Patent classifications
H04L63/0414
METHOD AND SYSTEM FOR PRIVACY PRESERVING INFORMATION EXCHANGE
Methods and system for privacy preserving information exchange in a network of electronic devices are disclosed. In one embodiment, a method is implemented in an electronic device to serve as a local party for information exchange between the local party and another electronic device to serve as an aggregator. The method includes storing a plurality of values in a 2D vector, where a first dimension of the 2D vector is based on the number of values, and where each position in the first dimension has one unique value. The method further includes transmitting the 2D vector to the aggregator with masking for the aggregator to prevent the aggregator from decoding the 2D vector, where aggregating the masked 2D vector with masked 2D vectors from other local parties allows decoding of the aggregated 2D vector.
NETWORK ACCESS AUTHENTICATION PROCESSING METHOD AND DEVICE
Embodiments of the present disclosure provide a network access authentication processing method and device. The method includes: receiving a confirmation message sent by user equipment, the confirmation message carrying a first signature token generated by the user equipment according to a first Privacy enhanced Mobile Subscriber Identifier (PMSI); verifying whether the first signature token is valid; and when the first signature token is invalid, obtaining the PMSI to perform network access authentication on the user equipment.
System and method for virtual currency remittance
[Object] The object is to present a technical solution for a bank to disclose information on a deposit account directly to a third party. [Solution Means] The owner of a virtual currency address or real-currency deposit account provides a disclosure key to a disclosee (third party). The third party accesses a disclosure server 6 by operating a disclosee terminal 7, and transmits a disclosure request with the disclosure key. The disclosure server 6 accesses to an opener bank server 1, 8, acquires the virtual currency address owner information or the instant real-currency deposit account balance information, transmits it to the disclosee terminal 7, and make it browsable on the disclosee terminal 7.
Automated monitoring of proximate devices
Aspects of the disclosure relate to an automated monitoring of proximate devices. A computing platform may cause a reporting device to detect a target device in a local network, retrieve network data associated with the target device, and send, to an intermediate server, the network data. The computing platform may send, to the intermediate server, a query. The intermediate server may send the network data in response to the query. Based on the network data, the computing platform may determine an amount of time that has elapsed since network activity was previously detected for the target device, and based on a determination that the amount of time exceeds a predetermined time threshold, the computing platform may generate an alert notification indicating that the target device may need to be traced. Subsequently, the alert notification may be sent to the reporting device.
RANDOM MEDIA ACCESS CONTROL ADDRESS WITH FAST RECONNECTION MECHANISM
The present invention provides a wireless communication method of an access point. The wireless communication method comprises the steps of: establishing a cache table comprising a plurality of reference MAC and corresponding PMKs and reference PMKIDs; receiving an association request from a station; reading a MAC address of the station and a PMKID from the association request; if the MAC address of the station and the PMKID do not match items of the cache table, performing a calculation on the PMKID to obtain an original PMKID; determining if the original PMKID matches any one of the reference PMKIDs within the cache table; and if the original PMKID matches one reference PMKID within the cache table, determining that the reference MAC recorded in the cache table and the MAC address belong to the same station.
METHODS AND APPARATUS TO COLLECT DISTRIBUTED USER INFORMATION FOR MEDIA IMPRESSIONS AND SEARCH TERMS
Disclosed examples include accessing a search term from a client device; accessing a first identifier, the first identifier corresponding to a first database proprietor, the first identifier to access first user information corresponding to a user of the client device; accessing a second identifier, the second identifier corresponding to a second database proprietor, the second identifier to access second user information corresponding to the user of the client device; providing the search term, the first identifier, and the second identifier in a message; and transmitting the message to a server.
ROTATING INTERNET PROTOCOL ADDRESSES IN A VIRTUAL PRIVATE NETWORK
A method including receiving, at a first VPN server during an established VPN connection, a first data request and a second data request from a user device; transmitting, by the first VPN server during the established VPN connection, the first data request and the second data request to a second VPN server; and receiving, by the first VPN server from the second VPN server during the established VPN connection, first data associated with the first data request and second data associated with the second data request, the first data being retrieved by the second VPN server using a first exit IP address associated with the second VPN server and the second data being retrieved by the second VPN server using a second exit IP address associated with the second VPN server, the second exit IP address being different from the first exit IP address. Various other aspects are contemplated.
Data privacy plug-in for enterprise instant messaging platform
A plug-in module, which, in combination with a host module, prevents unauthorized copying—like screen captures, screenshots, or screen recordings—of the streaming content provided to a participant in an online content-sharing session via an Instant Messenger (IM) service. The plug-in module may be a part of an IM application running on the participant's system or the host module may transmit a self-installing plug-in module to the participant's system upon receiving an indication that a user is hosting the online session. The plug-in module provides kernel-specific interface of the participant system's Operating System (OS) to the host module, which, then sends an OS-specific instruction to the plug-in module to trigger the OS to disable or control the copying of the streaming content as specified in a privacy preference received from the user hosting the online session. In this manner, sensitive and critical business data may be conveniently and securely shared online.
Data security classification sampling and labeling
Cybersecurity and data categorization efficiency are enhanced by providing reliable statistics about the number and location of sensitive data of different categories in a specified environment. These data sensitivity statistics are computed while iteratively sampling a collection of blobs, files, or other stored items that hold data. The items may be divided into groups, e.g., containers or directories. Efficient sampling algorithms are described. Data sensitivity statistic gathering or updating based on the sampling activity ends when a specified threshold has been reached, e.g., a certain number of items have been sampled, a certain amount of data has been sampled, sampling has used a certain amount of computational resources, or the sensitivity statistics have stabilized to a certain extent. The resulting statistics about data sensitivity can be utilized for regulatory compliance, policy formulation or enforcement, data protection, forensic investigation, risk management, evidence production, or another classification-dependent or classification-enhanced activity.
Information processing apparatus
An information processing apparatus includes a processor configured to determine a relationship between a first user and a second user who exchange a message, determine propriety of personal information included in the message from the first user to the second user based on the determined relationship, and perform processing related to the personal information based on the determined propriety.