G06F2221/2151

Secure, cloud-based data collection tool
11451534 · 2022-09-20 · ·

An approach is provided for generating a secure, cloud-based data collection tool for collecting data from computer resources of a target system. In an embodiment, the method comprises: receiving a request to perform a data collection on one or more target computer resources; based on the request, generating a customization specification; and transmitting the customization specification to a deployment engine to cause the deployment engine to: based on the customization specification, generate the customized collector that is specific to the data collection, and storing the customized collector at a particular location in a cloud storage; generate, and transmit to a custodian, a first notification that includes the particular location; generate a unique deployment key that is specific to the customized collector; generate a second notification that includes the unique deployment key; and transmit the second notification to the custodian separately from transmitting the first notification.

INFORMATION PROCESSING DEVICE, CONTROL METHOD, AND RECORDING MEDIUM

An information processing device includes: a storage that stores determination criterion information indicating a determination criterion for determining whether or not a behavior of an application operating on a device provided to a vehicle is normal; and a detector that obtains behavior information indicating the behavior of the application, and detects an anomaly in the behavior of the application, based on (i) state information that indicates a state of the mobility and is obtained via the mobility network and (ii) the behavior information obtained and the determination criterion information stored in the storage.

GENERATION AND VERIFICATION OF A TEMPORARY AUTHENTICATION VALUE FOR USE IN A SECURE TRANSMISSION
20220294779 · 2022-09-15 ·

The present disclosure inter alia presents a method of generating a temporary authentication value, for use in a secure transmission to a service provider system having one or several computer servers. The method starts with receiving a first identification data and receiving a security data associated with the first identification data. Thereafter, a hash function is applied to the first identification data and the security data to generate a temporary authentication value. The generated temporary authentication value is divided into a first and a second part. The method thereafter comprises transmitting only the second part of the divided temporary authentication value to the service provider system for verification.

Video recording apparatus and video recording verification system, and video recording method and video verification method

A video recording apparatus includes an illumination apparatus applying a modulated illumination light, a control apparatus controlling the illumination apparatus, an imaging apparatus imaging the illumination light and an object at the same time to generate video data; and a storage apparatus storing the video data generated by the imaging apparatus. The control apparatus generates encrypted data by using at least a portion of the video data imaged by the imaging apparatus and encryption information generated as information changing in accordance with a date and time and used for encryption and controls the illumination apparatus such that the illumination light is modulated by the generated encrypted data.

MDM-BASED PERSISTENT SECURITY MONITORING
20220245236 · 2022-08-04 ·

A method of establishing security monitoring functionality on a device on retail display includes obtaining, by a processor of a server computer, a mobile device management (MDM) startup message from the device, determining, by the processor, whether the device is enrolled for MDM supervision, and if the device is enrolled for the MDM supervision, downloading, by the processor to the device, configuration data to support the MDM supervision and implementation of the security monitoring functionality.

DELAYED AND PROVISIONAL USER AUTHENTICATION FOR MEDICAL DEVICES
20220232013 · 2022-07-21 ·

Representative embodiments of operating a secured device requiring user authentication include receiving a request from a user for operating the device without prior authentication; granting the user temporary access to the device in accordance with a security policy that specifies a predetermined time interval and/or a predetermined number of device operations within which authentication must occur to continue at least some operations of the device; computationally storing an audit trail identifying the temporary access and actions performed during the temporary access; and upon determining that authentication has not been provided within the predetermined time interval or number of device operations, preventing at least some operations of the device and updating the audit trail to specify expiration of the temporary access.

Methods and devices for automatically encrypting files

An automatic file encryption method and device for automatically encrypting a file. A processor identifies a characteristic associated with likely sensitive content based on a usage pattern of encrypting files having the characteristic. Creation of a new file is detected and the newly-created file is analyzed to determine whether the file contains sensitive content based upon it having the characteristic. If the file is found to have the characteristic, then the file is automatically encrypted.

DYNAMIC ACCESS CONTROL FOR SENSITIVE INFORMATION
20220245277 · 2022-08-04 ·

Methods, systems, and apparatus, including computer programs encoded on computer storage media for containment of sensitive data within a communication platform. The system displays a communication interface including a first input section for receiving an input message associated with a sending user account, and a display section for displaying message information received by the sending user account from other user accounts. The system determines a requirement to input sensitive information. The system then displays a sensitive data user interface including second input section for receiving a sensitive message, and an interface control for setting an expiration time value for the sensitive message.

Trusted Execution Environment to Provide Attestation of Code Execution Result
20220245238 · 2022-08-04 ·

A system comprising at least one secure server computer configured to execute a predefined code sequence in a transactional fashion on input data to produce output data, and configured to provide a signed response packet that proves that the code sequence (unmodified since its installation) was executed on the input data and resulted in the output data. In an embodiment, the code and its secure isolated execution environment on the secure server computer system may be transactional. In an embodiment, the customer critical code and the secure isolated execution environment may be instantiated each time the application (executing on another computer) transmits a request with input data. Upon completion of the transaction, the secure server computer may remove the customer critical code and the secure execution environment from system memory, deleting its context and any other data related to the environment.

Apparatuses and methods for determining and processing dormant user data in a job resume immutable sequential listing
11416821 · 2022-08-16 · ·

Aspects relate to apparatuses and methods for determining and processing dormant data records on an immutable sequential listing. An exemplary apparatus includes a processor configured to monitor a plurality of timestamps associated with a plurality of data records stored on the immutable sequential listing, wherein the data record includes a job resume, detect inactivity in a first data record of the plurality of data records over a predetermined time period as a function of a first timestamp of the first data record, wherein the predetermined time period may be set by the user, tag, as a function of the inactivity, the first data record as an inactive first data record, and process, as a function inactivity, the first data record, wherein processing may include adding additional data or archiving inactive data records from the immutable sequential listing.