G06F2221/2125

OBSCURING DATA WHEN GATHERING BEHAVIORAL DATA
20210150006 · 2021-05-20 · ·

A method for collecting data comprising: at a user device comprising a sensor, the user device being capable of detecting by means of the sensor interaction by a user with any of a plurality of predefined user interface elements: generating a raw dataset from sensor data collected by the sensor as a result of a user input, the user interface elements with which the user has interacted being derivable from the raw dataset and the raw dataset including finer-level sensor data indicating the manner of the user's interaction with those elements; forming an obscured dataset by processing the raw dataset to obscure which user interface elements the user has interacted with and retain at least some of the finer-level sensor data; and transmitting the obscured dataset to a remote computing device and/or storing the obscured dataset at the user device.

INDIRECT CONTROL FLOW INSTRUCTIONS AND INHIBITING DATA VALUE SPECULATION

There is provided an apparatus that includes input circuitry to receive input data and output circuitry to output a sequence of instructions to be executed by data processing circuitry. Generation circuitry performs a generation process to generate the sequence of instructions using the input data. The sequence of instructions comprises an indirect control flow instruction having a field that indicates where a target of the indirect control flow instruction is stored. The generation process causes at least one of the instructions in the sequence of instructions to store a state of control flow speculation after execution of the indirect control flow instruction. The at least one of the instructions in the sequence of instructions that stores the state of control flow speculation is inhibited from being subject to data value speculation by the data processing circuitry.

System, method, and apparatus for securely outputting sensitive information

Described herein are systems, methods, and apparatuses for securely outputting sensitive information. The systems, methods, and apparatuses may include accessing a data item using a computing device, determining that the data item contains sensitive information, and determining that the computing device is located in a public space. The data item, or a portion thereof, may be modified and the modified data item may be output.

Key throttling to mitigate unauthorized file access

A file system extension for an endpoint controls access to files by selectively decrypting files under certain conditions. Where a pattern of access to the files suggests malicious and/or automated file access activity, the file system extension may limit the rate of file access by regulating the rate at which decryption is provided to requesting processes.

Systems and methods for securing data
10929555 · 2021-02-23 · ·

Some embodiments of the present invention include an apparatus for securing data and include a processor, and one or more stored sequences of instructions which, when executed by the processor, cause the processor to set a data download threshold, encrypt data to be downloaded by a user based on detecting size of the data violating the download threshold such that the user receives encrypted downloaded data, and manage a decryption key used to decrypt the encrypted downloaded data. The decryption key may be deconstructed into N key fragments and may be reconstructed using K key fragments where N is equal to 2K1.

Data generation for data protection

A system includes identification of a data source of a production environment, the data source storing authentic data, generation of simulated data of the data source, reception of a request for data of the data source from a requesting system in the production environment and, in response to the received request, providing of the simulated data to the requesting system. In some aspects, the simulated data is provided to the requesting system if it is determined that the request is related to an electronic attack, and the authentic data of the data source is provided to the requesting system if it is not determined that the request is related to an electronic attack.

DATA TRANSMISSION WITH OBFUSCATION USING AN OBFUSCATION UNIT FOR A DATA PROCESSING (DP) ACCELERATOR
20210073041 · 2021-03-11 ·

According to one embodiment, a host communicates with a data processing (DP) accelerator using an obfuscation scheme. The DP accelerator receives a training request from a host, the training request includes an obfuscated data that includes one or more AI models and/or training input data. The DP accelerator de-obfuscates, by an obfuscation unit of the DP accelerator, the obfuscated data to obtain the one or more AI models. The DP accelerator trains the one or more AI models based on the training input data.

Online gaming platform voice communication system
10953332 · 2021-03-23 · ·

A method and system is disclosed that permits users of an online gaming platform to communicate via voice with other user in the online gaming platform.

Mitigation control of inadvertent processing of sensitive data

The innovation disclosed and claimed herein, in one or more aspects thereof, illustrates systems and methods for providing a technical control to a technically pervasive problem of inadvertent capture of items in a computing environment, returning control of what happens to such items in technical environments that have become widespread and intrusive. The innovation provides a system for users to control the types of items that pervasive computing environment elements may process without their express control and with technical countermeasures in a relatively unobtrusive manner.

MAINTAINING STATE OF SPECULATION

There is provided an apparatus including input circuitry that receives input data. Output circuitry outputs a sequence of instructions to be executed by data processing circuitry, at least some of the instructions being grouped into functions and generation circuitry performs a generation process to generate the sequence of instructions using the input data. The generation process causes at least one of the instructions in the sequence of instructions to store a state of control flow speculation performed during execution of the sequence of instructions and the stored state of control flow speculation is maintained between the functions.