Patent classifications
G06F21/6218
Extension framework for data analytics
Extending access to a data model in a data analytics computer data processing system includes loading into a programmatically isolated process address space of a computer, an instance of an extension framework computer program and executing in the framework, computer program logic configured to establish a communicative channel between the isolated process address space and a data analytics computer data processing system executing in a separate process address space. Thereafter, within the framework a directive may be received to access a data model managed in the data analytics computer data processing system. In response, a function may be selected in respect to an API to the data analytics computer data processing system corresponding to the received directive. Finally, the selected API function may be invoked over the communicative channel and a result derived from the data model may be received in the framework from over the communicative channel in response to the selected API function.
Device independent encrypted content access system
Systems, devices, media, and methods are presented for retrieving authentication credentials and decryption keys to access remotely stored user-generated content. The systems and methods receive a first authentication credential and access a second authentication credential based on receiving the first authentication credential. The system and methods generate an authentication token and an encryption token. Based on the authentication token, the system and methods access a set of encrypted content and an encrypted content key. The systems and methods decrypt the encrypted content key using the encryption token and decrypt the set of encrypted content using the decrypted content key. At least a portion of the content is presented at the user device.
File sharing system and method
A file sharing system and methods therefor share one or more files without requiring the files be sent to or stored on a server. The file sharing system enables files to be shared from a user device allowing users to maintain control of the files by storing and sharing files off the cloud. Sharing and file access is typically effectuated via a server and one or more links provided by the server. File access is limited to selected file access types.
Computer aided systems and methods for creating custom products
A computer-aided design system enables physical articles to be customized via printing or embroidering and enables digital content to be customized and electronically shared. A user interface may be generated that includes an image of a model of an article of manufacture and user customizable design areas that are graphically indicated on the image corresponding to the model. A design area selection may be received. In response to an add design element instruction and design element specification, the specified design element is rendered in the selected design area on the model image. Customization permissions associated with the selected design area are accessed, and using the customization permissions, a first set of design element edit tools are selected and rendered. User edits to the design element may be received and rendered in real time. Manufacturing instructions may be transmitted to a printing system.
Computer aided systems and methods for creating custom products
A computer-aided design system enables physical articles to be customized via printing or embroidering and enables digital content to be customized and electronically shared. A user interface may be generated that includes an image of a model of an article of manufacture and user customizable design areas that are graphically indicated on the image corresponding to the model. A design area selection may be received. In response to an add design element instruction and design element specification, the specified design element is rendered in the selected design area on the model image. Customization permissions associated with the selected design area are accessed, and using the customization permissions, a first set of design element edit tools are selected and rendered. User edits to the design element may be received and rendered in real time. Manufacturing instructions may be transmitted to a printing system.
Protecting sensitive data
An example operation may include one or more of capturing a current version of sensitive data by a data processor node, hashing, by the data processor node, the current version of the sensitive data, storing, by the data processor node, a hash of the current version of the sensitive data on a first blockchain, encrypting, by the data processor node, the current version of the sensitive data using a secret key, and storing the encrypted current version of the sensitive data on a second blockchain.
Systems and methods for quantum file permissions
Providing quantum file permissions is disclosed herein. In one example, a quantum computing device includes a permissions database that stores permissions information for a plurality of quantum files. A quantum file permissions service, executing on a processor device of the quantum computing device, receives from a requestor a permissions query for a permissions status (i.e., a read permission indicator, a write permission indicator, and/or an execute permission indicator, as non-limiting examples) of a quantum file including a plurality of qubits. In response, the quantum file permissions service accesses permissions information for the quantum file from the permissions database. The quantum file permissions service uses the permissions information from the permissions database to determine a permissions status of the quantum file. The quantum file permissions service then sends a response to the requestor indicating the permissions status of the quantum file.
Technologies for providing shared memory for accelerator sleds
Technologies for providing shared memory for accelerator sleds includes an accelerator sled to receive, with a memory controller, a memory access request from an accelerator device to access a region of memory. The request is to identify the region of memory with a logical address. Additionally, the accelerator sled is to determine from a map of logical addresses and associated physical address, the physical address associated with the region of memory. In addition, the accelerator sled is to route the memory access request to a memory device associated with the determined physical address.
Secure credentialing systems and methods
A method for preparing a credential package includes providing access to a credential record of a plurality of credential records stored in a database system. The credential record includes information identifying a credential candidate and credential information associated with the credential candidate. The method further comprising receiving a credential document associated with the credential information, receiving credential document information associated with the credential document, and storing the credential document in a distributed ledger system comprising a plurality of nodes.
Database and file management for data validation and authentication
Techniques for database and file management herein include a processor and a memory device storing instructions that cause the processor to perform operations comprising creating a request based on an extensible markup language (XML) or an interpreted scripting language object, wherein the request comprises unauthenticated data for validation. The operations can also include transmitting the request to a remote device), updating metadata corresponding to the request to indicate the successful validation by the remote device, validating a response file, and detecting a discrepancy between the unauthenticated data and the authenticated data accessible by the remote device. Additionally, the operations include obtaining correction data to resolve the discrepancy, and executing a transaction based on the request and the correction data.