G06F16/144

AUTHORIZATION SYSTEM USING QUERIES AS AUTHORIZATION RESTRICTIONS

Systems and methods for generating responses to queries from a client application are disclosed. One example method includes receiving a first query from the client application, determining an authorization context for the first query based at least in part on a set of authorization restrictions corresponding to the client application, generating a response to the first query based at least in part on an intermediate response generated by a query engine, the response redacted based at least in part on the authorization context, and providing the response to the client application.

DIGITAL PROCESSING SYSTEMS AND METHODS FOR VARIABLE HANG-TIME FOR SOCIAL LAYER MESSAGES IN COLLABORATIVE WORK SYSTEMS

Systems, methods, and computer-readable media that automatically vary hang-time of pop-up messages, to enable presentation of a shared work environment on a plurality of client devices and cause a presentation of a plurality of visual indicators on a fraction of a display of the shared work environment, wherein each visual indicator represents differing clients associated with the plurality of client devices. The embodiments may further enable at least one group chat between the plurality of client devices, wherein communications are presented in pop-up windows appearing adjacent corresponding visual indicators, and wherein the pop-up windows remain on the display for differing durations depending on variables including at least one of length of message, number of concurrently displayed messages, a client defined threshold, or a sender status.

DIGITAL PROCESSING SYSTEMS AND METHODS FOR TWO-WAY SYNCING WITH THIRD PARTY APPLICATIONS IN COLLABORATIVE WORK SYSTEMS

Systems, methods, and computer-readable media for syncing data between a tabular platform and a third-party application are disclosed. The systems and methods may involve accessing a first platform that displays a first set of data in a first format; accessing a second platform that displays a second set of data in a second format; linking the first set of data with the second set of data to enable migration of the first set of data to the second platform and the second set of data to the first platform; enabling the first platform to simultaneously display the second set of data in the second format; enabling alteration of the second set of data in the second platform through manipulation of the simultaneous display of the second set of data in the first platform; and syncing the second set of data as altered with the first data set.

CALL LOCATION BASED ACCESS CONTROL OF QUERY TO DATABASE

The present disclosure is directed to protecting data stored at a database in a manner that increases data protection minimizing performance reductions. Apparatus and methods consistent with the present disclosure may collect information from user devices from which user inputs are received when collecting data that may be used to protect database data. Methods consistent with the present disclosure may identify code paths traversed, pages of program code where actions were initiated, and functions associated with those actions. This information may be cross-referenced with a set of data, constraints, rules, or command parameters when data associated with a database query is initially associated with an “allow” action or a “deny” action. This information may also be used to evaluate whether newly generated database queries should be allowed to be sent to a database server or to identify whether a database request should be blocked.

SOFTWARE DISCOVERY WITHIN SOFTWARE PACKAGING AND DEPLOYMENT SYSTEMS

A computer-implemented method for software detection is disclosed. The computer-implemented method includes scanning a list of file systems present on a computer system and described by a respective mount point for a signature from a set of predetermined signatures. The computer-implemented method further includes responsive to detecting the signature from the set of predetermined signatures, selecting a particular plugin from a predetermined list of plugins based, at least in part, on the detected signature. The computer-implemented method further includes querying, using the plug-in, an operating environment of the filesystem for data indicative of software running in the operating environment. The computer-implemented method further includes determining software running in the operating environment based, at least in part, on the data returned from querying the operating environment of the filesystem.

METHOD AND ELECTRONIC DEVICE FOR SYNCHRONIZING HANDWRITING
20230315679 · 2023-10-05 ·

One or more embodiments disclose a method and an apparatus including a memory, and a processor operatively connected to the memory. The processor is configured to, as handwriting is input by a user, analyze strokes of the input handwriting, generate search data and action link data, based on the analyzed strokes, generate search-based recognition data including the search data and link flag information associated with the action link data, and store a handwriting file including the generated search-based recognition data. Various embodiments are possible.

Methods for providing users with access to data using adaptable taxonomies and guided flows

A classification computing system provides adaptable taxonomies to facilitate user navigation of complex information systems. The classification computer includes a memory and a processor. The processor is configured to receive a collection of file indices from the information server. The processor is configured to apply a taxonomical classification algorithm to the collection to generate a collection of classified file indices. The classified file is associated with at least one taxonomical classification. The processor is further configured to apply a flow algorithm to the collection to generate at least one flow path used to provide a user access to a first subset of taxonomical classifications and restricts access to at least a second subset of taxonomical classifications. The flow path is responsive to user input parameters. The processor is configured to receive a user input parameter. The processor is additionally configured to provide the flow path to the user computing device.

System and method for pre-indexing filtering and correction of documents in search systems

Embodiments as disclosed herein provide a search system with an pre-indexing filter that provides both a sophisticated and contextually tailored approach to filtering documents and a corrector that is adapted to alter a document that has been designated to be filtered out from the indexing process and determine if the altered document should be indexed. The alteration of the document may be tied to the attributes, rules or thresholds used to initially filter the document from the indexing process. The filtering criteria can thus be tailored to a specific context such that both the initial filtering and the alteration process may be better suited for application in that context.

Systems and methods for determining if a user is a member of a defined segment
11755601 · 2023-09-12 · ·

Systems and methods for determining whether a user is part of a defined segment of all users makes use of a database of user information that includes rapidly searchable field values. Predetermined segment definitions can be evaluated using information from a user's record in the database to rapidly determine if the user is a member of the segment.

EXPERIMENT MANAGEMENT SERVICE

Artifacts, including parameters are data sets, associated with experiment tasks are stored at an experiment management service. A query specifying a particular value of a parameter and a particular data set is received, and an indication of an experiment result associated with the particular data set and the particular parameter value is provided.