H04L63/0407

Per-session invocation of priority services based upon network available information

Concepts and technologies disclosed herein are directed to per-session invocation of priority services based upon network available information. A service architecture can include a service architecture core and a service execution runtime framework in which a priority service application is executable to perform operations to provide a priority service for a communications session. The priority service application can determine whether a priority service should be invoked for the communications session based upon priority criteria. If a determination is made that the priority service is to be invoked for the communications session based upon the priority criteria, the priority service application can invoke the priority service for the communications session. If a determination is made that the priority service is not to be invoked for the communications session based upon the priority criteria, the priority service application can cause the communications session to be coordinated without the priority service.

Trustworthy data exchange using distributed databases

The present disclosure relates to a trustworthy data exchange. Embodiments include receiving, from a device, a query, wherein the query comprises a question. Embodiments include identifying particular information related to the query. Embodiments include receiving credentials from a user for retrieving the particular information related to the query. Embodiments include retrieving, using the credentials, the particular information related to the query from one or more data repositories that are part of a distributed database comprising an immutable data store that maintains a verifiable history of changes to information stored in the distributed database. Embodiments include determining, based on the particular information related to the query, an answer to the query. Embodiments include providing the answer to the device.

Method to anonymize client MAC addresses for cloud reporting

A method for anonymizing user identifiable information to be transmitted outside of a local network includes generating a network entity hash input based on (i) a first MAC address assigned to a client station of the local network, (ii) a second MAC address assigned to the network gateway device of the local network, and (iii) an identifier of a cloud entity of an external network to which data of the client station is to be transmitted. The method further includes generating a hash value output based on the network entity hash input and a random token value using a hashing function, generating an anonymized MAC address associated with the client station based on the hash value output, and transmitting the anonymized MAC address associated with the client station to the cloud entity of the external network.

Domain specific browser identifiers as replacement of browser cookies
11601404 · 2023-03-07 · ·

The present disclosure provides a secure, user-transparent, and highly efficient content provider-specific identifier (“CPSID”), sometimes referred to as a “read-only cookie” (“ROC”). These content provider-specific identifiers may be generated by the client device and encrypted with a public key of the content provider, preventing third parties from indirectly identifying matches, and obviating the need for provider-side cookie matching tables and resource-intensive tracking communications. The generation of content provider-specific identifiers may be controlled by user policies, such that identifiers are only created for content providers with compliant terms of service (ToS), e.g. retrievable from a predetermined address within the domain; content providers that are on a whitelist (e.g. for which the user has explicitly provided consent); and/or content providers that are not on a blacklist (e.g. for which the user has explicitly refused consent).

Video and still image data alteration to enhance privacy
11600108 · 2023-03-07 ·

A computer alters at least one recognizable metric or text in a digitally encoded photographic image by operating an alteration algorithm in response to user input data while preserving an overall aesthetic quality of the image and obscuring an identity of at least one individual or geographic location appearing in the image. An altered digitally-encoded photographic image prepared by the altering of the at least one recognizable metric or text in the image is stored in a computer memory. User feedback and/or automatic analysis may be performed to define parameter values of the alteration algorithm such that the alteration process achieves preservation of aesthetic qualities while obscuring an identity of interest.

Systems and methods for a privacy screen for secure SaaS applications
11475146 · 2022-10-18 · ·

Systems and methods for providing a privacy screen to a network application accessed via an embedded browser of a client application are described. The method includes establishing, by a client application on a client device, a session to a network application hosted on a third party server. The client application includes an embedded browser for accessing the network application. The method further includes identifying, by the client application, a policy for providing a privacy screen to one or more portions of the network application, detecting, by the embedded browser, that the one or more portions of the network application are to be rendered on a display of the client device, and displaying a privacy screen including one or more masks displayed over at least the one or more portions of the network application rendered on the display of the client device via the embedded browser.

Computer program product, computer implemented method, and system for cognitive item selection with data mining

Methods, computer program products, and systems are presented. The methods include, for instance: ascertaining a user state of a user based on user state data for a cognitive menu selection service from an eatery by use of an electronic menu system. Selection criteria to request one or more items from menus of the eatery is determined based on the user state. A request including the selection criteria is sent and the one or more items corresponding to the selection criteria is obtained and presented to the user by use of a customized virtual reality interface on a personal device of the user.

Apparatus and method for evaluating and modifying data associated with digital identities

An apparatus has a processor and a memory connected to the processor. The memory stores instructions executed by the processor to store identity attributes including real identity attributes for a real individual and at least two sets of digital identity attributes each operative as a personal privacy proxy with compartmental identity attributes. The at least two sets of digital identity attributes each include a digital identity name, a digital identity mobile device number and a digital identity email address. The at least two sets of digital identity attributes are evaluated to produce a similarity measure. The real individual is provided with a recommendation based upon the similarity measure.

BLOCKCHAIN-BASED SYSTEMS AND METHODS FOR PROPAGATING DATA IN A NETWORK
20230124712 · 2023-04-20 ·

A method of propagating data packets in a network of nodes is disclosed. The method, implemented at one of the nodes, includes: generating at least one data packet of a first type; collecting a set of data packets of the first type during a first time period, the set including the at least one generated data packet and at least one data packet of the first type received from one or more first nodes in the network; and determining a mapping of the data packets of the set to a plurality of neighbouring nodes connected to the node, the mapping indicating an expected time of relay of each data packet of the set to neighbouring nodes, wherein determining the mapping includes determining at least one of: a first sub-mapping which allocates any two data packets having a same source for relay to different subsets of the neighbouring nodes; and a second sub-mapping which assigns different expected times of relay to any two data packets that are generated at the node or received by the node from the one or more first nodes in a same time interval.

METHOD AND SYSTEM FOR ANONYMOUS USER DATA STORAGE AND CONTROLLED DATA ACCESS
20230124967 · 2023-04-20 ·

Methods and systems are configured to store user data and control access to the user data, wherein the data is stored remotely from the user (such as external to a user's computing device) and the user's data is maintained anonymously. Content is stored in association with a user identifier and access by third parties is controlled by linked third party identifiers.