摘要:
Disclosed is a multi-region data center connectivity solution for seamless integration between multi-region data center users and content. The solution supports user pinning (e.g., users and their personal content can be pinned to a particular geographical location/data center); protects personal content (e.g., personal content uploaded by a user is stored in that user's pinned geographical location/data center); and enables data sharing between multi-region data center users in a manner that is seamless and transparent to end users, while respecting user privacy, complying with data sovereignty requirements, and maintaining system anonymity.
摘要:
A router of a content centric network (CCN) can forward messages using anonymous identifiers. The router can receive an Interest via a first interface, and determines a first anonymous identifier (AID) that identifies a name-independent path to the Interest's source via the router. The router can identify a second interface for forwarding the Interest to a next-hop neighbor via CCN, and performs a bijective function on the first AID to obtain a second AID that is to be used by the next-hop neighbor to retum a corresponding data packet to the router. The router updates the Interest to include the second AID, and forwards the Interest via the second interface toward the next-hop neighbor. When the router receives the data packet, the router performs a lookup operation in an anonymous routing table (ART), based on the AID, to determine an interface for forwarding the data packet toward the Interest's source.
摘要:
A multiplexed demand signaled distributed messaging (MDSDM) system and method enables high capacity real-time messaging between application services by generating and utilizing innovative techniques for message management such as lanes, links and message distribution-related functionality.
摘要:
Methods, systems, apparatuses, and devices are described for access point privacy using media access control (MAC) address randomization. The access point may identify a MAC address for use with over-the-air (OTA) transmissions and a persistent MAC address for backend communications. The access point may communicate the OTA MAC address and the persistent MAC address to a wireless station. The access point and the wireless station may exchange data frames and perform MAC replacement techniques to map the OTA MAC address to the persistent MAC address. The persistent MAC address may provide for data routing, mobility management, etc., whereas the OTA MAC address may provide for privacy for the wireless transmissions.
摘要:
A pseudonymous proximity location device and methods of operating and/or interacting with the same are provided. The pseudonymous proximity location device is configured to provide meaningful information to authorized reading devices but useless information to non-authorized reading devices, thereby prohibiting the use of the pseudonymous proximity location device by unauthorized reading devices.
摘要:
Method and system is disclosed for communicating anonymously and obscuring a message origin. The method includes provisioning a first alias address of the finite plurality of alias addresses for a recipient device, transmitting a message to the originating device from the first alias address, receiving a message from the originating device addressed to the first alias address, identifying a real address associated with the first alias address within the database based upon an originating device's address and the first alias address, associating a second alias address of the finite plurality of alias addresses with the originating device having the second real address within the database, associating the received message from the originating device with the first real address and the second alias within the database, and transmitting the received message to the recipient device associated with the first real address using the second alias as an originating address.
摘要:
A multimedia content sharing system is described herein. The multimedia content sharing system enables users to share multimedia content online easily and securely. In some embodiments, the multimedia content sharing system is able to be utilized to generate and provide an online legacy. In some embodiments, the multimedia content sharing system utilizes PR codes and/or geotagging. In some embodiments, a private social media system is utilized in conjunction with the multimedia content sharing system.
摘要:
A system and method, network privacy enables end-users of a Network to have legal title or rights to all data knowingly or unknowingly transmitted while traversing a network and make individual determinations about privacy. The components may include fiber optic, copper wire, wireless satellite and or terrestrial data transport, network-level (TCP/IP) switches, an apparatus that anonymizes and redistributes user data to network data and service providers, an apparatus, system, software or process that maintains end-user security using any network- protocol, any encryption method or protocol, any anonymization method and a client Graphical User Interface ("GUI"). A client GUI, electronic communication or parcel enables network end-users to option out or option Into every field of end-user data that is defined and determined to be technically and contractually collectable by the network owner as represented to the end-user by the end-user and network owner agreement terms and conditions. An apparatus, system, software or process maintains end-user security where the end-user connects to the network using any network protocol, any encryption method or protocol and any anonymization method. An apparatus anonymizes and redistributes user data to network data and service providers that enable network data and service providers to obtain transmissions of end- user data on end-users that have optioned Into an agreement to enable the transmission of selected optioned end-user data, A data transport network enables data to be transmitted securely to and from the end-users, the apparatus that anonymizies and redistributes the end-users data and the network data and service providers. Private Communities of Trust may be infinitely replicated and use a Centralized Privacy Authority that administers ownership of end-user data by network users,
摘要:
A methodology to protect private data when a user wishes to publicly release some data about himself, which is correlated with his private data. Specifically, the method and apparatus teach combining a plurality of public data into a plurality of data clusters in response to the combined public data having similar attributes. The generated clusters are then processed to predict a private data wherein said prediction has a certain probability. At least one of said public data is altered or deleted in response to said probability exceeding a predetermined threshold.