H04L63/0421

POLICY ENFORCEMENT FOR DATA SOURCES ACCESSED VIA INTERFACES

A method is described. The method includes receiving a communication including a command for a data source accessed via an interface. The interface is a data source agnostic platform and is capable of decoupling execution of the commands for the data source from a current session. The method also includes generating an augmented communication including the command and dynamically injected code for enforcing at least one policy. The augmented communication is provided to the interface. The interface enforces policies in response to the dynamically injected code in the augmented communication being executed by the interface.

Systems and methods for efficient and secure temporary anonymous access to media content
11658979 · 2023-05-23 · ·

A method for providing access to media content from a media content provider is performed at an electronic device. The method includes receiving, from a client device, a request for access to a media item. The request for access includes a self-describing user-identifier. The method includes, in response to the request for access to the media item, initiating an analysis to determine whether the client device is authorized to access the media item, the analysis including an examination of a media consumption log associated with the client device. The media consumption log stores data representing self-describing user-identifiers. The analysis includes, based on the examination of the media consumption log, detecting multiple requests from different self-describing user identifiers corresponding to the client device to determine whether the client device has reached an access limit and, when the client device has reached the access limit, terminating access to the media item.

SYSTEMS AND METHODS FOR CONTROLLING DATA EXPOSURE USING ARTIFICIAL-INTELLIGENCE-BASED MODELING
20230111604 · 2023-04-13 ·

Systems and methods for controlling the exposure of data privacy elements are provided. The systems and methods may generate an artificial profile model. The artificial profile model may include a constraint for generating new artificial profiles. A signal may be received indicating that a computing device is requesting access to a network location. One or more data privacy elements associated with the computing device can be detected. An artificial profile can be determined for the computing device. The artificial profile may be usable to identify the computing device. The one or more data privacy elements may be automatically modified according to the constraint included in the artificial profile model. The method may include generating a new artificial profile for the computing device. The new artificial profile may include the modified one or more data privacy elements. The new artificial profile may mask the computing device from being identified.

INDIVIDUAL DATA UNIT AND METHODS AND SYSTEMS FOR ENHANCING THE SECURITY OF USER DATA
20230112810 · 2023-04-13 ·

An individual data unit for enhancing the security of a user data record is provided that includes a processor and a memory configured to store data. The individual data unit is associated with a network and the memory is in communication with the processor. The memory has instructions stored thereon which, when read and executed by the processor cause the individual data unit to perform basic operations only. The basic operations include communicating securely with computing devices, computer systems, and a central user data server. Moreover, the basic operations include receiving a user data record, storing the user data record, retrieving the user data record, and transmitting the user data record. The individual data unit can be located in a geographic location associated with the user which can be different than the geographic locations of the computer systems and the central user data server.

METHOD AND APPARATUS FOR DISPLAYING INTERFACE FOR PROVIDING SOCIAL NETWORKING SERVICE THROUGH ANONYMOUS PROFILE

A method of providing information on a social networking service (SNS) activity to a chatroom, performed by a user terminal, includes: transmitting, to a server, an SNS request for each of a plurality of anonymous profiles created to be interlinked with an account of a user for an instant messaging service (IMS); displaying information on an SNS activity performed through a first anonymous profile selected by the user in correspondence with a chatroom in which the user participates in the IMS, from among the plurality of anonymous profiles, in the chatroom; receiving an input of changing a profile of the user, selected corresponding to the chatroom, from the first anonymous profile to a second anonymous profile; and displaying information on an SNS activity performed through the second anonymous profile in the chatroom.

COMMUNICATIONS RELAYS

Described herein are examples of methods that include receiving, at a communications relay, a first electronic communication from a third party device. The methods also include determining a sender identity associated with the first electronic communication. The methods include storing, on an electronic data storage unit associated with the sender identity, a communication digest of the first electronic communication associated with the sender identify; generating, at the communication relay, a unified network interface for accessing a set of electronic communications directed to the customer. The method includes providing, to the customer via a network, access to the unified network interface.

Scalable anonymous disposable desktops (SADD)
11625261 · 2023-04-11 ·

Information Security and privacy are the most critical aspects of the internet. The majority of the individuals that have access to the Internet have great difficulty understanding the basics of computers and how they work. This limits the ability of Internet users to protect themselves and their information while browsing the internet. With the creation and testing of SADD (Scalable Anonymous Disposable Desktops), Internet users no longer have to worry about protecting their computer or privacy.

Cryptographic anonymization for zero-knowledge advertising methods, apparatus, and system

A cryptographic anonymization method, apparatus, and system are disclosed. An example apparatus includes a server configured to receive encrypted usage information and an identifier from an application operating on a user terminal and trans-cypher the encrypted usage information from a first encryption scheme to a second encryption scheme to create second encrypted usage information without decrypting the encrypted usage information. The server is also configured to convert and encrypt the identifier to an encrypted unique identifier. The server is further configured to compare the second encrypted usage information to a taxonomy of data labels using rules. For each match of at least some of the second encrypted usage information to a data label, the server is configured to add the encrypted unique identifier to the matching data label. The server uses the data labels and/or the encrypted unique identifier for serving advertisements to the user.

Monitoring user experience using data blocks for secure data access

Techniques for enabling secure access to data using data blocks is described. Computing device(s) can provide instruction(s) to a component associated with an entity, wherein the instruction(s) are associated with an identifier corresponding to a data block of a plurality of data blocks. The computing device(s) can receive, from the component, data associated with the component, wherein the data is associated with the identifier and is indicative of a state of the component. The computing device(s) can store the data in the data block and monitor, using rule(s), changes to the state of the component based at least partly on the data in the data block. As a result, techniques described herein enable near real-time—and in some examples, automatic—reporting and/or remediation for correcting changes to the state of the component using data that is securely accessed by use of data blocks.

Determining permissions in privacy firewalls
11606336 · 2023-03-14 · ·

Systems, methods and non-transitory computer readable media for determining permissions in privacy firewalls are provided. At least part of a content of a data collection may be analyzed to determine a subject matter. A permission corresponding to the data collection and at least one user may be determined based on the subject matter. A request of the at least one user to access at least part of the data collection may be received. In response to a first determined permission, the requested access to the at least part of the data collection may be provided, and in response to a second determined permission, the request may be denied.