Patent classifications
H04L63/0421
CONVERSATION MERGING FOR ELECTRONIC DEVICES
Aspects of subject technology provide systems and methods for generation and distribution of a stable identifier associated with multiple aliases of a user account. The stable identifier may be provided to various electronic devices by a server, responsive to requests associated with communications to those devices from one of the associated aliases. In this way, messaging applications can utilize the stable identifier to merge conversations from a single user having multiple aliases, and secure access to a secure device can be provided to an authorized user, even if the authorized user attempts access from an unauthorized account alias.
Web activity concealment
Concepts and technologies are disclosed herein for web activity concealment. A system can include a memory storing instructions that, upon execution by a processor, cause the processor to perform operations. The system can be communicatively coupled to a network. The operations can include detecting a network message that is directed to a target source, where the network message is generated by a client application of a machine-to-machine device. The operations can include identifying, based on the network message, a client action that is associated with the client application. The operations can include counterpoising the client action by generating a supplemental action command. The operations can include providing the supplemental action command to the machine-to-machine device.
Information processing method, information processing system, and information processing apparatus
In a case where data is provided to a plurality of third parties, an embodiment of the present invention provides a method and the like for checking the consent and disclosure history of disclosure to the third parties while also reducing the disadvantages from a data leak. An information processing method according to an embodiment of the present invention includes writing, to a blockchain, a consent record indicating a consent with respect to the handling of data and a related party related to the consent or the data. In the case where executing the handling in the consent record would allow the data to be usable by a third party that is neither the executing party executing the handling nor the related party, the consent record is written such that the identifier is changed to a different identifier uniquely corresponding to the third party.
Secret user account
Techniques are described that enable a user to create and use a secret user account on a social networking system that is undiscoverable by other user accounts unless invited to interact by the secret account. In some cases, a social networking system receives a request to create a secret account, and creates the secret account. The social networking system may provide, in association with the secret account, account settings for the secret account that cause the social networking system to exclude the secret account from search results on the social networking system, and obscure activity by the secret account from a first user account. The social networking system may cause presentation of a control in a user interface associated with the secret account to invite a second user account to interact with the secret account.
ANONYMOUS AUTHENTICATION SYSTEM AND METHODS FOR OBSCURING AUTHENTICATION INFORMATION IN NETWORKED COMPUTING SYSTEMS
System and methods for anonymously authenticating a client device and/or user are disclosed. An authentication system can register and/or activate a client device and provide the client device with credentials for accessing or otherwise logging into a third-party application. The client device can provide the third-party application with credentials received from the authentication system and/or self-generated credentials. The third-party application can interact with the authentication system to confirm an identity of the client device and/or authenticate the client device to access the third-party application.
Method of connecting a user device anonymously to a remote operator
A method of connecting a user device anonymously to a remote operator, via an intermediate anonymizing server is described. In this way, a remote operator may control the device, without the remote operator knowing the identity of the owner or of user of the device. A remote operator might provide medical support or entertainment. The user of the device is provided with a connection key, which is then further given by the user to a desired remote operator. Both the user and the remote operator provide the anonymizing server with the connection key. The anonymizing server opens a chat room uniquely associated with the connection key. Electronic connectivity is provided by forwarding messages between the user device and the remote operator through the chat room. No other access to the chat room is permitted. The anonymizing server does not store the connection key. No user application is required.
USING MULTI-PARTY COMPUTATION AND K-ANONYMITY TECHNIQUES TO PROTECT CONFIDENTIAL INFORMATION
This disclosure relates to protecting the confidential information of multiple entities using secure multi-party computation (MPC) and k-anonymity techniques. In some aspects, a method includes receiving, by a first MPC computing system from a client device, a content request including encrypted user group identifiers. Each encrypted user group identifier is encrypted using a first encryption key of a second MPC computing system. For each encrypted user group identifier, a request is transmitted to the second MPC computing system. The request includes the encrypted user group identifier. For each user group identifier that satisfies a k-anonymity, the first MPC computing system receives, from the second MPC computing system, a plaintext value of the user group identifier. The first MPC computing system transmits a selection parameter request to one or more platforms. The selection parameter request includes the plaintext value of the user group identifier.
Systems and methods for anonymous and consistent data routing in a client-server architecture
Disclosed herein are systems and method for sending user data in a client-server architecture with data anonymity and consistency. In an exemplary aspect, a client device may identify, a structure to send to the server, wherein the structure comprises the user data. The client device may divide the structure into two or more substructures and for each respective substructure of the two or more substructures, the client device may (1) assign a degree of confidentiality to the respective substructure and (2) send the respective substructure to a respective node of a plurality of nodes based on the assigned degree of confidentiality and a degree of security of the respective node. The respective node may be configured to apply a respective transformation to the respective substructure and transmit the transformed respective substructure to the server. The server may be configured to combine received transformed substructures into a transformed structure.
Policy based personally identifiable information leakage prevention in cloud native enviroments
A system performs a method including: generating a posture of a first microservice in a microservice based network environment; implementing the posture of the first microservice at a sidecar of the first micro service; distributing the posture of the first microservice to a sidecar of a second microservice in the microservice based network environment; implementing the posture of the first microservice at the sidecar of the second micro service; and controlling communication of personally identifiable information between the first microservice and the second microservice based on the posture of the first microservice through either or both the sidecar of the first microservice and the sidecar of the second micro service. The posture of the first microservice includes an identification of one or more types of personally identifiable information that the first microservice is authorized to distribute and one or more types of personally identifiable information that the first microservice is authorized to receive.
CONTEXT-BASED PROTOCOL STACK PRIVACY
A method for use in a wireless transmit/receive unit (WTRU) for configuring a privacy protocol stack profile, including private addresses for the WTRU is described herein. For example, the WTRU may determine if it is in an unknown location and may set a profile of the WTRU to public network, and may set the MAC and IP addresses and other protocol identifiers to random, opaque and non-persistent. The method also includes receiving information about neighboring networks, which may then be used to determine profile options based on context of the neighboring networks. Available profile options based on the determination may be displayed and selected via a user input. Each layer of a protocol stack may be then instructed to use privacy and security settings based on the selected profile, which may include anonymous or random dynamic host configuration protocol (DHCP) parameters.