H04L63/0414

SYSTEM AND METHOD FOR SECURED COMMUNICATIONS
20220345428 · 2022-10-27 ·

The embodiments of the present invention are directed to various implementations of a system and/or method for protecting the confidential information that may exist within the contents of electronic communication, such an email or attachment to the e-mail. A system administrator of a secured application according to the embodiments of the present invention can configure various criteria, or combinations of criteria, for triggering the application of one or more e-mail protection functions (EPFs) to be applied to the communication before it is sent; the EPFs may include the encryption of the e-mail or attachment, storing of the e-mail or attachment on a secured server, or otherwise restrict access to the communication by unauthorized recipients.

Methods and apparatus to collect distributed user information for media impressions and search terms

Disclosed examples include accessing impression data collected at a media device by a collector installed with an application, the impression data including a first identifier, a second identifier, and a media identifier, the first identifier to identify at least one of the media device or a user of the media device to a first database proprietor, and the second identifier to identify the at least one of the media device or the user of the media device to a second database proprietor, the collector to obtain the first and second identifiers from a memory of the media device; requesting first demographic information from the first database proprietor based on the first identifier and second demographic information from the second database proprietor based on the second identifier; and storing at least some of the first or second demographic information in association with the media identifier in a data store.

UTILIZING AID TO SET A STATION MAC ADDRESS IN A WLAN SYSTEM
20230084715 · 2023-03-16 ·

To protect and ensure security and/or privacy, an access point and a wireless network device can exchange capabilities information. The capabilities information can indicate that each of the access point and the wireless network device support generation of an association identifier association media access control (A-AMAC) identifier. The A-AMAC identifier is based on an association identifier (AID) (that is assigned by the access point and associated with the wireless network device) and any other information exchanged between the access point and the wireless network device. The A-AMAC identifier once generated can be stored by the access point. The A-AMAC identifier is then used for post association communications between the access point and the wireless network device. As the A-AMAC identifier is a unique identifier for the association of the access point and the wireless network device, tracking of the wireless network device is thwarted or inhibited.

ATTRIBUTION OF USER DATA SOURCES ACROSS DATASETS IN A DATA SHARING PLATFORM

In one embodiment, a data sharing platform performs a series of data operations to provide different types of data via different sharing services of the data sharing platform that are derived from data shared by a particular data owner. The data sharing platform generates tag data associated with the particular data owner for one or more of the series of data operations. The data sharing platform determines, based on the tag data, an attribution chain that links the data shared by the particular data owner to the different types of data provided via the different sharing services. The data sharing platform sends an indication of the attribution chain for display.

SYSTEMS AND DEVICES FOR ENCRYPTING, CONVERTING AND INTERACTING WITH MEDICAL IMAGES

A system for communicating images, comprises an imaging device configured to capture and image and generate a digital image file, the imaging device comprising a device identifier; a set of routines configured to label the digital image file, associated account information with the digital image file, associate the device identifier with the digital image file, and communicate the digital image file to a server; a server configured to receive digital image files and process the digital image file according to at least one of a label associated with the digital image file, account information associated with the digital image file, and a device identifier associated with a device that captured the digital image file.

AUTOMATED MONITORING OF PROXIMATE DEVICES

Aspects of the disclosure relate to an automated monitoring of proximate devices. A computing platform may cause a reporting device to detect a target device in a local network, retrieve network data associated with the target device, and send, to an intermediate server, the network data. The computing platform may send, to the intermediate server, a query. The intermediate server may send the network data in response to the query. Based on the network data, the computing platform may determine an amount of time that has elapsed since network activity was previously detected for the target device, and based on a determination that the amount of time exceeds a predetermined time threshold, the computing platform may generate an alert notification indicating that the target device may need to be traced. Subsequently, the alert notification may be sent to the reporting device.

END-TO-END ENCRYPTION FOR MULTIPLE RECIPIENT DEVICES

One or more computing devices, systems, and/or methods for end-to-end encryption for multiple recipient devices are provided. A first registration, comprising a first device public key, is created for a first device. A second registration, comprising a second device public key, is created for a second device. A first notify message of the second registration and second device public key is provided to the first device. A second notify message is provided to the second device of the first registration and first device public key. A secure communication invite is routed to the first device. An encrypted message, comprising a first device private key, is routed from the first device to the second device. End-to-end encrypted communication between a sender device and the first device and the second device using the first device private key is facilitated.

Client identification and management across multiple social platforms

The present embodiments relate to identifying a user on an external platform as a client of an entity and managing interactions with the user. An input provided by the user on an external platform can be parsed to derive user-specific social media data for the user. The user-specific social media data can be compared with client information maintained in a client database and a harvested social media database to identify the user as a client. A verification message can be sent to the user via a messaging application of the external platform to receive semi-private client data and verify the identity of the user. A response can be generated for the user based on client information. The response to the user can include a link to a secure messaging application to enable secure data communication between the user and the client.

System and method for enabling secure web access
20230122746 · 2023-04-20 ·

The present invention relates to networking technologies, specifically the disclosed invention enables clients or customers to anonymously access web using a privately held web device. Generally, web client identity hiding has multiple commercial usages in internet community such as protecting computer privacy, facilitating web scrapping activities and allowing geo-blocking bypass. The object of the present invention is to hide web identity that further requires hiding of a web client IP address. IP address used to uniquely identify a web client. The present invention addresses some of the problems of hiding internet (IP) identity by enabling hiding of identity using approach that is an alternative to a Virtual Private Network (VPN) method. Specifically, the disclosed invention provides a web service, that hides internet (IP) identity and geo location of a web client or customer from an operator/owner of a website.

PER PARTICIPANT END-TO-END ENCRYPTED METADATA

Systems and methods are provided for sending a combined read and reaction message. The systems and methods perform operations comprising: accessing, by a messaging application, a conversation session comprising a plurality of messages exchanged between a plurality of client devices, the messaging application being associated with a first client device of the plurality of client devices; generating, by the messaging application, metadata associated with one or more of the plurality of messages; encrypting, by the messaging application, the metadata in accordance with an end-to-end encryption process to enable a second client device of the plurality of client devices to read the metadata and prevent the second client device from modifying the metadata; and transmitting, to a server, a packet comprising an encrypted message slot and a first metadata slot, the first metadata slot comprising the encrypted metadata.