H04L63/0421

Systems and methods for creating priority-based regulated network interlinks between electronic devices

A system and method for creating priority-based regulated network interlinks between electronic devices is disclosed. The system receives a communication request from a first device to communicate with a second device and identifies whether the first device is comprised within a primary affinity group associated with the second device. If the first device is not found in the primary affinity group one or more secondary affinity groups are identified, each secondary affinity group associated with an electronic device different than the first and second devices. Based on scoring of each secondary affinity group, handling criteria for the communication object is determined and used to create a network interlink between the first device and the second device.

Detecting identified information in privacy firewalls
11509628 · 2022-11-22 · ·

Systems, methods and non-transitory computer readable media for detecting identified information in privacy firewalls are provided. A repeating field in a data collection may be analyzed to determine whether the field is likely to include information that identifies particular individuals. An access request of a user may be received. A permission record associated with the user may be accessed. In response to the field being likely to include information that identifies particular individuals and a first value in the permission record, access to the field may be denied, in response to the field not being likely to include information that identifies particular individuals and the first value in the permission record, access to the field may be provided, and in response to a second value in the permission record, access to the field may be provided.

SYSTEM AND METHOD FOR DISTRIBUTED STORAGE OF TRANSACTIONS
20220366381 · 2022-11-17 ·

For distributed storage of transactions initiated by an account holder, an account device generates and transmits a request for notaries via a communication network to a plurality of custodian devices. The request for notaries includes an open transaction part with non-encrypted transaction data and an anonymized identifier of the account holder, enabling the custodian devices to store the open transaction part linked to the anonymized identifier. The account device receives via the communication network from the custodian devices a set of appointed notary devices. The account device transmits a notarization request via the communication network to the appointed notary devices. The notarization request includes the open transaction part and an encrypted transaction part with encrypted transaction data, enabling the notary devices to store the encrypted transaction part and the open transaction part.

PRIVACY PRESERVING AUDITABLE ACCOUNTS
20230057898 · 2023-02-23 ·

An approach for privacy-preserving auditable accounts on blockchain networks. The approach may include encoding tokens associated with a blockchain network. The encoding may include data relating to the current epoch, where an epoch is a specific time range. The tokens may be received from a user for inspection by an auditing entity. The approach may include performing an audit check on the encoded tokens. If the audit check succeeds, the auditing entity may submit an audit transaction verifying the tokens were generated in the current epoch and making the tokens auditable for the next epoch.

PROTECTING ACCESS TO INFORMATION IN ONLINE INTERACTIONS
20220366084 · 2022-11-17 ·

This disclosure relates to preserving the privacy of users and preventing access to information of other entities. In one aspect, a method includes receiving, from a client device, a content request including request signals specifying user group identifiers that each identify a user group that includes a user of the client device. One or more user group identifiers that satisfy a first k-anonymity process are identified. Selection parameter elements that each include data indicating a respective digital component and a selection parameter for the respective digital component are received from one or more first content platforms. At least a portion of the selection parameters and, for each selection parameter, data identifying the first content platform from which the selection parameter was received are transmitted to a second content platform. Data specifying a given first content platform selected based on the selection parameters is received from the second content platform.

Systems and methods for responsive data transfer and anonymizing data using tokenizing and encrypting
11587076 · 2023-02-21 · ·

Described herein are systems and methods for securely obtaining payment information from a recipient on a payer's mobile device within an application on the payer's mobile device. The securely obtained information can be decrypted in the application, and the recipient information can be extracted. The extracted recipient information can be validated and used by the application to initiate a fund transfer to the recipient's account from the payer's account. The application can include a user interface that can allow the payer to anonymize the payment, securing the privacy of the payer.

Cyber security anonymizer

A cyber security system for providing security to a railway, the system comprising: a data monitoring and processing hub; a network comprising a plurality of data collection agents synchronized to a same network clock and configured to monitor railway infrastructure devices and onboard devices of rolling stock having a train communication network (TCN), and forward monitored data to the hub for processing by the hub to detect anomalies in railway operation that are indicative of a cyber-attack; at least one anonymizer configured to scrub information items from data that the hub receives from a data collection agent of the plurality of data collection agents which may be used to identify the cyber security system or the railway for which the system provides security.

Asset information collection apparatus

An asset information collection apparatus includes: a first reception part configured to cause a plurality of first servers to anonymize a plurality of items of asset information and to generate a plurality of items of anonymous asset information such that a specific individual cannot be identified based on the items of asset information when the items of asset information stored in the first servers are viewed by one or more user terminals, and configured to receive the items of anonymous asset information from the first servers; a second reception part configured to be for one or more users using the one or more user terminals and to receive one or more identifiers that is not capable of identifying a specific individual from the first servers; and a storage part configured to store the items of anonymous asset information in association with the one or more identifiers.

Systems and methods for mediating job applications between user devices and application tracking systems

A method and apparatus for mediating job applications between user devices and application tracking systems is described. The method may include accessing a job application web page served from an application tracking system. The method may also include rewriting at least a portion of the job application web page and one or more links within the job application web page to at least resolve at the real time proxy system and not an original target location of the one or more links. The method may further include serving a rewritten version of the job application web page from the real time proxy system to the user system, converting a response received from the user system to the rewritten version of the job application web page, and submitting the converted response to the application tracking system.

COORDINATED PRIVACY FOR TARGETED COMMUNICATIONS AND REPORTING

Disclosed herein are embodiments providing coordinated privacy for targeted communications and reporting. In particular, the embodiments provide a source user querying an information system to generally identify target users for a communication campaign. A privacy controller alters a first dataset of a query response by a first alteration quantity for transmission to the source user. The source user then generally identifies target users within the first dataset for development of a communication campaign of targeted communications directed to the target users. Subsequently, a reporting system generates a report with a second dataset detailing viewership by target users. The privacy controller alters a second dataset of a report by a second alteration quantity for transmission to the source user. The second alteration quantity is based on the first alteration quantity. Accordingly, for targeted communication campaigns, the privacy controller maintains individual privacy while also providing accurate reporting.