摘要:
Techniques for protecting non-public information in a mobile environment are provided. A request for non-public information about users in a mobile environment is received. Privacy policies, non-public and optional public information about the users affected by the request are determined. An optional privacy impact indicator is determined based on how satisfying the request increases the current public information about the users. Crowds of users having similar attribute name/values are optionally determined. User and optional requestor privacy policies which associate threshold release criteria such minimum crowd size, minimum consideration with the non-public information are determined. A privacy agreement is reached for the disclosure of the requested non-public information based on the compatibility of the requester and user privacy policies. Privacy protecting transformations are optionally determined and applied to create crowds or groups associated with the requested attribute.
摘要:
One embodiment of the present invention provides a system that detects malicious data in an ad-hoc network. During operation, the system receives data at a node in the ad-hoc network, wherein the data was sensed and redundantly communicated to the node by other nodes in the ad-hoc network. Note that in this ad-hoc network, a given node senses data associated with itself and with proximate nodes in the ad-hoc network. In this way, proximate nodes in the ad-hoc network can redundantly sense data about each other. Next, the system determines at the node if the received data, along with data sensed locally by the node, is consistent. If not, the system uses a model which accounts for malicious nodes to determine an explanation for the inconsistency.
摘要:
A system and method for providing a conjunctive keyword search over encrypted data is presented. A plurality of encrypted data is maintained. Each encrypted data includes a plurality of keyword fields that each contain a keyword. The keywords for the keyword fields are encrypted for each encrypted data. A capability is generated for two or more such encrypted keywords that includes a plurality of parameters defining a conjunctive keyword search. The capability is sent from a requestor to a server. The capability is applied to the encrypted keywords with the server to generate a result and the result is provided to the requestor.
摘要:
A system and method for generating privacy-enhanced aggregate statistics within a social network system is provided. Data is collected and processed to gather information to generate the aggregate statistics. A threshold is assigned. The threshold includes a criterion used in making a determination on what aggregate statistic will be generated. In some embodiments, the threshold is a numerical value. In some embodiments, the numerical value, or quantitative data is then translated into qualitative descriptors. In some embodiments, noise is then added to randomize the assigned threshold. In other embodiments, noise is added to the collected data. In some embodiments, checks to guard against attacks from adversarial users are performed. Examples of indications of adversarial behavior include, but are not limited to, manipulation of profiles, continuous manipulation of affinity groups, and manipulation of preferences for one or more users. The threshold is applied and aggregate statistics are generated.
摘要:
A method including obtaining search results for a search query, determining a type of the search query, calculating a degree of focus score for the search query when the type of the search query is a non-navigation type, determining one or more social annotations to provide for display along with the search results based on the degree of focus score, and providing the one or more social annotations for display with the search results.
摘要:
A system and method for predicting one or more sharing settings for a social network user is provided. The relevant user data is received and analyzed. Based on the analysis of the relevant user data, one or more of the user's desired sharing settings is predicted. In some embodiments, statistical analysis is used to analyze and/or predict the user's desired sharing settings. One or more predictions including a suggested sharing setting are generated. In one embodiment, the user's sharing settings are automatically adjusted based on the one or more predictions. In one embodiment, the one or more predictions are sent for display to the user. In one embodiment, feedback is obtained from the user accepting or rejecting the predictions. In one embodiment, the feedback is used to adjust one or more of the algorithms for analyzing the user data, predicting the user's desired sharing settings, or both.
摘要:
A system and method for generating user authentication challenges based at least in part on an account owner's social network activity information. A login request including an account owner's correct username and password as well as additional login information is received from a user. The login attempt is detected as a potentially fraudulent based on the additional login information from the user. The account owner's social network activity information is analyzed. An authentication challenge based at least in part on the account owner's social network activity information is generated and sent for display. The login request is allowed or denied based on the completion on the authentication challenge.
摘要:
A computer-implemented method for customizing a user display is disclosed. A user is identified based on user-provided information or user activity. The user's sharing activity is determined. A user type is identified based at least in part on the user's sharing activity and associated with the user. The user type is one of two or more user types related to a measure of the user's sharing activity. One or more of a content item and an annotation displayed to the user is customized based at least in part on the user's user type.
摘要:
Generating user authentication challenges based in part on preferences of one or more contacts of a user includes receiving an authentication request from a user. One or more contacts of the user associated with the authentication request are determined. One or more preferences of the close contact or contacts are determined. An authentication challenge based on the one or more preferences of one or more of the user's contacts is generated. The authentication request is allowed or denied based on the completion on the authentication challenge.
摘要:
A method including obtaining search results for a search query, determining a type of the search query, calculating a degree of focus score for the search query when the type of the search query is a non-navigation type, determining one or more social annotations to provide for display along with the search results based on the degree of focus score, and providing the one or more social annotations for display with the search results.