摘要:
Methods, apparatuses, computer program products, devices and systems are described that carry out receiving level-two encrypted data and at least one associated hash; storing the level-two encrypted data and at least one associated hash; and transmitting the level-two encrypted data and at least one associated hash in response to a request for at least one of the level-two encrypted data or the at least one associated hash.
摘要:
Methods, apparatuses, computer program products, devices and systems are described that carry out receiving level-one encrypted data including at least one associated encrypted identifier; encrypting with a level-two encryption key at least a part of the level-one encrypted data to produce level-two encrypted data; receiving a hash of the at least one associated encrypted identifier; associating the hash with the level-two encrypted data; and transmitting the level-two encrypted data and associated hash of the at least one associated encrypted identifier.
摘要:
Methods, apparatuses, computer program products, devices and systems are described that carry out accepting at least one identifier corresponding to a user having at least one instance of data for encryption; encrypting the at least one identifier corresponding to the user to produce at least one encrypted identifier, wherein the at least one encrypted identifier also corresponds to the at least one instance of data for encryption; and transmitting the encrypted identifier to an encryption entity.
摘要:
Disclosed herein are example embodiments for behavioral fingerprinting with retail monitoring. For certain example embodiments, one or more devices may: (i) communicate for at least one interaction related to a user of a user device in a behavioral fingerprint habitat; or (ii) administer at least an aspect of at least one interaction related to a user of a user device in a behavioral fingerprint habitat. However, claimed subject matter is not limited to any particular described embodiments, implementations, examples, or so forth.
摘要:
Disclosed herein are example embodiments for behavioral fingerprinting via inferred personal relation. For certain example embodiments, at least one indication of personal relation for at least one authorized user may be inferred via at least one user-device interaction, and the at least one indication of personal relation may be incorporated into at least one behavioral fingerprint that is associated with the at least one authorized user, with the at least one behavioral fingerprint including one or more indicators of utilization of one or more user devices by the at least one authorized user.
摘要:
Disclosed herein are example embodiments for environmentally-responsive behavioral fingerprinting. For certain example embodiments, one or more devices may: (i) obtain at least one environmental parameter relating to an event to potentially occur in conjunction with at least one user device; or (ii) perform at least one analysis for the event based at least partially on the at least one environmental parameter and at least partially on at least one utilization indicator of a behavioral fingerprint that is associated with the at least one user device. However, claimed subject matter is not limited to any particular described embodiments, implementations, examples, or so forth.
摘要:
Disclosed herein are example embodiments for behavioral fingerprinting via social network verification. For certain example embodiments, one or more devices may (i) detect at least one attempt to perform at least one task via at least one user device; and (ii) initiate transmission of at least one verification inquiry to one or more social network connections based at least partly on the at least one attempt to perform the at least one task via the at least one user device. However, claimed subject matter is not limited to any particular described embodiments, implementations, examples, or so forth.
摘要:
Methods, apparatuses, computer program products, devices and systems are described that carry out accepting from a user identifier encryption entity at least one encrypted identifier corresponding to a user having at least one instance of data for encryption; encrypting the at least one instance of data to produce level-one-encrypted data; associating the at least one encrypted identifier with the level-one-encrypted data, wherein a level-one decryption key for the level-one-encrypted data is inaccessible to the user identifier encryption entity; and transmitting the level-one-encrypted data and associated encrypted identifier.
摘要:
Disclosed herein are example embodiments for behavioral fingerprinting with adaptive development. For certain example embodiments, one or more devices may: (i) determine at least one indication of utilization for at least one authorized user via at least one user-device interaction; and (ii) incorporate at least one indication of utilization into at least one behavioral fingerprint that is associated with at least one authorized user, with the at least one behavioral fingerprint including one or more indicators of utilization of one or more user devices by the at least one authorized user. However, claimed subject matter is not limited to any particular described embodiments, implementations, examples, or so forth.
摘要:
Disclosed herein are example embodiments for behavioral fingerprinting with social networking. For certain example embodiments, one or more devices may: (i) communicate for at least one interaction related to a user of a user device in a behavioral fingerprint habitat; or (ii) administer at least an aspect of at least one interaction related to a user of a user device in a behavioral fingerprint habitat. However, claimed subject matter is not limited to any particular described embodiments, implementations, examples, or so forth.