Patent classifications
G06F21/6209
Incorporating at-rest data encryption into a cloud-based storage architecture
Example methods and systems disclosed herein facilitate the introduction and use of client-specified object encryption within a computing environment using remote third-party storage systems, where data objects stored on the remote third-party storage systems were previously either stored in unencrypted form or encrypted with a single key tied to an account that owns the data. In some embodiments, the encryption is introduced into the system in gradual stages, so as to minimize or entirely eliminate data availability downtime. In some embodiments, the introduction of client-specified object encryption involves registration of a user function on the third-party storage system, where the user function handles object decryption in response to requests of content consumers for data objects stored by the third-party storage system.
Analytic workload partitioning for security and performance optimization
The present disclosure provides privacy preservation of analytic workflows based on splitting the workflow into sub-workflows each with different privacy-preserving characteristics. Libraries are generated that provide for formatting and/or encrypting data for use in the sub-workflows and also for compiling a machine learning algorithm for the sub-workflows. Subsequently, the sub-workflows can be executed using the compiled algorithm and formatted data.
Preventing digital forgery
A set of security templates is maintained including first and second templates. The first template specifies time and location stamp authentication for a file, and contextual security conditions that must be met before the file can be accessed. The second template specifies the time and location stamp authentication, but not the contextual security conditions. One of the first or second security templates is applied to the particular file. When the second security template is applied, a GPS-crypto device adds a time and location stamp to the particular file. The particular file is signed using a private key associated with the GPS-crypto device to generate an authentication signature based on the time and location stamp. The authentication signature is added to the particular file to allow a recipient to verify the time and location stamp of the particular file using a public key corresponding to the private key.
DIGITAL WITNESS SYSTEMS AND METHODS FOR AUTHENTICATING AND CONFIRMING THE INTEGRITY OF A DIGITAL ARTIFACT
Digital Witness is a solution based on advanced cryptographic techniques to ensure data integrity, authenticity, irrefutability and confidentiality at the point of data creation. The DigiWit process guarantee is based on using strong cryptographic techniques in conjunction with PKI and public/private block-chains. DigiWit process establishes a ‘root of trust’ for a digital artifact in conjunction with notarization provided by a trusted third-party. The result is a mathematical non-repudiable guarantee that the file under audit is exactly as recorded by the author. The authenticity of the author and the root of trust are provided by the notarizing trusted third-party. Integrity of the captured data is based on the time to insert its unique signature to the block-chain public ledger. This root of trust is intended to be permissible to prove authenticity of evidence in the legal arena (e.g., images of crime scenes, contracts, etc.) based on mathematical veracity.
METHOD, ELECTRONIC DEVICE, AND COMPUTER PROGRAM PRODUCT FOR PROCESSING ACCESS PERMISSION
Access permission is enabled. For example, in response to receiving an access request for a target file from a first client, a type of an access permission contained in the request is determined. Then, a first type of access permission is determined that can be assigned to the first client if it is determined that the contained type is in a set of reference types. Further, it may be determined that a second type of access permission applicable to be assigned to the target file. It can then be determined, from the first type and the second type, a target type of an access permission to be assigned to the first client. As a result, the probability of assigned access permissions being interrupted can be reduced, the performance of a client and a server is increased, efficiency is increased, and the user experience is improved.
Systems and methods for providing searchable customer call indexes
A system and method is provided for providing searchable customer call indexes. Consistent with disclosed embodiments, a system may receive call information associated with telephone conversations between callers and a vendor, the call information including an audio recording or transcript for each telephone conversation. The system may also identify one or more keywords from the audio recordings or transcripts and index the call information into one or more indexes based on the identified keywords. Finally, the system may determine search results responsive to a search query based on the indexing. In some embodiments, changes to customer service may be identified based on the search results.
Presenting collaboration activities
Systems and methods for presenting relevant collaboration activity to a collaboration system user. A method embodiment commences upon identifying user events that correspond to interactions between a plurality of users and collaboration objects. The interactions that had been performed and the collaboration objects are both associated with permissions attributes. The interactions are recorded as event records that include aspects of the permissions attributes. When a user opens a user interface, a set of event records is selected based at least in part on the permissions attributes with respect to the user. The selected set of event records are then used to generate a set of user-specific feed entries corresponding to particular individual ones of the set of event records. Characteristics of the individual event records and/or aggregations of event records are used to prepare user-specific feed entries that are presented in a user interface of a user device.
Programmer and method for encryption programming
The present disclosure provides a method for encryption programming, including: selecting an encrypted programming file that matches the programmer from a target folder; loading the selected encrypted programming file; if a current number of times for programming of the programmer is greater than or equal to a maximum number of times for programming, destroying the selected encrypted programming file and ending programming; otherwise, decrypting the selected encrypted programming file; if the current number of times for programming of the programmer is less than an initial number of times for programming, replacing the current number of times for programming of the programmer with the initial number of times for programming, otherwise, re-encrypting the decrypted encrypted programming file and programing the re-encrypted programming file into a target chip. A programmer is further provided.
SYSTEM FOR DETECTION AND RECORDATION OF FUNCTIONAL CODE LOGIC COMPONENTS ON A DISTRIBUTED DEVELOPMENT PLATFORM
Systems, computer program products, and methods are described herein for detection and recordation of functional code logic components on a distributed development platform. The present invention is configured to retrieve, from a source code repository, a source code script, wherein the source code script is associated with a first user; initiate a machine learning model on the source code script; determine, using the machine learning model, at least one functional code logic component from the source code script; initiate an NFT source code mapping engine on the at least one functional code logic component; generate, using the NFT source code mapping engine, a NFT for the at least one functional code logic component, wherein the NFT comprises the at least one functional code logic component and information associated with the first user; and record the NFT in a distributed ledger.