Abstract:
The disclosed computer-implemented method for securing data on blockchains may include receiving a smart contract from a third-party for a designated party and a data set, transmitting, to a network of nodes, a request to add the smart contract and the data set to an immutable distributed ledger, receiving a digital signature from the third-party, receiving a digital signature from the designated party, validating the smart contract, the digital signature from the third-party, and the digital signature from the designated party, and in response to validating the smart contract, the digital signature from the third-party and the digital signature from the designated party, adding the smart contract and the data set to the immutable distributed ledger. Various other methods, systems, and computer-readable media are also disclosed.
Abstract:
An online system receives information from an entity identifying a set of users of the online system and groups users included in the set into clusters based on their similarities using a clustering model or algorithm (e.g., k-means clustering) and based on one or more parameters specified by the entity. The online system generates expanded clusters that include additional users in one or more clusters based on similarities between the additional users and users in various clusters. If an additional user is included in multiple expanded clusters, the online assigns the additional user exclusively to an expanded cluster that best fits the user.
Abstract:
An online system receives impression data from one or more content publishers. The impression data describes impressions provided to users of the online system on behalf of an agent. The online system selects a randomly selected number of impressions in the received impression data. The online system generates an impressions block by encrypting impression data that describes the selected set of impressions using a unique cypher, and adds the impressions block to a blockchain. The online system further generates a cypher block by encrypting the cypher and an identifier of the impressions block to which the cypher applies using a public key provided by the agent to the online system. The online system adds the cypher block to the blockchain. The agent can recover the cypher from the cypher block based on a private key, and the agent can then recover the impression data using the recovered cypher.
Abstract:
The disclosed computer-implemented method may include (1) accessing, by a computing device and from a record stored in an immutable distributed ledger, information describing characteristics of a target audience, (2) ascertaining a target audience member identifier of a target audience member by matching information describing characteristics of the target audience member with the information describing characteristics of the target audience, (3) generating a unique and encrypted secure identifier linking an advertiser identifier to the target audience member identifier, and (4) committing the secure identifier to the immutable distributed ledger as an update transaction to the record. Various other methods, systems, and computer-readable media are also disclosed.