTICS, ARTIFICIAL INTELLIGENCE AND MACHINE LEARNING

Various systems, computer-readable media, and computer-implemented methods of providing improved data privacy, anonymity and security by enabling subjects to which data pertains to remain “dynamically anonymous,” i.e., anonymous for as long as is desired—and to the extent that is desired—are disclosed herein. Embodiments include systems that create, access, use, store and/or erase data with increased privacy, anonymity, and security—thereby facilitating the availability of more qualified and accurate information. When personal data is authorized by data subjects to be shared with third parties, embodiments described herein may facilitate the sharing of information in a dynamically-controlled manner that also enables the delivery of temporally-, geographically-, and/or purpose-limited information to the receiving party. In one example, the disclosed techniques may be used to functionally separate geospatial information, such that it remains “dynamically anonymous,” i.e., anonymous for as long as is desired—and to the extent or degree that is desired.