G06F21/629

COMPUTER-BASED PLATFORMS AND SYSTEMS CONFIGURED TO ENHANCE A CALL SCREEN WITH USER-CONTROLLED NOTES ASSOCIATED WITH THE CALL AND METHODS OF USE THEREOF

In some embodiments, the present disclosure provides an exemplary method that may include steps of obtaining a permission from the user to monitor a plurality of activities executed within the computing device; continually monitoring the plurality of activities executed within the computing device for a predetermined period of time; identifying an indication of an incoming interaction session within the predetermined period of time; verifying at least one session interaction parameter associated with the incoming interaction session to identify the incoming interaction session as a repeat interaction session; dynamically retrieving at least one relation-specific notation from a plurality of relation-specific notations to display; instructing an input GUI element to display input data associated with the repeat interaction; automatically updating the plurality of relation-specific notations associated with the historical data relationship; and instructing at least one programmable output GUI to display a notification identifying the update of the plurality of relation-specific notations.

DETECTING BROKEN OBJECT LEVEL AND FUNCTION LEVEL AUTHORIZATION ISSUES WITH API SERVICES

In one embodiment, an illustrative method may comprise: monitoring, by a process, a behavior of an application between one or more client devices and an application programming interface service; establishing, by the process, an application model of objects and functions within the application based on the behavior; and determining, by the process, an authorization logic of the application for the objects and functions based on the application model. In one embodiment, the illustrative method further comprises: testing one or more authorization approaches against the application to determine one or more discrepancies within the authorization logic indicative of faulty authorizations; and mitigating the one or more discrepancies.

Data privacy plug-in for enterprise instant messaging platform
11563723 · 2023-01-24 · ·

A plug-in module, which, in combination with a host module, prevents unauthorized copying—like screen captures, screenshots, or screen recordings—of the streaming content provided to a participant in an online content-sharing session via an Instant Messenger (IM) service. The plug-in module may be a part of an IM application running on the participant's system or the host module may transmit a self-installing plug-in module to the participant's system upon receiving an indication that a user is hosting the online session. The plug-in module provides kernel-specific interface of the participant system's Operating System (OS) to the host module, which, then sends an OS-specific instruction to the plug-in module to trigger the OS to disable or control the copying of the streaming content as specified in a privacy preference received from the user hosting the online session. In this manner, sensitive and critical business data may be conveniently and securely shared online.

Marking current context data to control a context-data-dependent processing operation to save current or default context data to a data location

A data processing system includes processing circuitry for executing context-data-dependent program instructions which are decoded by decoder circuitry. Such context-data-dependent program instructions perform processing which is dependent upon currently existing context data. As an example, the context-data-dependent program instructions may be floating point instructions and the context data may be rounding mode information. The decoder circuitry supports a context save instruction which saves context data when it is marked as having been used and saves default context data when the current context data is marked as not having been used. The decoder circuitry further supports a context restore instruction which restores context data when the current context data is marked as having been used and permits the current context data to continue for future use when it is marked as currently unused.

Instance handling of a trusted execution environment

There is provided mechanisms for handling instances of a trusted execution environment on an execution platform. The trusted execution environment is associated with a secure cryptoprocessor. The secure cryptoprocessor holds a register. The trusted execution environment is configured to read from and write to the register at a given index i. A method is performed by the trusted execution environment. The method comprises checking, upon start of a new instance of the trusted execution environment, status of the register at the given index i, and wherein, when the register at the given index i has its status set to “undefined”, an internal status value is set to a first value, and else, when a value is read from the register at the given index i, the internal status value is set to a second value based on the read value. The method comprises writing the internal status value to the register at the given index i. The method comprises running the new instance. The method comprises, whilst running the new instance, reading a current value from the register at the given index i. The method comprises enabling the new instance to keep running only when the current value equals the internal status value.

System and method for adapting a response provided by a first device

The invention relates to a system and a method for adapting a response provided by a first device. The system comprises the first device with means for receiving from at least one client device, as at least one second device, a data access request comprising at least one client identifier and a predetermined application programming interface or service provider interface associated with the first device. The first device comprises means for processing the data access request that provides the response to the data access request and means for sending the response. The system comprises adapting means for intercepting and adapting the response sent by the first device. The adapting means adapts the response while being specific to the client and provides an adapted response. And the system comprises adapted response sending means for sending at least a part of the adapted response to the second or a third device(s).

Charter-based access controls for managing computer resources

A system and method can provide charter-based access to resources using an object model. Charters are defined by an administrator to have certain markings, each marking indicating a control (e.g., permission, credential, qualification, constraint, requirement, etc.) that regulates work under the charter. Users are also associated with markings. A user starts a session to access the system and is authenticated. The system determines charters having markings that the user has, and these charters are provided to the user to select from. Selecting a charter allows the user access to resources associated with the charter, under the controls indicated by the markings. Charters, controls, qualifications, resources, authorizations and links between them can be implemented using an object model. Markings can control session parameters (e.g., geographic location), resource access, user credentials, qualifications, and/or data processing permissions for a group of users, simplifying project definition and revisions to controlling access under the charter.

METHOD AND SYSTEM FOR PERMITTING ONE OR MORE FEATURES ON A COMPUTER PROGRAM
20230013780 · 2023-01-19 ·

There is provided a method of permitting one or more features on a computer program. The computer program executing on a hardware with a hardware identifier. The method comprises, at the authentication server, receiving an authentication key indicating authorised features of the computer program, generating a server key based on the hardware identifier and a feature list, and comparing the authentication key with the server key. The method further comprises, at the authentication client, receiving a feature request comprising one or more features to be permitted on the computer program, generating a feature verification message based on the one or more features, and transmitting the feature verification message to the authentication server. The method further comprises, at the authentication server, receiving the feature verification message, verifying that the one or more features are within the feature list, generating a response key if the one more or more features are within the feature list and the authentication key matches the server key, and transmitting the response key to the authentication client. The method further comprises, at the authentication client, receiving the response key, and permitting the one or more features on the computer program.

SYSTEMS, TECHNIQUES, AND OTHER IMPLEMENTATIONS FOR EXPANDABLE DISPLAY MANAGEMENT

Apparatuses, systems, and methods are provided for use with expandable displays. In some implementations management techniques and/or systems are provided that allow for access to expandable display functionality to be managed to as to potentially prolong device battery life. In other or additional implementations, techniques and/or systems are provided for potentially safeguarding devices with expandable displays from damage in the event of a fall or drop event. In yet other or additional implementations, techniques and/or systems are provided for determining the expansion state of an expandable display, thereby allowing corrective measures to be taken if the actual expansion state of the expandable display does not align with the expected expansion state of the expandable display.

System for implementing real-time redaction in a workflow configurable environment

Systems, computer program products, and methods are described herein for implementing real-time redaction in a workflow configurable environment. The present invention is configured to electronically receive, from a user input device, a request to load at least one user interface associated with an application; initiate a real-time content redaction engine on contents of the one or more fields associated with the at least one user interface in response to receiving the request, wherein initiating further comprises: parsing one or more embedded structures associated with the one or more fields; identifying private information in the one or more fields based on at least parsing the one or more embedded structures; and masking the private information in the one or more fields; and load the at least one user interface associated with the application in response to masking the private information in the one or more fields.