Patent classifications
G06F2221/2101
Automated association of media with occurrence records
A system, method and program storage device are provided for automatically associating evidence recorded by a plurality of cameras with a discrete occurrence, including: receiving occurrence data pertaining to the discrete occurrence and storing at least a portion of the occurrence data in an occurrence record; receiving first evidence data comprising at least a video data portion and a metadata portion of the evidence recorded by a first camera of the plurality of cameras and storing it in an evidence record; receiving second evidence data comprising at least a video data portion and a metadata portion of the evidence recorded by a second camera of the plurality of cameras and storing it in the evidence record; automatically associating information stored in the evidence record with information stored in the occurrence record based on a correspondence of at least two criteria including a first criterion of time; identifying, based on the automatic association, a first image data portion of the evidence recorded by the first camera that is related to the discrete occurrence while excluding a second image data portion of the evidence recorded by the first camera that is unrelated to the discrete occurrence; and identifying, based on the automatic association, a third image data portion of the evidence recorded by the second camera that is related to the discrete occurrence while excluding a fourth image data portion of the evidence recorded by the second camera that is unrelated to the discrete occurrence.
API and encryption key secrets management system and method
A hosted secrets management transport system and method for managing secrets at one or more offsite locations that facilitates secret flow, secret retrieval, and secret replication. The method includes defining boundaries for two or more sovereignties, each sovereignty having an independent master record and each sovereignty including two or more regions; defining a primary region within the two or more regions; accessing, within the primary region, a master record hardware security module that is a primary source of secrets; defining a second region; accessing, within the second region, a backup record hardware security module that is where data backups of the secrets from the master record hardware security module are created; and executing live replication from the master record hardware security module to the backup record hardware security module in which the live replication that supports multi-tenancy secret management of multiple distinct companies at the same time.
Security Techniques for Device Assisted Services
Security techniques for device assisted services are provided. In some embodiments, secure service measurement and/or control execution partition is provided. In some embodiments, implementing a service profile executed at least in part in a secure execution environment of a processor of a communications device for assisting control of the communications device use of a service on a wireless network, in which the service profile includes a plurality of service policy settings, and wherein the service profile is associated with a service plan that provides for access to the service on the wireless network; monitoring use of the service based on the service profile; and verifying the use of the service based on the monitored use of the service.
Systems and methods for managing content
Systems, methods, and non-transitory computer readable media are configured to determine a likelihood of a user choosing to reveal a given content item when contents of the content item are obscured. The likelihood can be determined based at least in part on a trained machine learning model. An extent by which to obscure the content item based at least in part on the likelihood can be determined. Subsequently, an obscured version of the content item can be provided for display. The content item can be obscured based at least in part on the determined extent.
Authentication, authorization and audit of digital assets using the blockchain
Computer-readable media, systems and methods may improve security, authorization, and auditability of documents. For example, computer systems for serving documents may be improved to provide secure access and control through challenges that are validated with self-executing on-chain document license contracts that enforce entitlements that specify users and their authorized document actions. Such entitlements may be generated by the user who created the document. As such, a user may retain over authorizations and document actions that are permissible with respect to the document even after the user has transferred a copy of the document. Furthermore, the computer systems may be improved to write an on-chain audit log of document actions, providing an immutable record of the document actions.
Method and system for detecting and remediating malicious code in a computer network
A cybersecurity solution that includes a system, method, or computer program for detecting and remediating malicious code in a communicating device on a computer network that connects to the Internet through a proxy server. The solution includes an operating system arranged to monitor all computing resource (CR) processes on an operating system kernel on the communicating device, determine process parameters for each CR process, determine whether each CR process is a connecting CR process by determining whether it is connecting to the proxy server, compare at least one of the process parameters for each connecting CR process with a whitelist, generate an event notification when at least one process parameter for a connecting CR process does not match the whitelist, and remediate the connecting CR process that has the at least one process parameter.
DATA MANAGEMENT AND GOVERNANCE SYSTEMS AND METHODS
This disclosure relates to, among other things, scalable data processing, storage, and/or management systems and methods. Certain embodiments disclosed herein provide for a data management architecture that allows for more secure storage of enterprise data, making it more secure, usable, and/or interoperable, facilitating data usage across information silos. Further embodiments provide for comprehensive data access authentication and/or authorization functionality between various services included in embodiments of the disclosed architecture.
Enforcing Trusted Application Settings for Shared Code Libraries
Access to a shared library API is restricted for a customer application by a security system. A profile for each of a plurality of trusted applications is generated and stored in a security database. When a customer application attempts to access the shared library API, the customer application is verified by extracting a customer application profile for the customer application, comparing the customer application profile with each stored trusted application profile, and verifying that the customer application can access the shared library API based on the comparison. Based on the verification, the customer application may be allowed to or access to the shared library API or may be prevented from accessing the shared library API.
DIGITAL SAFETY AND ACCOUNT DISCOVERY
Methods, computer-readable media, software, and apparatuses may assist a consumer in keeping track of a consumer's accounts in order to prevent unauthorized access or use of the consumer's identified subscriptions and financial accounts. The identified subscriptions and financial accounts may be displayed to the consumer along with recommendations and assistance for closing unused or unwanted financial accounts and subscriptions to prevent unauthorized access or use.
Methods and apparatus to collect distributed user information for media impressions and search terms
Disclosed examples include accessing impression data collected at a media device by a collector installed with an application, the impression data including a first identifier, a second identifier, and a media identifier, the first identifier to identify at least one of the media device or a user of the media device to a first database proprietor, and the second identifier to identify the at least one of the media device or the user of the media device to a second database proprietor, the collector to obtain the first and second identifiers from a memory of the media device; requesting first demographic information from the first database proprietor based on the first identifier and second demographic information from the second database proprietor based on the second identifier; and storing at least some of the first or second demographic information in association with the media identifier in a data store.