Patent classifications
G06F2221/2145
MULTI-CLUSTER ACCESS
Disclosed herein are system, method, and computer program product embodiments for multi-cluster access. In some embodiments, the server receives a first request to bind one or more cluster roles associated with a user to each of one or more secondary computing clusters. The server binds the user's credentials with the one or more cluster roles corresponding to each of one or more secondary computing clusters. Furthermore, the server receives a second request for providing the user access to the primary computing cluster. Moreover, the server receives a third request from the user interface intended for at least one secondary computing cluster. The server forwards the third request to the at least one secondary computing cluster while impersonating at least one cluster role of the one or more cluster roles corresponding to the at least one secondary computing cluster.
SYSTEMS AND METHODS FOR PROTECTING AND GOVERNING GENOMIC AND OTHER INFORMATION
Trusted, privacy-protected systems and methods are disclosed for processing, handling, and performing tests on human genomic and other information. According to some embodiments, a system is disclosed that is a cloud-based system for the trusted storage and analysis of genetic and other information. Some embodiments of the system may include or support some or all of authenticated and certified data sources; authenticated and certified diagnostic tests; and policy-based access to data.
KEY PERMISSION DISTRIBUTION
Techniques are disclosed relating to the distribution of database key permissions. A database system may distribute first permission information to a plurality of database nodes that identifies a distribution of key range permissions to ones of the plurality of database nodes. A given key range permission being distributed to a given database node may permit that database node to write records whose keys fall within a key range associated with the given key range permission. The database system may receive, from a first database node, a request for a first key range permission provisioned to a second database node. The database system may modify the first permission information to derive second permission information that provisions the first key range permission to the first database node instead of the second database node. The database system may distribute the second permission information to ones of the plurality of database nodes.
Virtualized file server user views
In one embodiment, a system for managing a virtualization environment includes a plurality of host machines, wherein each of the host machines comprises a hypervisor and one or more user virtual machines (user VMs), and a virtual machine controller, one or more virtual disks comprising a plurality of storage devices, a virtualized file server (VFS) comprising a plurality of file server virtual machines (FSVMs), wherein each of the FSVMs is running on one of the host machines. The VFS may be configured to receive a request for storage system information from a user and generate and send a response to the request, wherein the response is customized according to configuration information of the VFS that is specific to the user. The storage system information requested may include a total size of storage available to the user, and the user may have an associated storage quota limit.
SYSTEMS AND METHODS FOR PROVIDING A COLLABORATION WORK MANAGEMENT PLATFORM THAT FACILITATES DIFFERENTIATION BETWEEN USERS IN AN OVERARCHING GROUP AND ONE OR MORE SUBSETS OF INDIVIDUAL USERS
Systems and methods for providing a collaboration work management platform that facilitates differentiation between users in an overarching group and one or more subsets of individual users within the overarching group to enable the users within the individual subsets to use the collaboration work management platform differently users within the other subsets, the method being implemented by a computer system including one or more physical processors configured by machine-readable instructions are disclosed. Exemplary implementations may: manage environment state information for maintaining a collaboration environment.
Method of access to a local service of a device communicating via a terminal
A method of access to a local service of a device communicating via a terminal, the method comprising steps of: access to the service via an access terminal by a communicating device; reading by the access terminal of data of the communicating device, the data being personal data relating to the communicating device and/or third-party service data; writing by the access terminal of the data of the communicating device, the third-party data written being chosen from among a set of third-party service data, the choice of the third-party data to be written by the access terminal being dependent on the choosing criteria.
Implementing access control by system-on-chip
Systems and methods for implementing access control by systems-on-chip (SoCs). An example SoC may comprise an access control unit employed to: receive a message comprising an access control data item; validate the message using a value of a message digest function of contents of the message and a value of a state variable reflecting a state of communications between the access control unit and a programming agent that has initiated the message, wherein the value of the state variable is derived from a previous value of the message digest function calculated within a current communication session between the access control unit and the programming agent; update the state variable using the value of the message digest function of the contents of the message; and control, using the access control data item, access by an initiator device to a target device.
Media transit management in cyberspace
An embodiment for media transit management is provided. The embodiment may include receiving one or more images and one or more pre-set configuration criteria regarding management of an image file. The embodiment may also include monitoring for an attempted sharing of the image file. The embodiment may further include in response to determining each object in the one or more images matches each object in the image file, identifying at least one other user who is attempting to share the image file. The embodiment may also include in response to determining the at least one other user is not authorized to share the image file, analyzing the one or more pre-set configuration criteria correlated with the image file. The embodiment may further include in response to determining the image file does not meet the one or more pre-set configuration criteria, prompting the participating user to respond to a notification.
PERMISSION DELEGATION FRAMEWORK
A mobile device includes a memory having at least one delegated administrator stored thereon, the delegated administrator is configured to apply a policy to the mobile device based on at least one permission a delegated administrator configured to apply a policy to the mobile device based on the at least one permission. The mobile device also includes at least one processor having a mobile device management (MDM) framework. The MDM framework receives the at least one permission from the device administrator, delegates the at least one permission to the delegated administrator, and enforces the policy on the mobile device.
Methods and systems for internet protocol (IP) packet header collection and storage
A computer-based method for providing information about a potential security incident ascertained from received internet protocol (IP) packets is described. The method includes capturing IP packets from a network, stripping packet header data from the captured IP packets, calculating a cyclic redundancy code (CRC) from one or more fields of the packet header data, determining whether any packet header data has occurred multiple times by comparing the calculated CRC to stored CRCs in each of successive entries in a cache, and storing, in a database, only a single instance of packet header data for any packet header data that is determined to have occurred multiple times.