G06F2221/2137

SYSTEM AND METHOD FOR FACILITATING A VIRTUAL SCREENING

A system for facilitating a virtual screening is disclosed. The system identifies a user for participating in a virtual screening of media content. The system generates a unique link for the user to facilitate access to the media content. When the user interacts with the link, the system prompts the user to authenticate with the system and determines whether the authentication was successful. If authentication is successful, the link is associated with an identifier of the user and/or a user device. A request for a key for decrypting the media content and a request for a digitally signed file accessing the media content pursuant to parameters are made. If the digitally signed file is valid, the system applies a watermark to the media content to track the use of the media content and streams the media content to the user. Feedback on the media content is obtained from the user.

File containerization and management

This disclosure is directed to embodiments of systems and methods for containerizing files and managing policy data applied to the resulting containers. In some of the disclosed embodiments, a computing system determines that a file stored in storage medium is to be included in a container to be sent to at least one computing component associated with a device including a user interface. The computing system determines that the file is of a particular type and also determines code that can be used to access files of the particular type. The computing system combines the file and the code into the container such that container is configured to be executed by the at least one computing component so as to cause content of the file to be presented by the user interface. The computing system then sends the container to the at least one computing component. In some implementations, the container may further include policy information defining at least one of whether, how, where, when, or by whom the file can be accessed using the code. A communication link may be established between the computing system and the container at the at least one computing component and an instruction may be sent via the communication link that causes a change to the policy information.

Enforcing trusted application settings for shared code libraries

Access to a shared library API is restricted for a customer application by a security system. A profile for each of a plurality of trusted applications is generated and stored in a security database. When a customer application attempts to access the shared library API, the customer application is verified by extracting a customer application profile for the customer application, comparing the customer application profile with each stored trusted application profile, and verifying that the customer application can access the shared library API based on the comparison. Based on the verification, the customer application may be allowed to or access to the shared library API or may be prevented from accessing the shared library API.

Method for managing application program use time offline, and terminal device
11537408 · 2022-12-27 · ·

A method for managing an application and a terminal device. The method includes: launching an application in response to an operation on the application received from a user, wherein a time limit is preset for the application, displaying a notification indicating that a use duration of the application reaches the time limit and a time extension is requested at a predetermined moment before the time limit expires, displaying an interface for an identity authentication after the time extension is selected by the user, and extending the use duration of the application when an identity authentication of the user succeeds. Thus the use duration of the application is manageable and controllable.

STORING VITAL DOCUMENTS
20220405329 · 2022-12-22 ·

Methods, storage media, and systems for storing a vital document are disclosed. Some embodiments may include: logging, by a user, into an account, checking, by a processor, if the account contains at least one vital document, if the user had not uploaded the at least one vital document, prompting the user, by the processor, to upload the at least one vital document, displaying, on a display of a computer, the at least one vital document in a view-only mode and sharing the at least one vital document via email to a third-party recipient or via download to a local device using a one-time, password-encrypted, time-limited link.

Systems and methods for generating and facilitating access to a personalized augmented rendering of a user
11532134 · 2022-12-20 ·

Systems and methods for generating and facilitating access to a personalized augmented rendering of a user to be presented in an augmented reality environment are discussed herein. The augmented rendering of a user may be personalized by the user to comprise a desired representation of the user in an augmented reality environment. When a second user is detected within the field of view of a first user, the second user may be identified and virtual content (e.g., an augmented rendering) for the second user may be obtained. The virtual content obtained may differ based on one or more subscriptions for the first user and/or permissions associated with the virtual content of the second user. The virtual content obtained may be rendered and appear superimposed over or in conjunction with a view of the second in the augmented reality environment.

Impersonation for a federated user

Techniques for enabling impersonation without requiring an access manager (AM) controlling access to a computing resource to have direct access to user information. The AM receives an impersonation request for a first user to impersonate a second user, the request being received during a first session initiated by the first user. The second user has an access privilege that permits access to the computing resource. The AM causes information to be obtained from an identity provider, the information being stored in a location inaccessible to the AM and indicating whether the first user has been granted permission to impersonate the second user. An impersonation session is initiated based on determining, using the information obtained from the identity provider, that the first user has been granted permission to impersonate the second user. The initiating comprises switching a user associated with the first session from the first user to the second user.

METHOD, COMPUTER PROGRAM PRODUCT AND PROCESSING CIRCUITRY FOR MAKING MEDICAL DATA AVAILABLE TO THIRD PARTIES
20220391536 · 2022-12-08 ·

Medical data are made available to third parties. The server has a first interface through which digital storage agreement is obtained. The digital storage agreement authorizes storage of medical data relating to a user in a central database connected to the server. In response to the digital storage agreement, a second interface of the server sends a first data request to a primary server. The first data request causes the primary server to forward medical data relating to the user to the second interface. The server stores the obtained medical data in the central database. A third interface receives a data enquiry from a third party with a request for the medical data relating to the user stored in the central database. In response, the server checks if the user has authorized sharing. Only if the user has authorized sharing, the server forwards a copy of the medical data.

SEAMLESSLY SECURING ACCESS TO APPLICATION PROGRAMMING INTERFACE GATEWAYS
20220394039 · 2022-12-08 ·

Seamlessly securing access to application programming interface gateways includes receiving a request from a client for a token using which the client can make a call to an API. The request includes a client identifier identifying the client. In response to receiving the request, a call is made to the API for the token, and the token, including application credentials, are received from the API. In response to receiving the token, the token is encoded to include the encrypted client identifier and the encrypted application credentials. The encoded token is transmitted to the client.

Multi-factor authentication with URL validation

Techniques are provided for providing multi-factor authentication with Uniform Resource Locator (URL) validation (MFAUV). One of the multiple authentication factors used may include a unique, user-specific URL that is sent to the user within a message. In this way, the user may simply click on, or otherwise execute or select, the provided URL, directly from within the message in which the URL is provided.