G06F21/6227

Method and device for exchanging information regarding the clinical implications of genomic variations

A method and a device are for exchanging information regarding the clinical implications genomic variations. In an embodiment, the method includes receiving login-data of a user; evaluating the login-data received; establishing an encrypted data connection to the user after the evaluating indicates a positive evaluation of the login-data; saving, upon receiving a dataset in a context of a genomic variation, the dataset received in a memory, context-related with the genomic variation; and evaluating, upon a user request being received and connected with a search query for the genomic variation, a set of datasets from the memory, the datasets being context-related with the genomic variation and the set including the datasets that the user is authorized to receive, and sending the set of datasets to the user.

PRIVATELY QUERYING A DATABASE WITH PRIVATE SET MEMBERSHIP USING SUCCINCT FILTERS
20230231698 · 2023-07-20 · ·

A method includes obtaining, from a server, a filter including a set of encrypted identifiers each encrypted with a server key controlled by the server. The method includes obtaining a request that requests determination of whether a query identifier is a member of a set of identifiers corresponding to the set of encrypted identifiers. The method also includes transmitting an encryption request to the server that requests the server to encrypt the query identifier. The method includes receiving, from the server, an encrypted query identifier including the query identifier encrypted by the server key and determining, using the filter, whether the encrypted query identifier is not a member of the set of encrypted identifiers. When the encrypted query identifier is not a member of the set of encrypted identifiers, the method includes reporting that the query identifier is not a member of the set of identifiers.

Charter-based access controls for managing computer resources

A system and method can provide charter-based access to resources using an object model. Charters are defined by an administrator to have certain markings, each marking indicating a control (e.g., permission, credential, qualification, constraint, requirement, etc.) that regulates work under the charter. Users are also associated with markings. A user starts a session to access the system and is authenticated. The system determines charters having markings that the user has, and these charters are provided to the user to select from. Selecting a charter allows the user access to resources associated with the charter, under the controls indicated by the markings. Charters, controls, qualifications, resources, authorizations and links between them can be implemented using an object model. Markings can control session parameters (e.g., geographic location), resource access, user credentials, qualifications, and/or data processing permissions for a group of users, simplifying project definition and revisions to controlling access under the charter.

Systems and method of contextual data masking for private and secure data linkage

The present disclosure relates to methods and systems for contextual data masking and registration. A data masking process may include classifying ingested data, processing the data, and tokenizing the data while maintaining security/privacy of the ingested data. The data masking process may include data configuration that comprises generating anonymized labels of the ingested data, validating an attribute of the ingested data, standardizing the attribute into a standardized format, and processing the data via one or more rules engines. One rules engine can include an address standardization that generates a list of standard addresses that can provide insights into columns of the ingested data without externally transmitting the client data. The masked data can be tokenized as part of the data masking process to securely maintain an impression of the ingested data and generate insights into the ingested data.

Restricted views to control information access in a database system
11704306 · 2023-07-18 · ·

A restricted view definition is received by a database system. The restricted view definition defines a view over a database table with one or more restrictions on use of the view. The view over the database table is generated based on the restricted view definition. A query directed at the view is received by the database system. The database system determines whether the query directed at the view is permitted based on the one or more restrictions on the use of the view.

Network-shared data managing system and method

A data managing method. Metadata including a sharing policy is applied to a data file on a computing device. A sharing of the data file from the computing device via a network to a platform hosted by a computing system is detected. It is determined whether the platform is in compliance with the sharing policy, and it is reported whether the platform is in compliance with the sharing policy.

HIGHLY FLEXIBLE, SCALABLE MULTI BLOCKCHAIN, HIERARCHICAL DATA SHARING AND DATA STORING SYSTEM AND METHOD THEREOF
20230016241 · 2023-01-19 ·

The present invention relates to a highly flexible, scalable multi-blockchain, hierarchical data-sharing and data-storing system, at least comprising a third-party blockchain system, a data-sharing blockchain system, and an application-layer client, wherein the data-sharing blockchain system performs data aggregation and hierarchical storage on shared data uploaded by the third-party blockchain system through accessing the data-sharing blockchain system, so as to allow the application-layer client to require the shared data from the data-sharing blockchain system. The disclosure herein creates a single reliable data-sharing blockchain apparatus based on blockchain systems, so as to facilitate aggregation of data coming from different blockchain systems, reduce node complexity and block data redundancy when data are acquired from multiple parties, and define different sharing rules for different data contents, thereby being adaptive to scenarios where data are shared among parties.

SECURE MULTI-PARTY COMPUTATION OF DIFFERENTIALLY PRIVATE HEAVY HITTERS
20230017374 · 2023-01-19 ·

According to an aspect, a method may include receiving a candidate value; in response to a received candidate value matching one of the entries in the table, incrementing a corresponding count; in response to the received candidate value not matching one of the entries in the table and the table not exceeding a threshold size, adding an entry to the table; in response to the received candidate value not matching one of the entries in the table and the table exceeding the threshold size, decrementing the counts in the table and deleting entries having a count of zero; adding noise to the corresponding counts in the entries of the table and deleting any noisy corresponding counts less than a threshold value; and outputting at least a portion of the table as the top-k value result set.

METHODS AND SYSTEMS FOR LOCATING ANOMALOUS QUERY ACTIVITY ON DATA STORES

In one aspect, a computerized system for locating anomalous query activity with a cloud-based database, comprising: with an atypical query engine: analyzing and understanding data within a cloud-based database, processing all accesses to the data within cloud-based database and SAAS environment, generating a list of user that accesses a table from a location in the cloud-based database using, and capture a set of specified key statistics about the cloud-based database query; and role suggestion engine: generating a user behavior fingerprint comprising a history of the user's behavior within the cloud-based database, identifying that a user is an outlier with respect to behavior with respect to the set of specified key statistics, and suggesting a new role within an enterprise managing the cloud-based database for the user, wherein the fingerprint of the outlier user is used to generate the suggestion for the new role.

SYSTEMS AND METHODS FOR CONTROLLING ACCESS TO DATA RECORDS

A computer-implemented method is disclosed. The method includes: detecting a trigger event associated with a data record; in response to detecting the trigger event, enabling an access control for the data record, the access control defining one or more restrictions on accessing the data record; receiving at least one biometric data capture of a user and a digital form of at least one identification document associated with the user; obtaining verification results representing an identity verification status of the user based on a document verification process using the at least one biometric data capture and the digital form; in response to determining that the verification results satisfy first conditions: verifying user-inputted data based on contents of the at least one identification document; and in response to the verifying, disabling the access control for the data record.