G06F21/84

METHOD AND ELECTRONIC DEVICE TO PROVIDE PRIVATE INFORMATION IN RESPONSE TO SCREEN EXPANSION
20230025142 · 2023-01-26 ·

According to an example embodiment, an electronic device monitors an occurrence of private information from a connected external device and provides, in an expanded screen region, the private information of the external device from which the private information occurs in response to screen expansion.

METHOD AND ELECTRONIC DEVICE FOR SECURING DISPLAY OF CONFIDENTIAL CONTENT
20230025191 · 2023-01-26 ·

A method and/or system for securing display of confidential content by an electronic device. The method may include displaying content on a screen of the electronic device. The method may include detecting an event to initiate a secure mode in the electronic device. The method may include determining confidential portions and non-confidential portions of the content displayed on the screen of the electronic device based on a view priority score and a confidentiality score, and determining a viewing angle of a user of the electronic device and a viewing distance of the user of the electronic device. The method may include displaying the confidential portions of the content based on the viewing angle of the user of the electronic device and the viewing distance of the user of the electronic device.

METHOD AND ELECTRONIC DEVICE FOR SECURING DISPLAY OF CONFIDENTIAL CONTENT
20230025191 · 2023-01-26 ·

A method and/or system for securing display of confidential content by an electronic device. The method may include displaying content on a screen of the electronic device. The method may include detecting an event to initiate a secure mode in the electronic device. The method may include determining confidential portions and non-confidential portions of the content displayed on the screen of the electronic device based on a view priority score and a confidentiality score, and determining a viewing angle of a user of the electronic device and a viewing distance of the user of the electronic device. The method may include displaying the confidential portions of the content based on the viewing angle of the user of the electronic device and the viewing distance of the user of the electronic device.

Remote secured terminal

A computer implemented method for providing communication between a secured client computer and a remote computer. There is provided a client computer that includes peripheral components. Each peripheral component is configured, by a processor, to process a corresponding peripheral component data of a data type that is not compatible with peripheral component data types processed by a processor of other peripheral components. The processor of each peripheral component is further configured to code the corresponding data of the specified data type. Each peripheral component is configured, by the processor, to establish a secured peer-to-peer communication channel between the peripheral component and the remote computer that is authorized to communicate with the client computer, and is further configured to code data that is communicated between the authorized remote computer and the peripheral component through the secured communication channel. The coded data being indecryptable by the processors of other of the peripheral components.

Remote secured terminal

A computer implemented method for providing communication between a secured client computer and a remote computer. There is provided a client computer that includes peripheral components. Each peripheral component is configured, by a processor, to process a corresponding peripheral component data of a data type that is not compatible with peripheral component data types processed by a processor of other peripheral components. The processor of each peripheral component is further configured to code the corresponding data of the specified data type. Each peripheral component is configured, by the processor, to establish a secured peer-to-peer communication channel between the peripheral component and the remote computer that is authorized to communicate with the client computer, and is further configured to code data that is communicated between the authorized remote computer and the peripheral component through the secured communication channel. The coded data being indecryptable by the processors of other of the peripheral components.

Data processing systems for central consent repository and related methods

A data processing central consent repository system may be configured to, for example: (1) identify a form used to collect one or more pieces of personal data, (2) determine a data asset of a plurality of data assets of the organization where input data of the form is transmitted, (3) add the data asset to the third-party data repository with an electronic link to the form, (4) in response to a user submitting the form, create a unique subject identifier to submit to the third-party data repository and, along with the form data provided by the user in the form, to the data asset, (5) submit the unique subject identifier and the form data provided by the user to the third-party data repository and the data asset, and (6) digitally store the unique subject identifier and the form data in the third-party data repository and the data asset.

Gracefully handling endpoint feedback when starting to monitor

A method, system and computer-usable medium for adaptively assessing risk associated with an endpoint, comprising: determining a risk level corresponding to an entity associated with an endpoint; selecting a frequency and a duration of an endpoint monitoring interval; collecting user behavior to collect user behavior associated with the entity for the duration of the endpoint monitoring interval via the endpoint; processing the user behavior to generate a current risk score for the entity; comparing the current risk score of the user to historical risk scores to determine whether a risk score of a user has changed; and changing the risk score of the user to the current risk score when the risk score of the user has changed.

Gracefully handling endpoint feedback when starting to monitor

A method, system and computer-usable medium for adaptively assessing risk associated with an endpoint, comprising: determining a risk level corresponding to an entity associated with an endpoint; selecting a frequency and a duration of an endpoint monitoring interval; collecting user behavior to collect user behavior associated with the entity for the duration of the endpoint monitoring interval via the endpoint; processing the user behavior to generate a current risk score for the entity; comparing the current risk score of the user to historical risk scores to determine whether a risk score of a user has changed; and changing the risk score of the user to the current risk score when the risk score of the user has changed.

REAL TIME COLLABORATION OVER MULTIPLE LOCATIONS
20230229379 · 2023-07-20 · ·

A first or second computer viewing a virtual canvas may be a host computer for a live source object requiring authorization between a host and a non-host computer by creating a live source window for the live source object requiring authorization (ARLSW) within the virtual canvas on the host computer, sending metadata information for the ARLSW to the non-host computer so that the ARLSW is at the same location on the virtual canvas for the first and second computers, and streaming the live source object requiring authorization to the ARLSW from the host computer to the non-host computer. When the host computer for the ARLSW leaves the virtual canvas and no other non-host computer for ARLSW in the canvas is known to have authorization to view the ARLSW, a placeholder screen is displayed in the ARLSW on the virtual canvas.

REAL TIME COLLABORATION OVER MULTIPLE LOCATIONS
20230229379 · 2023-07-20 · ·

A first or second computer viewing a virtual canvas may be a host computer for a live source object requiring authorization between a host and a non-host computer by creating a live source window for the live source object requiring authorization (ARLSW) within the virtual canvas on the host computer, sending metadata information for the ARLSW to the non-host computer so that the ARLSW is at the same location on the virtual canvas for the first and second computers, and streaming the live source object requiring authorization to the ARLSW from the host computer to the non-host computer. When the host computer for the ARLSW leaves the virtual canvas and no other non-host computer for ARLSW in the canvas is known to have authorization to view the ARLSW, a placeholder screen is displayed in the ARLSW on the virtual canvas.