Patent classifications
H04L63/0421
System and method for machine-to-machine privacy and security brokered transactions
A machine-to-machine secure messaging system permits a first machine to send a message to a second machine, despite not knowing the addressing information (e.g., telephone number, IP address or other identifier) associated with the second machine. The system comprises an intermediary server with access to a database with information linking addressing information with other information related to the device, e.g., owner name, operator name and job title, etc., and facilitates a secure communication without the need for either party to the communication to know the other party's addressing information.
Systems and methods for efficient and secure temporary anonymous access to media content
A method for providing access to media content is performed at a device with a processor and memory storing instructions for execution by the processor. The method includes receiving, from a client device, a request for access to a media item. The method further includes obtaining user information associated with a user identifier corresponding to the request. Obtaining the user information includes, if the user identifier corresponds to a first type of user identifier, retrieving the user information from a database; and if the user identifier corresponds to a second type of user identifier different from the first type of user identifier, extracting the user information from the user identifier. The method further includes performing a media access operation based on the request and the user information associated with the user identifier.
In-vehicle media content monitoring and report generation
The invention provides a novel and unique system and method for cross channel in-vehicle identification of media, source, and consumption measurement and analysis. Real-time measurement and analysis of all applicable forms of media that a driver or passenger may consume inside of an automobile can be achieved. This includes AM/FM radio, Satellite Digital Audio Radio Service (SDARS), stored media such as CDs, MP3s & DVDs, streaming media, internet radio, audio books, podcasts, text-to-speech content, use of hands-free calling and other forms of audio, including content routed to the In Vehicle Entertainment (IVE) system through integration with a smartphone, media player or similar external Consumer Electronic (CE) device via wired or wireless connectivity, including but not limited to USB, Bluetooth, Wi-Fi, and the like, and also including integration platforms such as APPLE CARPLAY, GOOGLE ANDROID AUTO, HARMAN AHA RADIO, PANASONIC AUPEO, PIONEER ZYPR, FORD SYNC, MIRRORLINK, AIRBIQUITY CHOREO, and the like.
Providing anonymous network data to an artificial intelligence model for processing in near-real time
A device may receive, from a network device in near-real time, a packet of data associated with network traffic of a network, wherein the packet includes privacy-related data and network-related data. The device may read the privacy-related data from the packet. The device may generate anonymous data based on the privacy-related data, wherein the anonymous data obscures the privacy-related data. The device may generate a mapping between the anonymous data and the privacy-related data. The device may combine the anonymous data and the network-related data to generate a masked packet. The device may provide the masked packet to a server device. The device may receive, from the server device, data identifying a recommendation that is generated by processing the masked packet with an artificial intelligence model. The device may perform one or more actions based on the recommendation.
SAMPLING ACROSS TRUSTED AND UNTRUSTED DISTRIBUTED COMPONENTS
Techniques are described for sampling across trusted and untrusted distributed components. In accordance with embodiments, a first computing device receives a request from a second computing device, the first request including an operation identifier (ID) and a sampling ID that was generated by transforming a telemetry scope ID from a first value in a first domain to a second value in a second domain. The transformation may serve to anonymize and compress the telemetry scope ID. The first computing device determines whether or not to sample by comparing a ratio between the sampling ID and a size of the second domain with a sampling rate associated with the first computing device. The first computing device records telemetry about its processing of the first request in response to determining to sample and does not record any telemetry about its processing of the first request in response to determining not to sample.
AUGMENTED REALITY INFORMATION DISPLAY AND INTERACTION VIA NFC BASED AUTHENTICATION
Various embodiments are generally directed to improving card security by providing a user a contactless card with no sensitive card information, such as card number, card verification value, and expiration date, printed thereon, and displaying the sensitive card information relative to the card in augmented reality (AR) based on successful NFC-based user authentication. According to examples, the NFC-based user authentication may be performed by one-tapping or single tapping the contactless card to user mobile device. One or more portions of the sensitive card information may be obfuscated to further enhance card security. Moreover, the user can interact with AR elements including the sensitive card information to perform various actions.
ANONYMOUS DISTRIBUTED CONTACT TRACING AND VERIFICATION SYSTEM
An automated contact tracing system for anonymously identifying contacts between users includes at least a tracing server; and more than one mobile device or wearable of a user comprising means for short-range proximity communication and means for carrying out a computer program for generating Encounter-Tokens, when one user spent a pre-defined amount of time in a pre-defined proximity range of another user.
DYNAMIC USER BEHAVIOR RHYTHM PROFILING FOR PRIVACY PRESERVING PERSONALIZED SERVICE
Methods and apparatuses are described herein to identify the anonymous events which may belong to the same customer by providing inter-event virtual linkage sequence to link anonymous behavior data from multiple independent sessions. The behavior data may be encrypted without tracking or storing all other types of data such as contact information. An anonymous user may be identified and categorized based on rhythms of predictive behavior pattern sequences by extracting signatures the rhythms to provide fast content based search to identify one or more similar behavior event patterns from a set of data. The signatures may include multiple time series vectors, which may be matched to unique patterns. Personalized services may be offered to anonymous offer pools and may be based on event patterns categories defined and detected by customized rules. The application or game may use the data collection inter-session virtual link to pull the service offer.
METHOD AND APPARATUS FOR ANONYMOUS ACCESS AND CONTROL OF A SERVICE NODE
A method, apparatus and computer program product are provided for anonymous access and control of a service node. In the context of a method, the method includes causing the transmission of a privacy proxy URI in response to the privacy proxy URI request, and establishing a privacy connection with user equipment in response to receiving a request to connect including the URI. The URI is a portion of the privacy enabled URI based at least in part on the privacy proxy URI. The method further includes causing the transmission of a request message to a service node in response to receiving a request message from the user equipment through the privacy connection.
SYSTEMS AND METHODS FOR PRESERVING PRIVACY OF A REGISTRANT IN A DOMAIN NAME SYSTEM ("DNS")
Provided is a method of provisioning a named resource in a domain name system (“DNS”) with a registrar while preserving privacy of a registrant. The method includes obtaining, by a server of the registrar over a network, a request, from the registrant, to provision the named resource; determining, by at least one hardware processor of the server of the registrar, that the request requires additional handling by a privacy provider based on information in the request or information from the registrar; determining, by at least one hardware processor of the server of the registrar, a privacy provider from one or more privacy providers located in different geographic locations to service the request based on a location of the registrant; forwarding the request to the privacy provider; obtaining a cloaked identifier from the privacy provider; and provisioning the named resource in a database of a DNS registry using the cloaked identifier.