Patent classifications
G06F21/106
Illegal content search device, illegal content search method, and program
The present disclosure relates to a search for illegal (illegitimate) content In particular, the present disclosure provides the search in an efficient manner by excluding pieces of presumed illegitimate content from the candidates of illegitimate content for comparing with legitimate content. The illegitimate content comprises content posted by an unauthorized user without a legitimate ownership of the content. An illegitimate content sensing device according to the present disclosure comprises a presumed illegitimate content deletion part for, on the basis of a profile of candidate illegitimate content, identifying pieces of the candidate illegitimate content having a profile which is within a degree of identicalness to a profile of previously identified illegitimate content as presumed illegitimate content.
System and method for concealing information associated with a physical mail package
A system and method for concealing information associated with a physical mail package. A standardized schema defining a set of roles is maintained. A public-private key pair is generated for each role. A dataset corresponding to the package is received, including data elements associated with the roles. Data access locations are assigned to each data element and encrypted using the public keys of the corresponding roles. machine-readable codes are generated for each encrypted access location and printed on the package. User devices associated with the roles can scan the codes and use the private keys to decrypt the access locations and obtain the data elements for their respective roles.
Systems and methods for localized file transfer with file degradation
Systems and methods for redeeming digital files are disclosed. In particular, the systems and methods relate to localized sharing of digital files such that the digital file is degraded when the file is redeemed. The digital file can include a plurality of bits, and bits of the digital file can be removed upon each transfer and/or access of the digital file. When a quantity of bits in the digital file falls below a predetermined threshold, the digital file can be deactivated. The systems can include an application that degrade the digital file. The degradation can include file compression, bitrate reduction, and/or removal of parity bits from the digital file. Security measures, such as private/public encryption keys, are also disclosed herein.
System and method for granting role-based access to a digital artifact
A system and method for immutably affixing one or more Unique-Numbers (N1-Nn) associated with one or more users and one or more roles (R1-Rn) associated with each user from the one or more users to a digital artifact (A1), rendering the digital artifact (A1) in a client application (C1), and provisioning the one or more users with role-based access to the digital artifact (A1). The method includes steps for registering a set of users by capturing biometric samples associated with each user from the set of users. Further, the method includes steps for immutably affixing one or more Unique-Numbers (N1-Nn) associated with one or more users and one or more roles (R1-Rn) associated with each user from the one or more users to a digital artifact (A1). Further, the method includes steps for provisioning a target user (U1.sub.t) with role-based access to the digital artifact (A1).
SYSTEMS AND METHODS FOR SECURITY-AWARE LARGE LANGUAGE MODEL TRAINING AND MODEL MANAGEMENT
In some examples, systems and methods for multiple-sensor object tracking are provided. For example, a method includes: receiving a model permission requirement; receiving a training corpus; segmenting the training corpus into a segmented training corpus based at least in part on the model permission requirement; training a machine learning model using the segmented training corpus; and associating the trained machine learning model with the model permission requirement.
ENABLING SECURE STORAGE AND SHARING OF IMAGES
The disclosed technology relates to using a blockchain to manage files and ownership thereof for a file sharing and storage service. The blockchain can also record and track edits to the files. The file sharing and storage service can automatically analyze the files to identify various visual features and subjects, and record metadata thereof to the blockchain.
SYSTEMS AND METHODS FOR IDENTIFYING AND MAPPING SENSITIVE DATA ON AN ENTERPRISE
Embodiments of the present invention provide techniques, systems, and methods for remote, agent-less enterprise computer threat data collection, malicious threat analysis, and identification and reporting of potential and real threats present on an enterprise computer system. Specifically, embodiments are directed to a system that securely identifies and maps sensitive information from computers across the enterprise. Secure and sensitive information may be internally encrypted and analyzed for indicators of compromise, threatening behavior, and known vulnerabilities. The remote, agent-less collection, analysis, and identification process can be repeated periodically to detect and map additional sensitive information over time, and may delete itself after completion to avoid detection.
Methods and systems for protecting digital content against artificial intelligence-based unauthorized manipulation of the digital content
A device may receive digital content and may process the digital content, with at least one of an optimization-based poisoning model or a statistical-based poisoning model, to generate at least one of first poisoning data or second poisoning data, respectively. The device may generate new digital content based on the digital content and the at least one of the first poisoning data or the second poisoning data. The device may provide the new digital content to one or more devices to be accessed by at least one deepfake model used to create fake digital content and may perform one or more actions based on the new digital content.
Systems and methods for identifying and mapping sensitive data on an enterprise
Embodiments of the present invention provide techniques, systems, and methods for remote, agent-less enterprise computer threat data collection, malicious threat analysis, and identification and reporting of potential and real threats present on an enterprise computer system. Specifically, embodiments are directed to a system that securely identifies and maps sensitive information from computers across the enterprise. Secure and sensitive information may be internally encrypted and analyzed for indicators of compromise, threatening behavior, and known vulnerabilities. The remote, agent-less collection, analysis, and identification process can be repeated periodically to detect and map additional sensitive information over time, and may delete itself after completion to avoid detection.
GOVERNING USAGE OF AN ARTIFICIAL INTELLIGENCE TECHNOLOGY
Techniques regarding the governing of use by a consumer of an artificial intelligence technology are described. For example, one or more embodiments described herein can comprise a system, which can comprise a memory that can store computer executable components. The system can also comprise a processor, operably coupled to the memory, and that can execute the computer executable components stored in the memory. The computer executable components can include an analyzing component that can, based on an artificial intelligence usage policy, analyze a proposed use by a consumer of an artificial intelligence technology, resulting in an analyzed use of the artificial intelligence technology. The computer executable components can further include a governing component that can, based on the analyzing, govern use by the consumer of the artificial intelligence technology.