G06F21/602

Method and Processes For Securely Autofilling Data Fields in A Software Application
20180004584 · 2018-01-04 ·

The present invention gives the methods and processes for automatically servicing user driven requests to find place-holder fields, fill them in with relevant data in a secure manner and securely communicating the data related thereto to the appropriate Android™ device and/or application. More particularly, it relates to the methods and processes for authenticated users to automatically obtain and use the correct filled-in data that allows them to access or use any of a multiple number of Android™ applications and/or services at any time.

Apparatus and Method for Recording Data Associated with a Vehicle

The present invention provides to a recording apparatus and method for recording data, in particular video data associated with a vehicle. Video data are only recorded, as long as a predefined trigger event is true. Upon detecting such a trigger event, the trigger event is further analyzed and the recording of the video data is immediately stopped when it is detected that the trigger event is no longer valid. In this way, the recording of the video data can be limited for reducing the amount of video data to be stored. According to further embodiments, the amount of video data to be recorded can be further minimized by adapting the video frame rate, the resolution, and compression rate or color format of the video data.

ELECTRONIC AND PAPER COMBINED DATA SUBMISSION, PRINTING, AND RETRIEVAL METHOD AND ITS SYSTEM
20180004983 · 2018-01-04 ·

An electronic and paper combined data submission, printing, and retrieval method includes: completing an application in a client terminal, sending the user-entered data in the client terminal to a remote storage server; printing the completed application together with a barcode containing a unique identification code; retrieving the electronic data stored in the remote storage server by scanning said identification code. A system includes: a data encryption module; a data transmission module: an identification code module; a print module; a scan module; an analysis module; a data retrieve module; and a data decryption module.

PARALLEL AND HIERARCHICAL PASSWORD PROTECTION ON SPECIFIC DOCUMENT SECTIONS
20180004963 · 2018-01-04 ·

The present disclosure involves systems and computer implemented methods for protecting portions of electronic documents. An example method includes receiving a request for access to an electronic file having sections, at least one section encrypted using a first key based on a first password. A second key is generated in response to receiving a second password, wherein the second key is generated based on the second password. The second key is compared to the first key. If the second key is identical to the first key, the least one section of the electronic file encrypted using the first key is decrypted using the second key. The electronic file is then presented such that the section(s) previously encrypted using the first cryptographic key is made visible. If the second key is not identical to the first, the electronic file is presented with the encrypted section(s) obscured.

PROCESSORS, METHODS, SYSTEMS, AND INSTRUCTIONS TO SUPPORT LIVE MIGRATION OF PROTECTED CONTAINERS

A processor includes a decode unit to decode an instruction that is to indicate a page of a protected container memory, and a storage location outside of the protected container memory. An execution unit, in response to the instruction, is to ensure that there are no writable references to the page of the protected container memory while it has a write protected state. The execution unit is to encrypt a copy of the page of the protected container memory. The execution unit is to store the encrypted copy of the page to the storage location outside of the protected container memory, after it has been ensured that there are no writable references. The execution unit is to leave the page of the protected container memory in the write protected state, which is also valid and readable, after the encrypted copy has been stored to the storage location.

SYSTEMS AND METHODS FOR STORING AND SHARING TRANSACTIONAL DATA USING DISTRIBUTED COMPUTING SYSTEMS
20180006831 · 2018-01-04 ·

A computer system that interfaces with a blockchain is provided. The computer system receives match data for a match between a first data transaction request that is associated with a first identifier and a second data transaction request that is associated with a second identifier. A first blockchain transaction is generated based on the match data and stored to a blockchain. At least one further blockchain transaction is generates that splits the match into two different transactions—one between the first identifier and an intermediary and the second between the intermediary. These are recorded to the blockchain via the further blockchain transactions.

SECURE DATABASE BACKUP AND RECOVERY
20180012028 · 2018-01-11 ·

As disclosed herein a computer system for secure database backup and recovery in a secure database network has N distributed data nodes. The computer system includes program instructions that include instructions to receive a database backup file, fragment the file using a fragment engine, and associate each fragment with one node, where the fragment is not stored on the associated node. The program instructions further include instructions to encrypt each fragment using a first encryption key, and store, randomly, encrypted fragments on the distributed data nodes. The program instructions further include instructions to retrieve the encrypted fragments, decrypt the encrypted fragments using the first encryption key, re-encrypt the decrypted fragments using a different encryption key, and store, randomly, the re-encrypted fragments on the distributed data nodes. A computer program product and method corresponding to the above computer system are also disclosed herein.

Systems and methods for generation of secure indexes for cryptographically-secure queries

Systems and methods are disclosed for generation of a representative data structure. A computing device can receive data including various data items. The computing device can generate logical rows that include the data items. The computing device can convert the logical rows into nodes and store the nodes into logical rows of a first logical table. The computing device can generate logical rows for a second logical table including row identifiers and a link to one of the logical rows from the first logical table.

Spatial distribution in a 3D data processing unit
11709790 · 2023-07-25 · ·

The embodiments herein describe a 3D SmartNIC that spatially distributes compute, storage, or network functions in three dimensions using a plurality of layers. That is, unlike current SmartNIC that can perform acceleration functions in a 2D, a 3D Smart can distribute these functions across multiple stacked layers, where each layer can communicate directly or indirectly with the other layers.

RECORDING DATA AND USING THE RECORDED DATA

A method and system for recording data including content in a recording medium on a computer apparatus. First encrypted data, obtained by encrypting the data using a medium key created for each recording medium, is recorded in a recording medium. Second encrypted data, obtained by encrypting the medium key using a public key, is recorded in the recording medium. A private key corresponding to the public key is not recorded in the recording medium.