Patent classifications
H04L63/0421
Domain specific browser identifiers as replacement of browser cookies
The present disclosure provides a secure, user-transparent, and highly efficient content provider-specific identifier (“CPSID”), sometimes referred to as a “read-only cookie” (“ROC”). These content provider-specific identifiers may be generated by the client device and encrypted with a public key of the content provider, preventing third parties from indirectly identifying matches, and obviating the need for provider-side cookie matching tables and resource-intensive tracking communications. The generation of content provider-specific identifiers may be controlled by user policies, such that identifiers are only created for content providers with compliant terms of service (ToS), e.g. retrievable from a predetermined address within the domain; content providers that are on a whitelist (e.g. for which the user has explicitly provided consent); and/or content providers that are not on a blacklist (e.g. for which the user has explicitly refused consent).
Data usage method, system, and program thereof employing blockchain network (BCN)
The purpose of the present invention is to provide a new data utilization system in which, while an individual independently uses and utilizes one's own personal data, security and anonymity of the data can be effected. An information processing device used by an individual comprises: a function of transmitting, over a network, data relating to an address on a blockchain network used by the individual to a provider-side information processing device comprising a storage device that is a provision source of data associated with information about the individual; a function of referring to access data (ACT) that includes the data relating to the blockchain network address and data for identifying the provision source of the data and that is issued by the provision-side information processing device for the blockchain network address; and a function of, on the basis of the access data (ACT), acquiring the data associated with the information about the individual from the provider-side storage device and storing said data at least in a storage device or a memory of said individual.
Edge devices utilizing personalized machine learning and methods of operating the same
Edge devices utilizing personalized machine learning and methods of operating the same are disclosed. An example edge device includes a model accessor to access a first machine learning model from a cloud service provider. A local data interface is to collect local user data. A model trainer is to train the first machine learning model to create a second machine learning model using the local user data. A local permissions data store is to store permissions indicating constraints on the local user data with respect to sharing outside of the edge device. A permissions enforcer is to apply permissions to the local user data to create a sub-set of the local user data to be shared outside of the edge device. A transmitter is to provide the sub-set of the local user data to a public data repository.
Ascertaining network devices used with anonymous identifiers
Techniques for identifying certain types of network activity are disclosed, including parsing network traffic to automatically recognize anonymous identifiers. Such techniques may be used to identify and eliminate malicious and/or undesirable network traffic, and to identify topics relevant to a user of a particular network device so that communications to such a user are more likely to relate to a topic of interest to the user.
Private data sharing system
A novel architecture for a data sharing system (DSS) is disclosed and seeks to ensure the privacy and security of users' personal information. In this type of network, a user's personally identifiable information is stored and transmitted in an encrypted form, with few exceptions. The only key with which that encrypted data can be decrypted, and thus viewed, remains in the sole possession of the user and the user's friends/contacts within the system. This arrangement ensures that a user's personally identifiable information cannot be examined by anyone other than the user or his friends/contacts. This arrangement also makes it more difficult for the web site or service hosting the DSS to exploit its users' personally identifiable information. Such a system facilitates the encryption, storage, exchange and decryption of personal, confidential and/or proprietary data.
System and method for protecting a communication device against identification outside a computer network by routing traffic through a smart hub
A system, a method, and a computer program for protecting data traffic from a communication device against fingerprinting or privacy leakage. The method can include receiving data traffic from a communication device connected to a network, analyzing the received data traffic to determine network activity or operational characteristics of the communication device, generating forged data traffic for the network based on the determined network activity or operational characteristic of the communication device, and transmitting the forged data traffic to an external communication device that is located outside the network. The forged data traffic can add an entropy factor to the data traffic from said communication device connected to the network.
Augmented reality information display and interaction via NFC based authentication
Various embodiments are generally directed to improving card security by providing a user a contactless card with no sensitive card information, such as card number, card verification value, and expiration date, printed thereon, and displaying the sensitive card information relative to the card in augmented reality (AR) based on successful NFC-based user authentication. According to examples, the NFC-based user authentication may be performed by one-tapping or single tapping the contactless card to user mobile device. One or more portions of the sensitive card information may be obfuscated to further enhance card security. Moreover, the user can interact with AR elements including the sensitive card information to perform various actions.
Method of securely transmitting a message via a telecommunications network
A method of securely transmitting a message from a sending entity to a receiving entity via a network. A Processing String Engine is communicatively coupled to the sending and receiving entities. The sending entity requests the Processing String Engine to provide a network routing path for message transmission from the sending entity to the receiving entity and to provide a processing string for the message transmission. The Processing String Engine identifies a network path and generates a processing string. The sending entity appends the processing string to the message and sends the message to the receiving entity. The message is unreadable while the processing string is appended thereto. Upon receipt of the message with the appended processing string, the receiving entity requests removal the processing string. Upon successful verification of the receiving entity, the processing string is removed, and the message is returned to the receiving entity.
SYSTEMS AND METHODS FOR MANAGING TELECOMMUNICATIONS
Systems and methods of the present disclosure are directed to a telecommunications management system (TMS) that receives an indication from a first user to participate in a telecommunication. The TMS can identify a characteristic of the first user and compare the characteristic with one or more characteristics of each user of a pool of users. The TMS can select, based on the comparison, a second user of the pool of users that matches the first user. The TMS can initiate, responsive to selecting the matching second user, an anonymous telecommunications channel between the first user and the second user.
QUERY ANALYSIS USING A PROTECTIVE LAYER AT THE DATA SOURCE
A method and system for performing query analysis are described. The method and system include receiving a query for a data source at a wrapper. The wrapper includes a dispatcher and a service. The dispatcher receives the query and is data agnostic. The method and system also include providing the query from the dispatcher to the data source and to the service as well as analyzing the query using the service.