Patent classifications
G06F21/60
SCREEN SHARE FEATURE FOR ONLINE MEETINGS
In one aspect, an example methodology implementing the disclosed techniques includes, by a computing device, storing one or more encrypted files that are to be presented during an online meeting and receiving an acceptance to an invitation of the online meeting by at least one invitee of the online meeting. The method also includes, by the computing device, responsive to the acceptance of the online meeting invitation by the at least one invitee, sending the one or more encrypted files that are to be presented during the online meeting, wherein the invitee is prevented from accessing contents of the one or more encrypted files prior to a start of the online meeting.
Baseboard-management-controller storage module
A system including a baseboard management controller (BMC) and a socket is described. The BMC is configured to provide a management interface to a network device. The socket is configured to accept an edge connector of a removable storage card. The BMC is configured to access via the socket at least a portion of the firmware of the BMC stored on the removable storage card.
Baseboard-management-controller storage module
A system including a baseboard management controller (BMC) and a socket is described. The BMC is configured to provide a management interface to a network device. The socket is configured to accept an edge connector of a removable storage card. The BMC is configured to access via the socket at least a portion of the firmware of the BMC stored on the removable storage card.
Sharing grouped data in an organized storage system
A method including determining, by a device, a sharing decryption key based at least in part on an assigned private key associated with the device and a group access public key associated with a group; decrypting, by the device, a group access private key associated with the group by utilizing the sharing decryption key; and decrypting, by the device, encrypted content included in a folder associated with the group based at least in part on utilizing the group access private key associated with the group. Various other aspects are contemplated.
Multi-tenant storage
A system, apparatus and product comprising: a multi-tenant layer that comprises shared resources, wherein the shared resources are accessible to multiple tenants of the storage system, wherein the shared resources comprise shared logic resources and shared data resources; and multiple single-tenant layers, wherein each single-tenant layer is associated with a respective tenant of the multiple tenants, wherein each single-tenant layer comprises a database and business logic of the respective tenant, wherein a multi-tenant encryption scheme is configured to enable secure communications with the multiple tenants without divulging sensitive information to the multi-tenant layer.
Credential safety management for software containers
An example computer-implemented method of providing security for a software container includes discovering credentials that a software container is expected to use at runtime. The discovering is performed prior to instantiation of the software container from a container image, and is based on one or more of credentials stored in the container image, credentials stored in runtime configuration data for the software container, and credentials from a secrets management service. An unsafe credential set is determined that includes one or more of the discovered credentials that do not meet predefined credential safety criteria. A runtime request is intercepted from the software container. A credential violation is detected based on the intercepted runtime request attempting to use a credential from the unsafe discovered credential set. A corrective action is performed for the software container based on the detected credential violation.
Worldwide indirect to direct on-demand eye doctor support refraction system via a remote administration tool mobile application on any portable electronic device with broadband wireless cellular network technology 4G ,5G , 6G or Wifi wireless network protocols to interconnect both systems
The present disclosure describes clinical workflows, methods, and systems used to perform an indirect to direct subjective refraction to a patient with a mobile smartphone application that works as a encrypted remote administration tool in any portable electronic device and interconnect both systems via by 4G, 5G, 6G, or Wifi. According to various embodiments, an eye doctor may utilize a remote administration tool (RAT) or (RAS) remote access software application on a portable electronic device (PED) (smartphone, tablet, or laptop) to view and control the main control base (MCB) anywhere in the world to interconnect both systems. The eye doctor can perform an on-demand live subjective vision refraction via RAT technology. Furthermore, the eye doctor can control the (MCB) that can control, exam chair, digital phoropter, vision chart software, robotic phoropter arm, exam chair height, exam room lights, and near robotic chart arm anywhere in the world.
Implicit integrity for cryptographic computing
In one embodiment, a processor includes a memory hierarchy and a core coupled to the memory hierarchy. The memory hierarchy stores encrypted data, and the core includes circuitry to access the encrypted data stored in the memory hierarchy, decrypt the encrypted data to yield decrypted data, perform an entropy test on the decrypted data, and update a processor state based on a result of the entropy test. The entropy test may include determining a number of data entities in the decrypted data whose values are equal to one another, determining a number of adjacent data entities in the decrypted data whose values are equal to one another, determining a number of data entities in the decrypted data whose values are equal to at least one special value from a set of special values, or determining a sum of n highest data entity value frequencies.
System for authorizing rendering of objects in three-dimensional spaces
Systems and methods for authorizing rendering of objects in three-dimensional spaces are described. The system may include a first system defining a virtual three-dimensional space including the placement of a plurality of objects in the three-dimensional space, and a second system including a plurality of rules associated with portions of the three-dimensional space and a device coupled to the first system and the second system. The device may receive a request to render a volume of three-dimensional space, retrieve objects for the volume of three-dimensional, retrieve rules associated with the three-dimensional, and apply the rules for the three-dimensional space to the objects.
Methods and systems for creating, verifying, and entering security information
A system for securely producing and using high-entropy security information, such as a password. The system includes a printer, a display device, and a generator computer that is connected to the printer and the display device. The generator computer generates the high-entropy set of characters, (e.g., password), and also generates a machine-readable representation of the high-entropy set of characters, (e.g., a barcode). The generator computer causes the printer to print the high-entropy set of characters and the machine-readable representation on paper, and then deletes the high-entropy set of characters and the machine-readable representation from the system. The high-entropy set of characters, (e.g., password), may be entered into a target computer by scanning the barcode on the paper using a barcode scanner connected to the target computer, which is significantly faster than, and eliminates the human error associated with, typing in a high-entropy set of characters.