Looking for breakthrough ideas for innovation challenges? Try Patsnap Eureka!

Method and system for privacy-preserving social media advertising

A sum and ciphertext technology, applied in the field of information security, can solve problems such as personal data leakage, misuse of personal data, and seller influence

Pending Publication Date: 2020-05-01
ROBERT BOSCH GMBH
View PDF6 Cites 0 Cited by
  • Summary
  • Abstract
  • Description
  • Claims
  • Application Information

AI Technical Summary

Problems solved by technology

Finally, the seller S Influencers must be trusted I will inadvertently misuse users U personal data or inadvertently disclose personal data to a malicious third party, as such a breach would have a negative impact on the seller
[0010] As mentioned above, in the prior art system 800, the user U Sellers must be trusted not only S , and must also trust the influencer, often unconsciously I

Method used

the structure of the environmentally friendly knitted fabric provided by the present invention; figure 2 Flow chart of the yarn wrapping machine for environmentally friendly knitted fabrics and storage devices; image 3 Is the parameter map of the yarn covering machine
View more

Image

Smart Image Click on the blue labels to locate them in the text.
Viewing Examples
Smart Image
  • Method and system for privacy-preserving social media advertising
  • Method and system for privacy-preserving social media advertising
  • Method and system for privacy-preserving social media advertising

Examples

Experimental program
Comparison scheme
Effect test

Embodiment Construction

[0039] For the purpose of promoting an understanding of the principles of the embodiments described herein, reference is now made to the drawings and description in the following written specification. No limitation on the scope of subject matter is intended by reference. This patent also covers any alterations and modifications of the illustrated embodiments, and further applications of the principles of the described embodiments as would normally occur to one skilled in the art to which this document pertains.

[0040] As used herein, the terms "isomorphic" and "homomorphic" refer to properties of some cryptographic systems that enable a computerized system to perform operations by using encrypted ciphertext data that The data, after decryption, produces a plaintext result that matches the result of the same operation if applied to the plaintext data. For example, in this paper we describe cryptosystems that provide additive isomorphisms, which enable a computer to combine ...

the structure of the environmentally friendly knitted fabric provided by the present invention; figure 2 Flow chart of the yarn wrapping machine for environmentally friendly knitted fabrics and storage devices; image 3 Is the parameter map of the yarn covering machine
Login to View More

PUM

No PUM Login to View More

Abstract

A method for operating an aggregator in an electronic commerce system includes receiving ciphertexts and signatures transmitted from multiple clients, each ciphertext encrypting noisy plaintext data of a category of information for a user that purchased a product, generating sums of the ciphertexts and the signatures, verifying the sum of the ciphertexts with a homomorphic signature system based on the sum of the signatures and homomorphic verification data, decrypting the sum of the ciphertexts in a private stream aggregation (PSA) process based on homomorphic decryption data to generate a sum of noisy plaintext data in response to a success of the verification, and identifying aggregate statistical information transmitted from the clients based on the sum of noisy plaintext data while preserving differential privacy of the clients.

Description

[0001] priority claim [0002] This application claims the benefit of U.S. Provisional Application No. 62 / 529,232, entitled "Architecture for Privacy-Preserving Social Media Advertising," and filed July 6, 2017, the entire contents of which are hereby expressly incorporated by reference incorporated into this article. [0003] cross reference [0004] This application is cross-referenced to co-pending U.S. Application No. 15 / 979,761, entitled "Post-Quantum Secure Private Stream Aggregation," and filed May 15, 2018, the entire contents of which are hereby incorporated by reference is expressly incorporated herein. technical field [0005] The present disclosure relates generally to the field of information security, and more particularly to systems and methods that generate aggregated data collected from multiple client computing devices while protecting the privacy of the client computing devices and Enables verification of the accuracy of aggregated data. Background tech...

Claims

the structure of the environmentally friendly knitted fabric provided by the present invention; figure 2 Flow chart of the yarn wrapping machine for environmentally friendly knitted fabrics and storage devices; image 3 Is the parameter map of the yarn covering machine
Login to View More

Application Information

Patent Timeline
no application Login to View More
IPC IPC(8): G06Q30/02H04L9/06H04L9/00
CPCH04L9/3093H04L9/3247G06Q30/0277G06Q2220/10H04L9/008H04L9/0618
Inventor D.贝克J.瓜哈尔多梅尔尚
Owner ROBERT BOSCH GMBH
Who we serve
  • R&D Engineer
  • R&D Manager
  • IP Professional
Why Patsnap Eureka
  • Industry Leading Data Capabilities
  • Powerful AI technology
  • Patent DNA Extraction
Social media
Patsnap Eureka Blog
Learn More
PatSnap group products