G06F21/00

Host side caching security for flash memory

Various examples are directed to systems and methods for managing a memory system. The memory system may generate a first encrypted physical address using a first clear physical address. The memory system may generate a first encrypted logical-to-physical (L2P) pointer indicating the first logical address and a first encrypted physical address. The memory system may send the first encrypted L2P pointer to a host device for storage at a host memory.

Secure distributed information system
11706033 · 2023-07-18 · ·

A method of sharing encrypted data includes, by an electronic device, receiving a password from a user to perform an action, receiving a salt value, generating a user key using the password and salt value, receiving an encrypted key location identifier value, decrypting the encrypted key location identifier value to obtain a key location identifier, receiving an encrypted read token value, decrypting the encrypted read token value using the user key to obtain a read token value, and transmitting the read token value and the key location identifier to a server electronic device.

Dynamic photograph classification

Embodiments of the present invention provide a computer system a computer program product, and a method that comprises identifying privacy data within received data by identifying markers that are indicative of privacy data within the received data; generating a respective classification of an object within the identified privacy data; assigning values to the generated respective classification of the object based on a perceived threat level associated with the identified privacy data; and in response to determining that the assigned value of the received data triggers an alert associated with a predetermined threshold for privacy, automatically preventing distribution of the received data from a computing device to another computing device.

Threat scanning transplanted containers

Techniques for threat scanning transplanted containers are described. A method of threat scanning transplanted containers may include generating a container map of running containers on a block storage volume mounted to a scanning instance of a threat scanning service, scanning the block storage volume by a scanning engine of the scanning instance, identifying at least one threat on the block storage volume, and identifying at least one container associated with the at least one threat using the container map.

Selective security regulation for network communication

Embodiments of the present invention provide a system for providing selective security regulations associated with network communications to users. The system is configured for extracting user data associated with a user, identifying one or more characteristics based on the extracted user data, generating a custom security package for the user based on the one or more characteristics, displaying one or more options associated with the custom security package on a user device of the user, prompting the user to select at least one option from the one or more options, receiving the at least one option from the user, and deploying a functionality associated with the at least one option from the custom security package.

DISTRIBUTED STORAGE AND USER VERIFICATION FOR VISUAL FEEDS
20230017234 · 2023-01-19 ·

A processing system including at least one processor may obtain, from a device of a requesting entity, a request to verify an identity of a user in a visual feed, obtain the visual feed from an endpoint device associated with the user, the visual feed including first visual biometric data of the user, and extract the first visual biometric data from the visual feed. The processing system may then retrieve second visual biometric data of the user from a plurality of distributed storage nodes, each storing a portion of the second visual biometric data, determine a match between the first visual biometric data and the second visual biometric data, and transmit the visual feed to the device of the requesting entity, where the visual feed includes an indication of an authentication of the user, in response to the determining the match between the first and second visual biometric data.

Multi-ring shared, traversable, and dynamic advanced database
11556468 · 2023-01-17 · ·

Examples of the present disclosure describe systems and methods for sharing memory using a multi-ring shared, traversable and dynamic database. In aspects, the database may be synchronized and shared between multiple processes and/or operation mode protection rings of a system. The database may also be persisted to enable the management of information between hardware reboots and application sessions. The information stored in the database may be view independent, traversable, and resizable from various component views of the database. In some aspects, an event processor is additionally described. The event processor may use the database to allocate memory chunks of a shared heap to components/processes in one or more protection modes of the operating system.

Multi-ring shared, traversable, and dynamic advanced database
11556468 · 2023-01-17 · ·

Examples of the present disclosure describe systems and methods for sharing memory using a multi-ring shared, traversable and dynamic database. In aspects, the database may be synchronized and shared between multiple processes and/or operation mode protection rings of a system. The database may also be persisted to enable the management of information between hardware reboots and application sessions. The information stored in the database may be view independent, traversable, and resizable from various component views of the database. In some aspects, an event processor is additionally described. The event processor may use the database to allocate memory chunks of a shared heap to components/processes in one or more protection modes of the operating system.

System and method for dynamic generation of URL by smart card

Embodiments of a smart card and systems and methods for secure data access using a smart card are described. The smart card may be formed a substrate and may include a microprocessor, a memory containing an applet, a counter, and a unique identifier. The smart card may dynamically generate a unique uniform resource location (URL) and transmit the URL to via a contactless communication interface to securely facilitate data access from other devices.

Information processing apparatus
11558356 · 2023-01-17 · ·

An information processing apparatus includes a processor configured to determine a relationship between a first user and a second user who exchange a message, determine propriety of personal information included in the message from the first user to the second user based on the determined relationship, and perform processing related to the personal information based on the determined propriety.