Looking for breakthrough ideas for innovation challenges? Try Patsnap Eureka!

Preventing data manipulation using multiple aggregation servers

A technology for aggregating servers and data, applied in digital data protection, electronic digital data processing, usage of multiple keys/algorithms, etc., to achieve the effects of preventing fraud, protecting user privacy, and preventing fraudulent operations

Pending Publication Date: 2021-10-19
GOOGLE LLC
View PDF0 Cites 0 Cited by
  • Summary
  • Abstract
  • Description
  • Claims
  • Application Information

AI Technical Summary

Problems solved by technology

These communications may be intercepted and / or altered by entities other than the intended recipients

Method used

the structure of the environmentally friendly knitted fabric provided by the present invention; figure 2 Flow chart of the yarn wrapping machine for environmentally friendly knitted fabrics and storage devices; image 3 Is the parameter map of the yarn covering machine
View more

Image

Smart Image Click on the blue labels to locate them in the text.
Viewing Examples
Smart Image
  • Preventing data manipulation using multiple aggregation servers
  • Preventing data manipulation using multiple aggregation servers
  • Preventing data manipulation using multiple aggregation servers

Examples

Experimental program
Comparison scheme
Effect test

Embodiment Construction

[0029] In general, this document describes cryptographic techniques used to prevent fraud when determining event-level and aggregated network measurements. For example, the techniques described in this document can prevent fraud in determining event-level and aggregated impression and conversion measurements of digital components for various types of conversions. The cryptographic techniques described in this document may also protect user privacy, for example, by preventing all entities from being able to track or aggregate user data received from a user's client device.

[0030] System Overview

[0031] figure 1 is a block diagram of an example environment 100 in which an aggregation server 180 determines aggregated network measurements. The example environment 100 includes a data communications network 105, such as a local area network (LAN), a wide area network (WAN), the Internet, a mobile network, or combinations thereof. Network 105 connects client device 110 , publi...

the structure of the environmentally friendly knitted fabric provided by the present invention; figure 2 Flow chart of the yarn wrapping machine for environmentally friendly knitted fabrics and storage devices; image 3 Is the parameter map of the yarn covering machine
Login to View More

PUM

No PUM Login to View More

Abstract

Methods, systems, and apparatus, including a method for determining network measurements. In some aspects, a method includes receiving, by a first aggregation server and from each of multiple client devices, encrypted impression data. A second aggregation server receives, from each of at least a portion of the multiple client devices, encrypted conversion data. The first aggregation server and the second aggregation server perform a multi-party computation process to decrypt the encrypted impression data and the encrypted conversion data. Each portion of decrypted impression data and each portion of decrypted conversion data is sent to a respective reporting system.

Description

Background technique [0001] Client devices transmit data over a public network, such as the Internet. These communications may be intercepted and / or altered by entities other than the intended recipients. Additionally, the entities may forge network identities and send data that appears to originate from these forged network identities. An example of such forgery is a Sybil attack, in which an entity creates a network identity to undermine the reputation system of a peer-to-peer network. Contents of the invention [0002] This specification describes techniques related to determining network measurements in a manner that prevents fraud and preserves user privacy. [0003] In general, an innovative aspect of the subject matter described in this specification can be implemented in a method comprising: receiving, by a first aggregation server, presentation data from each of a plurality of client devices, for for each exposure of a recorded digital component, the exposure dat...

Claims

the structure of the environmentally friendly knitted fabric provided by the present invention; figure 2 Flow chart of the yarn wrapping machine for environmentally friendly knitted fabrics and storage devices; image 3 Is the parameter map of the yarn covering machine
Login to View More

Application Information

Patent Timeline
no application Login to View More
IPC IPC(8): G06F21/60G06F21/62G06F21/64G06F9/50
CPCG06F21/602G06F21/6245G06F21/64G06F9/5027G06F21/608H04L9/008H04L9/085H04L9/3257H04L2209/42H04L2209/46H04L9/0838H04L9/0825H04L9/14G06F21/62H04L9/0822
Inventor G.王M.M.M.扬
Owner GOOGLE LLC
Who we serve
  • R&D Engineer
  • R&D Manager
  • IP Professional
Why Patsnap Eureka
  • Industry Leading Data Capabilities
  • Powerful AI technology
  • Patent DNA Extraction
Social media
Patsnap Eureka Blog
Learn More
PatSnap group products