G06F2221/2115

Systems and methods for storing and sharing transactional data using distributed computer systems
11695578 · 2023-07-04 · ·

A computer system that interfaces with a blockchain is provided. The computer system receives match data for a match between a first data transaction request that is associated with a first identifier and a second data transaction request that is associated with a second identifier. Based on the match data, first and second blockchain transactions are generated. The first blockchain transaction is from a first identifier to an intermediary identifier and the second blockchain transaction is from the intermediary identifier to the second identifier. The first and second blockchain transactions are submitted to the blockchain. A further blockchain transaction is generated and submitted to the blockchain that includes a programmatic structure with a timer condition.

Methods and systems for data self-protection
11693981 · 2023-07-04 · ·

Systems and method are provided for data self-protection. The systems and methods may involve installing a sentry on a computer system, the sentry including a file system filter installed on a kernel of that computer system; providing a central sentry platform in communication with the sentry, operating the central sentry platform to send a data self-protection policy to the sentry, the data self-protection policy being encrypted so that it can only be modified by the central sentry platform; operating the file system filter to control access to encrypted data stored on the computer system, by, for each process making a file access request to the encrypted data, the file system filter receiving and handling that file access request according to the data self-protection policy; and, operating the central sentry platform to monitor the sentry and to receive information from the sentry regarding access to the encrypted data.

System enabling digital signature of a document in an online meeting
11695571 · 2023-07-04 ·

The system comprises a first data processing system, a second data processing system, and a server. The system further includes four screens. The first and third screen comprises a video stream and an audio stream. The second and fourth screen comprises a video stream displaying visual contents of a first document that is to be digitally signed by the first and second user. The first and second data processing systems are configured to receive a first and second unique signature from the first and second user, respectively, and add it to the first document. The server is configured to coordinate communication between the first and second data processing systems, record the visual contents of the first screen, the second screen, the third screen and the fourth screen, and store the recording.

MEMORY SYSTEM AND STORAGE SYSTEM
20230004311 · 2023-01-05 ·

According to one embodiment, a memory system includes a nonvolatile memory and a controller. The controller manages first account information to be used for authentication of a first account and second account information to be used for authentication of a second account. The controller receives third account information from a host device. When the third account information matches the first account information, the controller permits access to at least a partial storage area of the nonvolatile memory based on a request from the host device and transmits first data that includes the second account information to a first memory system.

AUTHENTICATION TO MEDICAL DEVICE VIA MOBILE APPLICATION
20230005592 · 2023-01-05 · ·

A medical system, device, and methods are provided having programming to communicate with a mobile device; the medical device further having programming to authenticate the mobile device; the medical device granting access to one or more functions if the mobile device is authenticated.

Card-personalization system

A personalized card may be generated using a card-personalization system accessible via multiple access points on a network. In some aspects, the personalized card may include a physical card having an image selected by a user in a card-personalization process. The user may be assigned a code that may both authenticate the user to access the card-personalization system and identify a position of the user in the card-personalization process. The card-personalization process may include a selection process for selecting an image, an approval process for approving the image, and a creation process for generating the personalized card including the image.

USER CONSENT FRAMEWORK
20220414255 · 2022-12-29 ·

Methods, systems, and apparatus, including an apparatus for managing user data according to user consent settings are described. In some aspects, a method includes determining that a request for transmission by a client device to a recipient will include user data of a user of the client device. In response determining that the request will include the user data, the method includes requesting, from a consent management module of the client device, current user consent settings specified by the user which define at least one of (i) user data that can be transmitted from the client device, (ii) how user data transmitted from the client device can be used or (iii) which recipients can receive and retain user data from the client device. The method further includes receiving, from the consent management module, the current user consent settings and generating request data according the current user consent settings.

SERVER-SIDE REDIRECT OF UNIFORM RESOURCE LOCATOR GENERATED BY CONTACTLESS CARD
20220414648 · 2022-12-29 · ·

Systems, methods, apparatuses, and computer-readable media for server-side redirect of uniform resource locators (URLs) generated by contactless cards. In one aspect, a server may receive, from a client, a first request comprising a uniform resource locator (URL), where parameters of the URL include a cryptogram and a customer identifier of an account associated with the contactless card. The server may decrypt the cryptogram and determine a context of the account based on one or more attributes of the account. The server may select, based on the decryption of the cryptogram and the determined context, a first redirect URL of a plurality of redirect URLs. The server may transmit, to the client, a response including the redirect URL. The server may receive, from the client, a second request including the redirect URL. The server may transmit, to the client, a response including a resource at the redirect URL.

Secret computation system and method

A secret computation system is a secret computation system for performing computation while keeping data concealed, and comprises a cyphertext generation device that generates cyphertext by encrypting the data, a secret computation device that generates encrypted basic statistics by performing secret computation of predetermined basic statistics using the cyphertext while keeping the cyphertext concealed, and a computation device that generates decrypted basic statistics by decrypting the encrypted basic statistics and performs predetermined computation using the decrypted basic statistics.

Pairing devices based on distance

Techniques disclosed herein relate to the pairing of a pairing initiator device and a pairing responder device for communication. The pairing initiator device and the pairing responder device range with each other to determine the distance between the pairing initiator device and the pairing responder device. Based on the distance being below a threshold distance, the pairing initiator device and the pairing responder device wirelessly pair with each other without further input from the user.