G06F21/6236

DATA EXFILTRATION DETECTION
20230015269 · 2023-01-19 · ·

A computer-implemented method includes creating an account including an account value on an online service. The account value is modified periodically to activate a plurality of account values respectively associated with a plurality of times at which the plurality of account values were respectively activated on the account. A network-accessible data repository is scanned to detect a first value of the plurality of account values, the first value associated with a first time of the plurality of times at which the first value was activated. Responsive to detecting the first value a notification is provided indicating a data leak from the online service including an indication of when the data leak occurred based on the first time at which the first value was activated on the account and a second time at which a second value was activated on the account to replace the first value.

Separately Collecting and Storing Form Contents

Apparatuses, systems and methods are described herein for separately collecting and storing form contents. Different information may be collected from a user on a form. Based on determining that portions of the form request a first type of information, an extended reality (XR) environment may be provided to the user. The user may provide the first type information via an input method in the XR environment. The user may provide a second type of information using a different input method outside of the XR environment. The first type of information may be processed and stored in a different database as compared to the second type of information. The database storing the first type of information may have a higher security standard than the database storing second type of information.

Tenant separation for analytical applications in a remote application integration scenario
11550940 · 2023-01-10 · ·

A tenant separation architecture is provided to adopt tenant separation for remote integration of various OEM systems with a cloud-based analytics application. The tenant separation architecture provided herein allows for tenant separation in a wide range of modules in different OEM integration scenarios through a token-base authentication. Application server tenants and database tenants may be accessed for application of the tenant separation. Moreover, the tenant separation implementations disclosed herein may be applied to different modules for metadata, tenant configuration, authorization concepts, and general data protection regulation (GDPR) adoption.

SYSTEMS, METHODS AND COMPUTER PROGRAM PRODUCTS FOR MESSAGING IN A HETEROGENEOUS ENVIRONMENT
20230214520 · 2023-07-06 ·

Methods, systems, and computer program products are provided for messaging in a heterogeneous environment. A first connection is established between a first messaging device that can store a first schema and a second messaging device that can store at least one processing rule and at least one schema including the first schema. The first messaging device sends to the second messaging device, via the first connection, a first message structured according to the first schema. The second messaging device receives the first message. The second messaging device identifies that the first message is structured according to the first schema. In turn, the second messaging device processes the first message using the processing rule.

Implementing logic gate functionality using a blockchain

The invention presents a solution in which blockchain Transactions are created to implement the functionality of a logic gate. The invention may be implemented on the Bitcoin platform or an alternative blockchain platform. The transaction includes a locking script which comprises instructions selected so as to implement the functionality of a logic gate, such as the XOR gate. When the script is executed (because a second transaction is attempting to spend the output associated with the locking script) the inputs will be processed by the conditional instructions to provide an output of TRUE or FALSE. The inputs are pre-processed by one or more computing agents so that they are evaluated to TRUE or FASLE prior to being used as inputs to the script. The second transaction is transmitted to the blockchain network for validation and, if determined to be valid, it will be written to the blockchain. Validation of the second transaction can be interpreted as a TRUE output. Thus, the locking script of the first transaction provides the functionality of the desired logic gate. The invention provides numerous advantages and can be used in a wide variety of applications, such as for the implementation of control systems and unit.

CLASSIFYING DATA AND ENFORCING DATA ACCESS CONTROL USING A CONTEXT-BASED HIERARCHICAL POLICY
20230004663 · 2023-01-05 ·

One example method includes receiving a request from a user to access data stored in a filesystem, in response to the request, retrieving metadata of the data and metadata of the user, validating the metadata of the data and the metadata of the user against a data access rule, and granting the user access to the data upon successful validation of the metadata of the data and the metadata of the user.

SYSTEM AND METHODS FOR QUANTITATIVE DATA SECURITIZATION VIA A VALUE EXPOSURE, PORTIONING, AND EXCHANGE PLATFORM
20220391531 · 2022-12-08 ·

A securitization, exposure, portioning, and exchange platform for enabling the securitization or fixing of quantitative values of asset data parcels, which correspond to external assets, and the exchange of asset data parcels between account systems operating via computers over a network. The security of asset data parcels, which corresponds to their quantitative integrity, is controlled by removing their exposure to changes in their corresponding external assets.

SECURE USER INTERFACE DISTRIBUTION METHOD FOR HETEROGENEOUS MULTI-DEVICE INTERACTION
20220365761 · 2022-11-17 ·

Provided is a method for distributing a user interface (UI) for heterogeneous multi-device interaction, and more particularly, a method of distributing a UI between heterogeneous platforms, the method supporting distribution of UI units so that a flexible multi-device use environment, such as a live streaming application, is possible even between heterogeneous platforms. A provided mobile operating system security technology allows a flexible multi-device use environment, such as a live streaming application, between heterogeneous platforms by supporting the distribution of UI units and ensures secure multi-surface sharing by considering and preventing security risk elements in a multi-device environment.

Flexible parity information for storage systems

Providing for increased flexibility for large scale parity, the including: writing data to a storage system, including utilizing a first data protection scheme; identifying, for storage media in the storage system, characteristics of the storage media; identifying, in dependence up the characteristics for the storage media, a second data protection scheme to use for the data; and writing the data to the to the storage system utilizing the second data protection scheme.

Method for sharing and searching playlists

A method for making a playlist available to the public, in which the playlist comprises user-defined descriptor information. The user-defined descriptor information is entered as free form text or prose.