Patent classifications
H04L63/0421
SYSTEM AND METHOD FOR DETECTING POTENTIALLY HARMFUL DATA
A method includes receiving electronic data, extracting a first identifier from the electronic data, extracting first attributes from the electronic data, and searching a database for identifiers that match the first identifier to determine a number of matching identifiers. The method also includes determining that the number of matching identifiers exceeds a first threshold and searching the database for attributes associated with each of the matching identifiers to determine a subset of matching attributes. The method further includes calculating a specificity for the subset of matching attributes, determining that the specificity of the subset of matching attributes is less than or equal to a second threshold, and creating a filter based at least in part on the determination that the specificity of the subset of matching attributes is less than or equal to the second threshold.
Data monetization and exchange platform
A system for providing a large set of data resources for nearly any client with a centralized collection of historical data, and a server through which changing datasets located on provider networks may be accessed through the system without having to upload them to the system. The system providers a marketplace for buying and selling of data, optionally including blockchain technology to allow for secure and/or anonymous transactions.
Systems and methods for anonymizing sensitive data and simulating accelerated schedule parameters using the anonymized data
An apparatus includes a memory, a communication interface in communication with a network, a first processor, and a second process different from the first processor. The first processor configured to receive data from a user device and to separate the data into a first data set including metadata associated with a user of the user device and a second data set including anonymized data associated with a set of actions to be performed on a predetermined schedule. The second processor is configured to receive the second data set from the first processor and a user input associated with a selection of a simulation and at least one additional action otherwise not included in the set of actions. The second processor configured to perform the simulation using the second data set to simulate an acceleration of the predetermined schedule as a result of the at least one additional action.
Data linkage across multiple participants
An example operation may include one or more of determining, by a supply-chain node, a plurality of assets of a supply-chain node, and executing, by the supply-chain node, a smart contract to: assign aliases to the plurality of the assets; and match the plurality of the assets with a plurality of assets of a different supply-chain node based on the aliases.
Anonymous contact tracing with network based hyperlocal authentication
A Network Based Hyperlocal Authentication (NBHA) system and method for anonymous contact tracing is described. The NBHA system and method operates as a background process, which is passwordless and continuously authenticates and performs cryptographic operations to secure communications between a wireless client device and a remote network component. A gateway includes a short-range wireless transmitter that transmits authentication credentials to the wireless client device having a short-range wireless receiver. The wireless client device uses the authentication credentials to authenticate to the remote network component. The network component then generates an exclusive local key for the wireless client device that is transmitted by the gateway. The client device application then requests cryptographic material from the remote network component. The client device application encrypts and decrypts communications to the network component with the cryptographic material and the exclusive local key. The wireless client device encrypts contact tracing data with the shared secret.
METHOD FOR ANONYMIZING MOVEMENT DATA
A method for anonymizing movement data of road users equipped with a position detection device involves collecting movement data in the form of individual time- and position-related data records and transmitting the collected movement data to a backend server. At least some data records are transmitted indirectly via at least one other vehicle, or the position or time reference in at least some data records is made noisy prior to the transmission.
Mission-critical push-to-talk
A user equipment is configured for concealment of a mission-critical push-to-talk (MCPTT) group identity in multimedia broadcast multicast services (MBMS). The UE is configured in particular to receive an indication of an MCPTT group pseudonym (7) which is a pseudonym for an MCPTT group identity (11) that identifies an MCPTT group of which the UE is a member. The UE may for example receive this indication from a group management server (GMS) or an MCPTT server. The UE in some embodiments may determine whether received control signalling (e.g., an MBMS subchannel control message) is for the MCPTT group of which the UE is a member, by determining whether the control signaling includes the MCPTT group pseudonym (7).
Privacy Preserving Validation And Commit Architecture
A method of scheduling and validating a multiple-participant process, the method including: submitting, by a submitting node associated with a participant in the multiple-participant process, a proposed transaction by sending a cryptographically-protected message to one or more recipient nodes, wherein the cryptographically-protected message includes at least an unencrypted submessage readable by an external node and a cryptographically-protected submessage to preserve privacy from at least the external node; determining, by the external node, an order of the proposed transaction relative to other transactions; by way of at least some of the recipient nodes, validating the cryptographically-protected message; receiving a confirmation of validity of the cryptographically-protected message from at least some of the recipient nodes; finalizing the proposed transaction, as a confirmed transaction, based on receiving one or more confirmations from at least some of the recipient nodes that satisfy a confirmation condition; and writing the confirmed transaction to a distributed ledger according to the order determined by the external node.
Cyber attack prediction based on dark IP address space network traffic to plural client networks
A service receives, from client computing devices of client networks, information regarding incoming network traffic addressed to dark Internet Protocol (IP) address spaces the of client networks. The service can predict a cyber attack based on the information received from the client computing devices of the client networks. The server computing device notifies the client computing device of each client network affected by the predicted cyber attack.
Tracking and analyses of content presentation
Systems and methods for providing services are disclosed. One aspect comprises authenticating a user associated with a first service, receiving a selection of a second service, generating an opaque identifier associated with the user and the first service, wherein the opaque identifier facilitates the anonymous collection of data relating to the second service. Another aspect can comprise transmitting the opaque identifier to the second service, and receiving data relating to the second service.