G06F21/62

DATA RISK OF AN INSTANCE
20230046959 · 2023-02-16 ·

Each instance environment of a plurality of computing instance environments is associated with its corresponding set of users belonging to one or more user groups, its corresponding processes, and its corresponding data access privileges. For at least one of the computing instance environments, database tables accessible by the corresponding computing instance environment are analyzed to determine whether each of the database tables includes data belonging to one or more sensitive data categories. Based at least in part on a result of the analysis determining whether each of the database tables includes data belonging to the one or more sensitive data categories, a data risk metric is determined for the corresponding computing instance environment.

SYSTEMS AND METHODS FOR PROVIDING A MULTI-PARTY COMPUTATION SYSTEM FOR NEURAL NETWORKS

A system and method are disclosed for secure multi-party computations. The system performs operations including establishing an API for coordinating joint operations between a first access point and a second access point related to performing a secure prediction task in which the first access point and the second access point will perform private computation of first data and second data without the parties having access to each other's data. The operations include storing a list of assets representing metadata about the first data and the second data, receiving a selection of the second data for use with the first data, managing an authentication and authorization of communications between the first access point and the second access point and performing the secure prediction task using the second data operating on the first data.

System for Dissemination of Sensitive Information
20230050924 · 2023-02-16 ·

The present disclosure provides a system for disseminating sensitive information. The system includes a software application which comprises a mobile application installed on a mobile device that enables a user to capture images, via a camera provided by the mobile device, of one or more documents which can then be subsequently uploaded to a remote database. The software application may also include a web-based application. The software application comprises a document checklist, document validation module, and an external communication module. After the electronic files are uploaded to the remote database the user may utilize the document validation module to cross-reference certain personal information is consistently disclosed within each of the one or more documents. The external communication module is configured to allow the user to select one or more electronic files from the remote database and electronically transmit the selected files to another party via an electronic facsimile (E-Fax).

AUTHENTICATION APPARATUS AND METHOD AND NON-TRANSITORY COMPUTER READABLE MEDIUM
20230046035 · 2023-02-16 · ·

An authentication apparatus includes a processor configured to: obtain information on a first authentication technique used by a user when the user requests authentication for a first service; and output information for presenting an additional authentication screen to a device used by the user for authentication if the first authentication technique does not satisfy a predetermined condition set for the first service, the additional authentication screen being used for requesting the user to perform additional authentication by using a second authentication technique different from the first authentication technique.

SEARCH QUERY REFINEMENT USING GENERATED KEYWORD TRIGGERS

Provided are systems and methods for automatic search query refinement. An example method commences with identifying a plurality of electronic sources of data content of an entity stored at different network-accessible locations. The content may be dynamically assigned fields based on criteria specified by the entity. Thereupon, a unified search interface may be provided to authorized users to search the content. A search query subsequently received from a user may be parsed. The method continues with determining, upon the parsing and based on predetermined rules, triggers associated with the search query. In some embodiments, the triggers include search triggers to be used for searching content, filter triggers to be applied for filtering search results, and structural triggers to be used for ranking the search results. The method further includes searching the content based on the triggers to retrieve the search results and providing the search results to the user.

DATA PROCESSING SYSTEMS AND METHODS FOR BUNDLED PRIVACY POLICIES
20230047653 · 2023-02-16 · ·

Data processing systems and methods, according to various embodiments, are adapted for determining an applicable privacy policy based on various criteria associated with a user and the associated product or service. User and product criteria may be obtained automatically and/or based on user input and analyzed by a privacy policy rules engine to determine the applicable policy. Text from the applicable policy can then be presented to the user. A default policy can be used when no particular applicable policy can be identified using by the rules engine. Policies may be ranked or prioritized so that a policy can be selected in the event the rules engine identifies two, conflicting policies based on the criteria.

SYSTEMS AND METHODS FOR MATCHING ELECTRONIC ACTIVITIES WITH RECORD OBJECTS BASED ON ENTITY RELATIONSHIPS

The present disclosure relates to systems and methods for matching electronic activities with record objects based on entity relationships. The method can include accessing a plurality of electronic activities, identifying an electronic activity, identifying a first participant associated with a first entity and a second participant associated with a second entity, determining whether a record object identifier is included in the electronic activity, identifying a first record object of the system of record that includes an instance of the record object identifier, and storing an association between the electronic activity and the first record object. The method can include determining a second record object corresponding to the second entity, identifying, using a matching policy, a third record object linked to the second record object and identifying a third entity, and storing, by the one or more processors, an association between the electronic activity and the third record object.

VARIABLE TRANSPORT DATA RETENTION AND DELETION

An example operation includes one or more of encrypting, by a transport, received data based on a first biometric associated with an occupant, unencrypting, by the transport, the encrypted data, based on a verification of a second biometric, wherein the second biometric is a continuum of the first biometric, and providing, by the transport, the unencrypted data to the occupant.

SECURITY MONITORING METHOD AND SYSTEM
20230049592 · 2023-02-16 ·

A monitoring method and system for secure conveying are provided. In a process of conveying a confidential document or item by a secure conveying device, a conveying path of the secure conveying device can be monitored in real time, and a distance between the secure conveying device and an accompanying person can also be monitored in real time. In a case where the secure conveying device neither deviates from a predetermined path nor is separated from the accompanying person, safe opening of the secure conveying device is ensured through a combination of open time, an open position, and open authorization information, thereby ensuring security of the confidential document or item conveyed by the secure conveying device.

CRYPTOGRAPHICALLY SECURE REQUEST VERIFICATION

This disclosure relates to data security and cryptography. In one aspect, a method includes updating a user interface of a client device to present user interface controls that enable a user to specify data privacy settings that define how entities collect, store, and use data of the user. The data security system receives a request to modify a data privacy setting for one or more entities from the client device based on user interaction with one or more of the user interface controls. The request includes an ephemeral user identifier for the user and an attestation token. The data security system validates the request using at least the ephemeral user identifier and the attestation token. The data security system transmits data instructing the entity to modify usage of the user data based on the modified given data privacy setting to each of the one or more entities.