H04L63/0414

Cryptic vehicle shield
11184388 · 2021-11-23 · ·

A method of providing an alert of an occurrence of a hacker intrusion, the method comprising: detecting a hacker intrusion; and transmitting a concealed or camouflaged report of the hacker intrusion to provide an alert of the occurrence of the intrusion.

DATA PRIVACY SYSTEM
20220021660 · 2022-01-20 ·

A backend computer and methods of using the backend computer are described. The method may comprise: receiving, at a first backend computer, sensor data associated with a vehicle; determining a labeling of the sensor data, comprising: determining personal data and determining non-personal data that is separated from the personal data, wherein each of the personal and non-personal data comprise labeled data, wherein the personal data comprises information relating to at least one identified or identifiable natural person; and performing via the personal data and the non-personal data that is separated from the personal data, at the first backend computer, data processing associated with collecting sensor data associated with the vehicle.

Systems, methods, and devices for digital advertising ecosystems implementing content delivery networks utilizing edge computing
11182829 · 2021-11-23 · ·

Disclosed herein are systems and techniques for using a content delivery network to perform various functions within a digital advertising ecosystem, in ways that yield technological benefits such as improved security, efficiency, and speed (for example, reduction in publisher load times). As one specific example, a content delivery network can be used for the creation of electronic tokens for user identity protection between demand side platforms, supply side platforms, content creators (for example, advertisers), and publishers.

Method for modulating access to a resource, corresponding program and device

A method for controlling access to preliminarily identified computer resources is disclosed. The access is controlled so as to prevent the circumventing, by malicious applications, of barriers set up to prevent them from communicating when they are executed on one or more processors of an electronic device The method is implemented by an electronic device having access to the resources to be controlled. The method includes: receiving a request, coming from a program, for access to a current resource; obtaining at least one access parameter for access to the current resource within a resource-characterizing data structure; and modulating access to the current resource as a function of the at least one access parameter.

Creating a pseudonym for requesting a network slice

A wireless device requests a network slice from a network by, first, identifying at least one network slice to be requested. Based on a mapping method that is specific to the wireless device, the wireless device forms a slice pseudonym for the or each network slice to be requested. The wireless device then transmits a request message to the network, wherein the request message comprises the or each slice pseudonym. The network node receives the request message sent by the wireless device, wherein the request message comprises at least one slice pseudonym. Based on a mapping method that is used by the wireless device and that is specific to the wireless device, the network node identifies at least one requested network slice from the or each received slice pseudonym. The network node then permits use of the requested network slice.

HANDLING OF UNIQUE IDENTIFIERS FOR STATIONS
20210360512 · 2021-11-18 ·

Methods, systems, and computer readable media can be operable to facilitate an exchange of messages between an access point and a station, wherein the access point requests a unique identifier from the station. The station may either respond with a message declining to provide a unique identifier or respond with a message including a unique identifier to be used by the access point for the station. The response from the station may include additional limitations on the use of the unique identifier by the access point. The access point may enforce different policies against a station depending upon how the station responds to the unique identifier request.

Data processing method, device, and system
11178114 · 2021-11-16 · ·

Provided are a data processing method, device, and system. The data processing method comprises: acquiring a first data packet in a local client network; determining sensitive data in the first data packet; masking the sensitive data in the first data packet, and generating a second data packet from the first data packet; and sending the generated second data packet.

Method and system providing peer effort-based validation

A method of performing a transaction between a first user of a first input device, and a second user of a second input device, the method includes generating, via the first input device, a transaction request with a with a first effort-based identity token associated with first user, receiving a response with the token and a validation key obtained from a validation server via the second input device based on a second effort-based identity token associated with the second user and a second user effort, providing the second user effort and second effort-based identity token to the validation server, receiving a second effort validation key from the validation server, and sending the transaction with the first user and second user identity-based tokens and first and second effort validation keys to the second person to complete the transaction while ensuring both the first and second users are consistent throughout the transaction.

Address retrieval systems and methods
11178541 · 2021-11-16 · ·

An address retrieval system that retrieves the physical address of a user based on a request from another user. The address retrieval system can be connected to a network, such as a cellphone network, to allow a user to submit a request containing personally identifiable information, such as a phone number, of another user and the address retrieval system can locate/retrieve the requested address information and return the information to the requesting user or a third party. The release of the address information can be managed by a user-configurable privacy policy that provides rules, permissions and/or other management regarding the release of the user's address information.

Techniques For Securely Communicating Sensitive Data For Disparate Data Messages
20210352049 · 2021-11-11 ·

Systems and methods are disclosed for securely communicating sensitive such as an identifier. A user device may receive a first message comprising a terminal type indicator. For certain values of the terminal type indicator, the user device may be configured to transmit a request message comprising a first identifier and an encrypted identifier. For other values of the terminal type indicator, the user device may be configured to generating an obfuscated identifier based at least in part on a first portion of a second identifier and a second portion of the encrypted identifier. The user device may then transmit a request message that includes the obfuscated identifier and the encrypted identifier.