Patent classifications
G06F21/602
SCREEN SHARE FEATURE FOR ONLINE MEETINGS
In one aspect, an example methodology implementing the disclosed techniques includes, by a computing device, storing one or more encrypted files that are to be presented during an online meeting and receiving an acceptance to an invitation of the online meeting by at least one invitee of the online meeting. The method also includes, by the computing device, responsive to the acceptance of the online meeting invitation by the at least one invitee, sending the one or more encrypted files that are to be presented during the online meeting, wherein the invitee is prevented from accessing contents of the one or more encrypted files prior to a start of the online meeting.
Sharing grouped data in an organized storage system
A method including determining, by a device, a sharing decryption key based at least in part on an assigned private key associated with the device and a group access public key associated with a group; decrypting, by the device, a group access private key associated with the group by utilizing the sharing decryption key; and decrypting, by the device, encrypted content included in a folder associated with the group based at least in part on utilizing the group access private key associated with the group. Various other aspects are contemplated.
Multi-tenant storage
A system, apparatus and product comprising: a multi-tenant layer that comprises shared resources, wherein the shared resources are accessible to multiple tenants of the storage system, wherein the shared resources comprise shared logic resources and shared data resources; and multiple single-tenant layers, wherein each single-tenant layer is associated with a respective tenant of the multiple tenants, wherein each single-tenant layer comprises a database and business logic of the respective tenant, wherein a multi-tenant encryption scheme is configured to enable secure communications with the multiple tenants without divulging sensitive information to the multi-tenant layer.
Systems, methods, and apparatus for software defined silicon security
Methods, apparatus, systems and articles of manufacture (e.g., physical storage media) for software defined silicon security are disclosed. Example apparatus include a trusted agent determiner to (i) determine respective reputation scores associated with a plurality of agents in a mesh network, the plurality of agents associated with a plurality of semiconductor devices, respective ones of the semiconductor devices including circuitry configurable to provide one or more features, and (ii) select, based on the respective reputation scores, a first agent from the plurality of the agents to transmit a request to activate or deactivate at least one of the one or more features. Example apparatus also include an agent interface to, in response to the request, broadcast an activation or deactivation of the least one of the one or more features to the mesh network to cause the trusted agent determiner to update the reputation score of the first agent.
Worldwide indirect to direct on-demand eye doctor support refraction system via a remote administration tool mobile application on any portable electronic device with broadband wireless cellular network technology 4G ,5G , 6G or Wifi wireless network protocols to interconnect both systems
The present disclosure describes clinical workflows, methods, and systems used to perform an indirect to direct subjective refraction to a patient with a mobile smartphone application that works as a encrypted remote administration tool in any portable electronic device and interconnect both systems via by 4G, 5G, 6G, or Wifi. According to various embodiments, an eye doctor may utilize a remote administration tool (RAT) or (RAS) remote access software application on a portable electronic device (PED) (smartphone, tablet, or laptop) to view and control the main control base (MCB) anywhere in the world to interconnect both systems. The eye doctor can perform an on-demand live subjective vision refraction via RAT technology. Furthermore, the eye doctor can control the (MCB) that can control, exam chair, digital phoropter, vision chart software, robotic phoropter arm, exam chair height, exam room lights, and near robotic chart arm anywhere in the world.
Implicit integrity for cryptographic computing
In one embodiment, a processor includes a memory hierarchy and a core coupled to the memory hierarchy. The memory hierarchy stores encrypted data, and the core includes circuitry to access the encrypted data stored in the memory hierarchy, decrypt the encrypted data to yield decrypted data, perform an entropy test on the decrypted data, and update a processor state based on a result of the entropy test. The entropy test may include determining a number of data entities in the decrypted data whose values are equal to one another, determining a number of adjacent data entities in the decrypted data whose values are equal to one another, determining a number of data entities in the decrypted data whose values are equal to at least one special value from a set of special values, or determining a sum of n highest data entity value frequencies.
System and method for automatic persona generation using small text components
Systems and methods for automated and explainable machine learning to generate seamlessly actionable insights by generating explainable personas directly from customer relationship management systems are disclosed. The personas are defined as a collection of segments, scored by likelihood to generate good opportunities, accompanied ranked profile attribute importance, with descriptive names and summaries, associated human and database readable queries which have been generated to optimally find cluster candidates in a broader data universe. Such a system would effectively and accurately model the composition of past clients, perform the categorization in an explainable way such that actions can be taken on the information to have predictable results. What is further required are the mean to categorize small text components, trained over dependent and independent model sets, to enable a cleaner and more explicit representation of information rich short-strings, in order to facilitate a more meaningful representation of the user profiles.
System, method and application for transcoding data into media files
A data transcoding device includes a memory device for storing clear data containing private information and a processor configured as a data transcoder. The processor is configured to create packets of the clear data, prepare the packets for transcoding the clear data into an indecipherable multimedia data file appearing as noise, by determining properties of the indecipherable multimedia file based on parameters of the clear data. The processor is configured to generate the indecipherable multimedia file by transcoding the clear data based on the determined properties.
Controlling access to cloud resources in data using cloud-enabled data tagging and a dynamic access control policy engine
Access to data and resources in a multi-tenant computing system is managed by tagging the data and resources with attributes, as well as by tagging users with attributes. Tenant-specific access policies are configured. When an access request is received from a workload, a policy decision engine processes the attributes that are tagged to the requesting workload (e.g., user, application, etc.) as well as those tagged to the requested data or resource, given a relevant tenant-specific policy. An access decision is provided in response to the access request, and the access decision can be enforced by a tenant-specific enforcement system.
Method and system for securing and protecting a storage system that includes a removable storage device
A security solution having a system, a method, or a computer program for protecting contents in a target storage device that is arranged to be removable from a storage system having a unique combination of a system complex key (SCK) and a system identification (SID). The solution includes receiving a request to remove the target storage device from the storage system, where the storage system may have a plurality of storage devices each containing the identical combination of system complex key (SCK) and system identification (SID), and receiving a system complex key password (SCKP). The solution includes comparing the system complex key password (SCKP) to the system complex key (SCK) in the storage system, determining whether the system complex key password (SCKP) matches the system complex key (SCK) in the storage system, and suspending all read or write operations to the target storage device when the system complex key password (SCKP) matches the system complex key (SCK) in the storage system.