G06F7/08

Secure aggregate sum system, secure computation apparatus, secure aggregate sum method, and program

An aggregate sum is efficiently obtained while keeping confidentiality. A prefix-sum part computes a prefix-sum from a share of a sorted value attribute. A flag converting part converts a format of a share of a flag representing the last element of a group. A flag applying part generates a share of a vector in which a prefix-sum is set when a flag representing the last element of a group is true, and a sum of the whole is set when the flag is false. A sorting part generates a share of a sorted vector obtained by sorting a vector with a permutation which moves elements so that the last elements of each group are sequentially arranged from beginning. A sum computing part generates a share of a vector representing a sum for each group.

Secure aggregate sum system, secure computation apparatus, secure aggregate sum method, and program

An aggregate sum is efficiently obtained while keeping confidentiality. A prefix-sum part computes a prefix-sum from a share of a sorted value attribute. A flag converting part converts a format of a share of a flag representing the last element of a group. A flag applying part generates a share of a vector in which a prefix-sum is set when a flag representing the last element of a group is true, and a sum of the whole is set when the flag is false. A sorting part generates a share of a sorted vector obtained by sorting a vector with a permutation which moves elements so that the last elements of each group are sequentially arranged from beginning. A sum computing part generates a share of a vector representing a sum for each group.

System and method for trustworthy internet whitelists
11711371 · 2023-07-25 · ·

Information is received from a first networked device for a first user and from a second networked device for a second user. The first user and the second user are verified and registered. A first set of data for the first user and a second set of data for the second user that each specify one or more network parameters per network address that communicates with each user are received from a networked collector device. Addresses are selected from each of the first set and the second set where each of the one or more network parameters are above a first activity threshold level for that parameter. A first set and a second set of first level activity addresses are produced. A whitelist is generated for the first user from an intersection of the first set of first level activity addresses and the second set of first level activity addresses.

System and method for trustworthy internet whitelists
11711371 · 2023-07-25 · ·

Information is received from a first networked device for a first user and from a second networked device for a second user. The first user and the second user are verified and registered. A first set of data for the first user and a second set of data for the second user that each specify one or more network parameters per network address that communicates with each user are received from a networked collector device. Addresses are selected from each of the first set and the second set where each of the one or more network parameters are above a first activity threshold level for that parameter. A first set and a second set of first level activity addresses are produced. A whitelist is generated for the first user from an intersection of the first set of first level activity addresses and the second set of first level activity addresses.

METHOD, APPARATUS, AND SERVER FOR GENERATING HOTSPOT CONTENT
20180011933 · 2018-01-11 ·

A method, an apparatus and a server for generating hotspot content are provided. The method for generating hotspot content includes: acquiring a first keyword based on data relating to usage of a browser by a user; acquiring a second keyword based on information content crawled from an external website; and generating hotspot content based on the first keyword and the second keyword.

METHOD, APPARATUS, AND SERVER FOR GENERATING HOTSPOT CONTENT
20180011933 · 2018-01-11 ·

A method, an apparatus and a server for generating hotspot content are provided. The method for generating hotspot content includes: acquiring a first keyword based on data relating to usage of a browser by a user; acquiring a second keyword based on information content crawled from an external website; and generating hotspot content based on the first keyword and the second keyword.

Stitching event data using identity mappings

This disclosure involves stitching event data using identity mappings. An event analytics system generates and stores an event dataset including first event data for a first set of events associated with a user. The first event data includes timestamps and a device identifier. The system identifies second event data for a second event associated with the user. The second event data includes a timestamp, the device identifier, and a user identifier. The system appends the second event data to the event dataset. Based on the second event data, the system generates and stores an identity mapping that maps the device identifier to the user identifier. Asynchronously to generating and storing the event dataset, based on the identity mapping and a predetermined look-back window, the system updates the first event data to include the user identifier.

Stitching event data using identity mappings

This disclosure involves stitching event data using identity mappings. An event analytics system generates and stores an event dataset including first event data for a first set of events associated with a user. The first event data includes timestamps and a device identifier. The system identifies second event data for a second event associated with the user. The second event data includes a timestamp, the device identifier, and a user identifier. The system appends the second event data to the event dataset. Based on the second event data, the system generates and stores an identity mapping that maps the device identifier to the user identifier. Asynchronously to generating and storing the event dataset, based on the identity mapping and a predetermined look-back window, the system updates the first event data to include the user identifier.

Snap read optimization for media management for a memory sub-system

A plurality of entries associated with a media management operation for a plurality of transfer units are stored. A respective destination location for each of the respective transfer units are determined in connection with the garbage procedure such that a subset of the plurality of transfer units aligns with a codeword boundary on the memory page. A plurality of write commands in connection with the media management operation are issued based at least in part on the determining.

Snap read optimization for media management for a memory sub-system

A plurality of entries associated with a media management operation for a plurality of transfer units are stored. A respective destination location for each of the respective transfer units are determined in connection with the garbage procedure such that a subset of the plurality of transfer units aligns with a codeword boundary on the memory page. A plurality of write commands in connection with the media management operation are issued based at least in part on the determining.