G06F2221/2113

Decentralized database optimizations

Techniques for managing data stored within a database, such as a decentralized database are provided. Some techniques involve managing some data within a lower-trust database and some other data within a higher-trust database. A higher-trust database may be a decentralize database including a blockchain. A lower-trust database may store references to data within the blockchain, and optionally other data in association with those references. Disclosed techniques include WHERE clause query handling in databases with reference values, replacement of distinct data in a relational database with a distinct reference to that data, number line storing for secure indexing, APIs for databases, and consensus operations for private blockchain networks.

Systems and processes for providing secure client controlled and managed exchange of data between parties
11610012 · 2023-03-21 · ·

In various embodiments, once the client registers onto the system, a third party (a “requestor”) may transmit a request to the client for the client to provide the requestor with access to the client data. In at least one embodiment, a requestor may be an entity or person that desires to utilize client data for the requestor's business purposes. In one embodiment, upon registration with the application, the system generates and assigns the requestor a requestor key. In one or more embodiments, the system transmits the requestor key along with each requestor request. In some embodiments, the client may accept or reject the requestor's request. In many embodiments, if the client accepts the requestor's request, the system grants the requestor access to the client data.

LESS-SECURE PROCESSORS, INTEGRATED CIRCUITS, WIRELESS COMMUNICATIONS APPARATUS, METHODS FOR OPERATION THEREOF, AND METHODS FOR MANUFACTURING THEREOF

An integrated circuit (122) includes an on-chip boot ROM (132) holding boot code, a non-volatile security identification element (140) having non-volatile information determining a less secure type or more secure type, and a processor (130). The processor (130) is coupled to the on-chip boot ROM (132) and to the non-volatile security identification element (140) to selectively execute boot code depending on the non-volatile information of the non-volatile security identification element (140). Other technology such as processors, methods of operation, processes of manufacture, wireless communications apparatus, and wireless handsets are also disclosed.

Secure red-black air-gapped portable computer
11481521 · 2022-10-25 · ·

A portable computer providing high level of security comprises of two completely logically and electrically isolated computer modules within one tamper resistant enclosure. One computer module is for Higher-Security applications (refer higher-security to as “red”) and the other is for Lower-Security applications such as email and internet (refer lower-security to as “black”). The two modules are coupled together to secure Peripheral Sharing Switch that enables intuitive user interaction while minimizing the security risk resulted from sharing same peripheral device.

MANAGEMENT APPARATUS, NON-TRANSITORY COMPUTER READABLE MEDIUM, AND MANAGEMENT METHOD
20230080738 · 2023-03-16 · ·

A management apparatus includes a processor configured to, in a case where setting information is transmitted to an information processing apparatus in which setting information concerning security of the information processing apparatus is remotely settable for each user, perform control so that setting information already set in the information processing apparatus is not updated.

Methods and systems for providing virtual desktop infrastructure via secure classified remote access as a service
11483293 · 2022-10-25 · ·

A virtual desktop infrastructure system includes a switch matrix and an end user device including a memory with instructions that when executed cause the system to initialize and configure the end-user device, establish a tunnel via the switch matrix, perform dependency verification, enforce a policy rule, and cause the end-user device to access the virtual desktop infrastructure via the tunnel. A method includes initializing and configuring the end-user device, establishing a tunnel via the switch matrix, performing dependency verification, enforcing a policy rule, and causing the end-user device to access the virtual desktop infrastructure via the tunnel. A non-transitory computer readable medium includes program instructions that when executed, cause a computer to initialize and configure the end-user device, establish a tunnel via the switch matrix, perform dependency verification, enforce a policy rule, and cause the end-user device to access the virtual desktop infrastructure via the tunnel.

Apparatus and method for configuring password and for releasing lock
RE049459 · 2023-03-14 · ·

Methods of configuring a different authority for a plurality of users to use at least one application in an electronic device. User inputs are received to set passwords for respective user levels, where each user level is associated with a different authority to access applications. The passwords are registered for the respective user levels. At least one application is associated with one of the user levels.

Method for authorizing operation permission of a statistical list

Disclosed is a method for authorizing operation permissions of statistical list, comprising a statistical list operation permission authorization step and a step to select an authorized object; said statistical list operation permission authorization step comprises the following steps: S1: selecting a statistical list that needs to be authorized, and displaying the names of columns in the statistical list that require operation permission control; S2: separately authorizing operation permission for each column; in the step to select an authorized object, selecting one or a plurality of authorized objects. The present invention can achieve separate authorization of the operation permissions of each column in a statistical list, increasing the range of applications of the statistical list, improving the fineness of system management, and truly meeting the requirements of usage during actual operation of enterprises and institutions. It is displayed that when a recent operator performs traceability and accountability in the event of a permission authorization error, the most recent operating time is displayed, making it easy to intuitively determine whether it is necessary to re-authorize the statistical list operation permission.

System and platform for enabling personal health data ownership

A system is disclosed for a platform that enables the biological owner of health data to manage and control access to their health data. In an embodiment, biological owners can take possession of their own health data. They control the level of access to their own health data by third parties through the use of data blurring to fit within specific data ranges. They also control access to their data through data encryption. In another embodiment, the biological owner of the health data can provide access to their health data to third parties through an auction system. Such access would be provided based on price, time duration of access, or quality of data, as determined by the biological owner of the health data. Additionally, such access could be provided by the system managing the health data access for the biological owner of the health data.

Configurable feature level controls for data

Methods and systems for providing configurable feature level controls for data. The data can be associated with data visualization and analysis in a distributed search engine environment. An example method comprises providing a user interface for enabling a selection of a type of access to grant for each feature of a plurality of features, the selection being on a feature-by-feature basis and the selection being assigned to selected roles; and in response to the selection of the type of access, automatically controlling the type of access to each of the features including determining whether a user has any role to which a particular feature has been assigned; and based on the determining, for users having any of the selected roles, permitting the type of access selected for the particular feature assigned to the selected roles. The types of access may comprise read-only, full, no access, or differing levels of access.