G06F2221/2151

Tamper proof logging for automated processes

A manifest for an automated system is generated, wherein the manifest comprises a record of a plurality of algorithms configured to be used in operation of the automated system. An operational audit branch is generated from the manifest in response to execution of one or more algorithms of the plurality of algorithms. The generation of the operational audit branch comprises recording one or more inputs used by the one or more algorithms, and recording one or more outputs generated by the one or more algorithms.

ENHANCED MULTI-PARTY USER DATA DELETION
20210383370 · 2021-12-09 ·

Various systems, methods, and other aspects improve processes for handling user data deletion requests where such user data is stored in third-party data stores. For instance, a method may include receiving a data deletion request, determining a third-party data processor; and sending a user identification request via the network to the third-party data processor that includes a unique user identifier for the user. The method may receive a user identification response confirming that the third-party data processor is storing the information about the user, and responsively send a third-party data deletion request to the third-party data processor requesting that the information stored about the user in the third-party data store. In response, the method receives a third-party data deletion response including a transaction identifier for the third-party data deletion request and stores it. The transaction identifier can then be used to help ensure that the information is eventually deleted.

Blockchains for software component vulnerability databases

A method includes, by a computer associated with a security reporter, updating a component vulnerability entry blockchain to represent a state of a component vulnerability entry of a software component vulnerability database. The method includes, by the computer, providing the updated component vulnerability entry blockchain to a management authority so that the management authority updates a master blockchain for the software component vulnerability database. The updated master blockchain includes a plurality of component vulnerability entry blockchains, which represent corresponding states of component vulnerability entries of the software component vulnerability database, including the updated component vulnerability entry.

AGGREGATES INDEX
20220197883 · 2022-06-23 ·

The disclosed technology addresses the need in the art for a content management system that can be highly flexible to the needs of its subjects. The present technology permits any object to be shared by providing a robust and flexible access control list mechanism. The present technology utilizes a data structure that is highly efficient that both minimizes the amount of information that needs to be written into any database, but also allows for fast reads and writes of information from authoritative tables that are a source of truth for the content management system, while allowing for maintenance of indexes containing more refined data that allow for efficient retrieval of certain information that would normally need to be calculated when it is needed.

LOGIN FROM AN ALTERNATE ELECTRONIC DEVICE
20220188396 · 2022-06-16 ·

Systems and techniques for providing login from an alternate electronic device are presented. A system can receive hash data associated with first fingerprint data and a timestamp from a first electronic device in response to a determination that the first electronic device satisfies a defined criterion associated with a terminal computing request. The system can also form a correlation between the first electronic device and a second electronic device within a geographic area associated with the first electronic device based on the timestamp, first location data associated with the first electronic device, and second location data associated with the second electronic device. Furthermore, the system can initiate display of a graphical user interface on the second electronic device in response to a determination that second fingerprint data provided to the second electronic device within a timeframe associated with the timestamp matches the first fingerprint data associated with the hash data.

AUTHENTICATED ELEVATED ACCESS REQUEST
20220191041 · 2022-06-16 ·

A device receives an access-key package. The access-key package comprises a signature. The device obtains a validation package. The validation package comprises a validation device ID and validation timestamp. The device validates the signature in the access-key package. The device also obtains an updated timestamp. The device then compares the validation timestamp to the updated timestamp.

Generating investigation timeline displays including activity events and investigation workflow events

Techniques and mechanisms are disclosed that enable network security analysts and other users to efficiently conduct network security investigations and to produce useful representations of investigation results. As used herein, a network security investigation generally refers to an analysis by an analyst (or team of analysts) of one or more detected network events that may pose internal and/or external threats to a computer network under management. A network security application provides various interfaces that enable users to create investigation timelines, where the investigation timelines display a collection of events related to a particular network security investigation. A network security application further provides functionality to monitor and log user interactions with the network security application, where particular logged user interactions may also be added to one or more investigation timelines.

Controlled publication of sensitive data within an established timeframe
11361096 · 2022-06-14 · ·

Certain embodiments involve controlling the timing of digital publication of sensitive data over a data network, especially in a case where a requirement exists to publish the sensitive data within an established timeframe. For instance, a computing system receives from a client device a request to publish sensitive data. The computing system provides to the client device a challenge useable as input to a verifiable delay function (VDF), responsive to the request. The computing system receives a response to the challenge along with the sensitive data and verifies that the response is a solution to the VDF applied to the challenge. Based on verifying the solution, the computing system publishes the sensitive data.

Methods for administering and taking a test employing secure testing biometric techniques

Methods for administering and taking a test using a headpiece supported on a person's head. A test is directed to the headpiece and includes real displays. A sequence of the real displays and fake displays are displayed on a display in front of the person's face. An encrypted code is provided, which when decrypted, provides places of the real displays in the display sequence. The encrypted code is decrypted to obtain the places of the real displays in the display sequence. A light valve assembly in the viewing portion is controlled to assume, when a real display is being displayed, a first state in which the person is able to view the display through the light valve assembly and thus the real display and assume, when a fake display is being displayed, a second state in which the person is prevented from viewing the display through the light valve assembly.

Encryption device for encrypting data and timestamp, system on chip including the same, and electronic device

An encryption device includes a counter, an encryption/decryption unit, and a timer. The counter is configured to generate a first timestamp for a first time. The encryption/decryption unit is configured to concatenate security data and the first timestamp, encrypt the concatenated data into encryption data, transmit the encryption data to a memory device, and decrypt read data transmitted from the memory device into decryption data. The timer is configured to inform the counter and the encryption/decryption unit that a time elapses from the first time to a second time such that the counter generates a second timestamp for the second time and the encryption/decryption unit decrypts the read data into the decryption data. Checking logic implemented by the encryption device is configured to check whether a decryption timestamp of the decryption data is identical to the first timestamp.