Generating sequence of network data while preventing acquisition or manipulation of temporal data

A technology of time data and data, applied in the direction of digital data protection, electronic digital data processing, homomorphic encryption communication, etc., to achieve the effect of preventing fraud, protecting user privacy, and preventing fraudulent manipulation

Pending Publication Date: 2022-03-22
GOOGLE LLC
View PDF0 Cites 1 Cited by
  • Summary
  • Abstract
  • Description
  • Claims
  • Application Information

AI Technical Summary

Problems solved by technology

These communications may be intercepted and/or alt

Method used

the structure of the environmentally friendly knitted fabric provided by the present invention; figure 2 Flow chart of the yarn wrapping machine for environmentally friendly knitted fabrics and storage devices; image 3 Is the parameter map of the yarn covering machine
View more

Image

Smart Image Click on the blue labels to locate them in the text.
Viewing Examples
Smart Image
  • Generating sequence of network data while preventing acquisition or manipulation of temporal data
  • Generating sequence of network data while preventing acquisition or manipulation of temporal data
  • Generating sequence of network data while preventing acquisition or manipulation of temporal data

Examples

Experimental program
Comparison scheme
Effect test

Embodiment Construction

[0027] In general, this document describes cryptographic techniques used to prevent fraud when determining event levels and aggregating network measurements. For example, the technology described in this document prevents fraud when determining event levels and aggregate impressions and conversion measurements across digital components used for various types of conversions. The cryptography techniques described in this document may also protect user privacy, for example, by preventing all entities from being able to track or aggregate user data received from a user's client device.

[0028] System Overview

[0029] figure 1 is a block diagram of an example environment 100 in which an aggregation server 180 determines aggregated network measurements. The example environment 100 includes a data communications network 105, such as a local area network (LAN), a wide area network (WAN), the Internet, a mobile network, or combinations thereof. Network 105 connects client device...

the structure of the environmentally friendly knitted fabric provided by the present invention; figure 2 Flow chart of the yarn wrapping machine for environmentally friendly knitted fabrics and storage devices; image 3 Is the parameter map of the yarn covering machine
Login to view more

PUM

No PUM Login to view more

Abstract

Methods, systems, and apparatus, including methods for determining network measurements. In some aspects, a method includes receiving, by a first aggregation server, encrypted presentation data from each of a plurality of client devices. The second aggregation server receives encrypted conversion data from each of at least a portion of the plurality of client devices. The first aggregation server and the second aggregation server perform a multi-party computing process to generate a chronological sequence of encrypted presentation data and encrypted converted data, and decrypt the encrypted presentation data and the encrypted converted data.

Description

Background technique [0001] Client devices communicate data over a public network, such as the Internet. These communications may be intercepted and / or altered by entities other than the intended recipients. Furthermore, entities may forge network identities and send data that appears to originate from these forged network identities. An example of such forgery is a Sybil attack, in which an entity creates a network identity to undermine the reputation system of a peer-to-peer network. Contents of the invention [0002] This specification describes techniques related to determining network measurements in a manner that prevents fraud and preserves user privacy. [0003] In general, an innovative aspect of the subject matter described in this specification can be embodied in methods comprising: receiving, by a first aggregation server, impression data from each of a plurality of client devices, Wherein, for each presentation of a digital component recorded by a client devi...

Claims

the structure of the environmentally friendly knitted fabric provided by the present invention; figure 2 Flow chart of the yarn wrapping machine for environmentally friendly knitted fabrics and storage devices; image 3 Is the parameter map of the yarn covering machine
Login to view more

Application Information

Patent Timeline
no application Login to view more
IPC IPC(8): H04L9/00H04L9/32G06F21/60H04L9/08
CPCH04L9/008H04L9/3257G06F21/608H04L9/085H04L9/3297H04L2209/42H04L2209/46
Inventor G.王M.M.M.扬
Owner GOOGLE LLC
Who we serve
  • R&D Engineer
  • R&D Manager
  • IP Professional
Why Eureka
  • Industry Leading Data Capabilities
  • Powerful AI technology
  • Patent DNA Extraction
Social media
Try Eureka
PatSnap group products