G06F2221/2123

Shared image sanitization method and system

Methods and systems for removing sensitive information from a digital image. An instruction to share a digital image is received. It is then determined that the digital image contains a depiction of a corporate display medium that is classified as sensitive based on a policy and, based on the determination that the digital image contains the depiction of the corporate display medium that is classified as sensitive based on the policy, the digital image is processed to modify the depiction. The digital image is shared.

System & Method for Effectuating Data Countermeasures

A data privacy protection tool operates on behalf of a user to effectuate countermeasures and protections for selected portions of their privacy data as provided to a digital service provider (DSP) sites/apps. The countermeasure can be tailored to increase and/or incentivize compliance by DSPs with distribution or access rules for the user data.

SECURE ACCESS CONTROL FRAMEWORK USING DYNAMIC RESOURCE REPLICATION

Systems, computer program products, and methods are described herein for secure access control using dynamic resource replication. The present invention is configured to electronically receive, from a computing device of a user, a request to generate a resource access path to access a resource; determine one or more resource requirements associated with the resource; determine an authentication level associated with the user; initiate a resource replication engine on the one or more resource requirements and the authentication level associated with the user; determine, using the resource replication engine, that the one or more requirements and the authentication level associated with the user meets one or more conditions for a replication process; and generate, using the resource replication engine, the resource access path and a plurality of replicate resource access paths.

System & Method for Recommending Alternative Service Providers

An automated system tracks digital service providers (DSP) data management agreements, DSP behavior, and user behavior, individually and in aggregate, to determine recommended alternatives for content/service sites/providers than those used by a user. The alternatives are selected based on their scoring and congruency or compliance with a user's target privacy data treatment parameters.

Thermal imaging protection

Thermal imaging protection is provided by, in response to detecting input of an access code on an input device: identifying a sequence comprising the access code; generating a bait code based on the sequence; and outputting a heat signature corresponding to the bait code using heating elements, such as resistor arrays, included in the input device. In some embodiments protection includes measuring temperatures of contact surfaces of the input device where the access code has been input; and adjusting a heat level of the heating elements based on the temperatures measured. Protection is further provided by storing the bait code; and in response to receiving entry of the bait code, activating unauthorized access countermeasures. In some embodiments protection includes, in response to detecting subsequent input of the access code: generating a second, different, bait code based on the sequence; and activating the heating elements based on the second bait code.

System & Method for Effectuating User Access Control

A configurable, customizable privacy protecting software agent operates on behalf of a user to control the dissemination and use of the user's personal data. The software agent is guided by a personal/corporate privacy charter specified by the user (or an enterprise manager), which charter is adapted dynamically based on user and site conditions. The agent engages with digital service provider (DSP) sites/apps on users' behalf, and notifies them of privacy incompatibilities, issues, etc. associated with the DSPs, along with recommended alternatives if available or possible. The agent can also tag user data and monitor unauthorized uses to report on DSP compliance with user specified policies.

System & Method for Implementing a Digital Data Marketplace

An electronic market for user personal privacy data is defined, created and managed by an automated system. The market is configured to create value and demand for user data, and incentives that motivate users to share their data under a set of agreed constraints with digital service providers (DSPs).

System & Method for Implementing User Watermarks

A data privacy protecting tool operates on behalf of a user to watermark or otherwise fingerprint selected data provided to a digital service provider (DSP) sites/apps. The watermarked data can then be used to monitor a DSP's compliance with distribution or access rules for the user data.

METHOD OF SECURE DATA STORAGE AND TRANSFER
20220092200 · 2022-03-24 ·

A method of secure data transfer and storage using ae storage device storing encrypted information. The method uses a host that stores and transfers encrypted sensitive information and a customer that desires the information to be securely stored. The customer chooses a unique encryption code to encrypt sensitive information and uploads the information to a host. Then the host transfers the information to the storage device. Connections between the host and customer are intermittent and done so the storage device remains isolated from networks outside of the host.

Secure circuit integrated with memory layer
11836277 · 2023-12-05 · ·

A secure integrated circuit comprises a lower logic layer, and one or more memory layers disposed above the lower logic layer. A security key is provided in one or more of the memory layers for unlocking the logic layer. A plurality of connectors are provided between the one or more memory layers and the lower logic layer to electrically couple the memory layer(s) and lower logic layer.