G06F21/1066

STORED IMAGE PRIVACY VIOLATION DETECTION METHOD AND SYSTEM

Methods and systems for detecting a privacy violation in an image file. A policy to be used by a master imaging application is obtained and a file system is monitored for a digital image modified by a monitored imaging application. It is then determined that the digital image file includes at least some content in violation of a defined setting for the master imaging application and, based on the determination that the digital image file includes at least some content in violation of the defined setting for the master imaging application, taking an action.

SHARED IMAGE SANITIZATION METHOD AND SYSTEM

Methods and systems for removing sensitive information from a digital image. An instruction to share a digital image is received. It is then determined that the digital image contains a depiction of a corporate display medium that is classified as sensitive based on a policy and, based on the determination that the digital image contains the depiction of the corporate display medium that is classified as sensitive based on the policy, the digital image is processed to modify the depiction. The digital image is shared.

SMART MEDIA DEVICE

Increasingly, multiple users and multiple network devices are connecting to or requesting access to and/or from network resources. Users are increasingly expanding the number of network devices connected to a network. For example, a Home Network Environment (HNE) can have multiple networked devices connected to a single network. Each network device has its own interface and each network device is controlled via this interface which is generally located at the network device. A smart media device (SMD) can provide a centralized control for the multiple network devices and access to and/or from the multiple network resources. The SMD can provide control of one or more Internet of Things devices communicatively coupled to the SMD.

Watermark embedding and extracting method for protecting documents

A method for watermarking documents comprising: identifying and locating spaces in a received original document (10) by a location analysis (110) module which distinguishes between intra-word spaces and inter-word spaces; minimizing an error probability of interference between intra-word spaces and inter-word spaces in the watermarked document (20) by an optimization module (111); encoding (113) the message (30) into codewords and encoding (114) the codewords into the watermark;
embedding the watermark to generate (115) the watermarked document (20) by modifying the intra-word spaces and inter-word spaces of the original document (10).

Securing applications on mobile devices

A system and methods for securing an application package of a software application prior to installation and during the usage of the software application on mobile device is disclosed. The system comprises an application server configured for communicating the application package to a security server. The security server comprises one or more modules for adding multiple layers of security into the application package prior to recompilation and installation on mobile device. Further, the security server is configured for monitoring the application during runtime on the mobile device for detecting any abnormal environment and/or malware. The security server further communicates an alert to the user of the mobile device, a developer at the application server and blocks the application from usage. Various other embodiments are disclosed herein.

DATA TRANSMISSION WITH OBFUSCATION USING AN OBFUSCATION UNIT FOR A DATA PROCESSING (DP) ACCELERATOR
20210073041 · 2021-03-11 ·

According to one embodiment, a host communicates with a data processing (DP) accelerator using an obfuscation scheme. The DP accelerator receives a training request from a host, the training request includes an obfuscated data that includes one or more AI models and/or training input data. The DP accelerator de-obfuscates, by an obfuscation unit of the DP accelerator, the obfuscated data to obtain the one or more AI models. The DP accelerator trains the one or more AI models based on the training input data.

Systems and methods of transforming electronic content
10949504 · 2021-03-16 · ·

Exemplary embodiments are directed to systems and methods of transforming electronic content. Exemplary embodiments can electronically capture or receive a first electronic content and a second electronic content with a first electronic device. Exemplary embodiments can execute an assignment function to designate the first electronic content as a hidden electronic content and to designate the second electronic content as a cover electronic content. Exemplary embodiments can execute an encryption function that receives as input the hidden electronic content and the cover electronic content, and that outputs an encrypted electronic content and a decryption key. The encrypted electronic content can overlay the cover electronic content over the hidden electronic content such that, prior to decryption, only the cover electronic content is viewable at a location of a graphical user interface.

SYSTEM AND METHOD FOR CONTROLLING AND ORGANIZING METADATA ASSOCIATED WITH ON-LINE CONTENT
20230409655 · 2023-12-21 ·

A system and method are disclosed for controlling metadata associated with content on an electronic device that includes displaying interface screens for user entry of metadata control instructions, accepting user instructions, modifying metadata of applicable content, and associating the modified metadata with the applicable content. The system can export and/or store the applicable content along with modified metadata. The system can automatically modify metadata according to one or more profiles. Relevant profiles can be determined based on the export mechanism, destination or type of content. The system can add watermarks to indicate metadata modification. The system can display metadata for user modification. The content can include photos, videos or other content. The system can display metadata and geolocation indicators for each content item that indicate whether that item has associated metadata and geolocation information. The user can selectively modify metadata of selected content.

MECHANISM FOR PROVIDING OBFUSCATED CODE TO WEB APPLICATION CLIENTS
20210034718 · 2021-02-04 · ·

A method by one or more network devices for providing obfuscated code to web application clients. The method includes determining a configuration utilized by a web application client based on a header of a web application layer request generated by the web application client, selecting, for providing to the web application client with a web application layer response corresponding to the web application layer request, an obfuscated code from a plurality of obfuscated codes for the configuration utilized by the web application client, where the plurality of obfuscated codes for the configuration utilized by the web application client provide the same intended functionality but are obfuscated differently from each other, and providing the selected obfuscated code to the web application client with the web application response.

Copyright protection based on hidden copyright information
10909223 · 2021-02-02 · ·

Disclosed herein are methods, systems, and apparatus, including computer programs encoded on computer storage media, for hiding copyright information in a display screen. One of the methods includes generating, by a computing device, a unique identifier (ID) based on copyright information associated with a digital content, wherein the copyright information and the digital content are recorded on a blockchain of a blockchain network; determining one or more attributes associated with the display screen; and converting the unique ID to a digital watermark based on the one or more attributes, the digital watermark not being apparent to an unaided human eye when displayed in the display screen and enables retrieval of the copyright information from the blockchain based on the unique ID.