H04L63/0421

AUTOMATICALLY ANONYMIZING DATA IN A DISTRIBUTED STORAGE SYSTEM
20230124528 · 2023-04-20 ·

Data can be automatically anonymized in a distributed storage system. For example, a system can receive a notification indicating that an object is stored in a non-persistent bucket of a distributed storage system. The system can read the object from the non-persistent bucket in response to receiving the notification. The system can generate an anonymized version of the object by performing one or more anonymization operations with respect to the object. The system can store the anonymized version of the object in a persistent bucket of the distributed storage system. The system can then transmit a command for causing the object to be removed from the non-persistent bucket.

Systems and methods of propagating data packets in a network of nodes
11632390 · 2023-04-18 · ·

A method for propagating data packets in a network of nodes is disclosed. The method includes: collecting a set of first data packets during a first time period, the set including at least one first data packet received from one or more first nodes in the network; determining an available bandwidth in the network node's links to a plurality of neighbouring nodes connected to the network node; determining a mapping that assigns each of the first data packets for relay to one or more neighbouring nodes, the mapping indicating an expected time of relay of each of the first data packets, wherein determining the mapping includes using the available bandwidth as a basis for setting, for each of the first data packets, at least one of: a first number of peer nodes to which the first data packet is assigned for relay by the mapping; a first length of time delay in relaying the first data packet to one or more peer nodes; and a number of hops the first data packet travels from the network node, and transmitting the first data packets of the set to the plurality of neighbouring nodes according to the determined mapping.

Managing access to data for demographic reach with anonymity

Embodiments for providing demographic reach with anonymity by a processor. User data access may be managed via a data access agent by generating a unique user privacy profile having a selected level of anonymity for each relationship between a user and an application service.

COMMUNICATIONS DEVICE AND/OR AUTHENTICATION SERVER USING SUBSCRIBER BIOMETRIC ATTRIBUTES
20220329434 · 2022-10-13 ·

Briefly, methods, apparatuses, and/or articles of manufacture may be implemented to authenticate a subscriber of a communications device. The method may include receiving, such as at an authenticating server via a client server, an indication that a subscriber is attempting to access secure content via the communications device. The method may continue with transmitting one or more anonymizing parameters from the authentication server to the communications device. The method may continue with receiving, by the authentication server, in response to transmitting the one or more anonymizing parameters to the communications device, first one or more anonymized values computed using the one or more anonymizing parameters and one or more biometric attributes of the subscriber. The method may continue with authenticating the subscriber based, at least in part, on comparing the received one or more anonymized values with the one or more anonymized values computed at the authentication server.

SECURE DATA CACHING FOR EDGE NETWORKS

The disclosed technology provides for secure data caching by an edge network for an electronic device. The secure data caching can be provided by including a personal edge network and a remote edge network in the edge network. The remote edge network may include storage nodes that are accessible by multiple users. The personal edge network may include devices that are associated with the electronic device and a user of the electronic device, and that have been enrolled as storage nodes of the personal edge network.

Method, device and medium for transmission of fragmented IP addresses and data packets through a network

An enhanced device and method for anonymization also offering improved security properties of data exchanged bidirectionally between a client and a server in a communication network. A protocol in respect of data exchange between client and server which relies on a two-level third-party servers architecture as well as on a system for bidirectional communication between the client and the server through these two levels of third-party servers.

Method, apparatus, and computer program product for anonymizing trajectories

Embodiments described herein relate to anonymizing of trajectories of mobile devices through the introduction of gaps between sub-trajectories. Methods may include: receiving a set of probe data points defining a trajectory; identifying a temporal length range of sub-trajectories; receiving a mode, where the mode is established based on a preceding set of probe data points defining a trajectory, where the mode includes an indication of whether to generate a sub-trajectory or a gap from the beginning of the received set of probe data points; and establishing at least one sub-trajectory including a sub-set of the set of probe data points, where the at least one sub-trajectory is established to satisfy the temporal length range of sub-trajectories.

BLOCKCHAIN-BASED METHOD AND SYSTEM FOR SPECIFYING THE RECIPIENT OF AN ELECTRONIC COMMUNICATION
20230162181 · 2023-05-25 ·

A method and corresponding system is presented for controlling a blockchain transaction output and/or specifying the recipient of the output. It also provides a method of controlling and/or generating an electronic communication. The unlocking script is provided in order to spend an output from a further transaction (Tx.sub.2) on the blockchain. The input of the transaction (Tx.sub.1) and/or the output of the further transaction (Tx.sub.2) may be associated with a tokenised asset represented on, or referenced via, the blockchain. The notification address may be associated with an asset or resource represented on the blockchain, or a controller of an asset or resource represented on the blockchain. The notification address may be a network address, a cryptographic key, a uniform resource locator (URI), email address or any other address or identifier which can be represented in the metadata of a transaction script and used as a destination for an electronic communication.

SYSTEM AND METHOD FOR DYNAMIC MANAGEMENT OF PRIVATE DATA
20230161909 · 2023-05-25 · ·

Systems and methods of dynamic management of private data during communication between a remote server and a user's device, including receipt of a request for retrieval of at least one data packet from the user's device, wherein the user's device is configured to provide a response corresponding to the received request, determination of at least one communication data type of the at least one data packet corresponding to the received request, receipt of a privacy preference for the user's device, wherein the privacy preference comprises a list of allowed data packet communication types for sharing during communication, modification of data packets corresponding to requests for sharing of responses that are not compatible with the received privacy preference and maintenance of communication between the remote server and the user's device, with sharing of the modified data packet.

PRIVACY-PRESERVING ACTIVITY AGGREGATION MECHANISM

This disclosure relates to a method for privacy-preserving web activity monitoring including receiving, from an application on a user device of a user, a request for digital content from a domain, assigning, to the application and at a first time, a randomized cohort constructed based on a randomly selected identifier and a timestamp indicating the first time at which the randomized cohort was assigned to the application, and providing, to the application and at the first time, (i) a digitally signed certificate corresponding to the randomly selected identifier and the timestamp and (ii) a unique public key and corresponding unique private key associated with the certificate, wherein the randomly selected identifier is also assigned to at least a threshold number of other applications executing on other user devices within a predetermined period of time of the assignment of the randomized cohort to the application.