G06F21/6236

DATA PROTECTION FOR COMPUTING DEVICE

According to an aspect, a method includes receiving data loss prevention (DLP) restriction data, where the DLP restriction data defines a first DLP control. The first DLP control identifies at least one content attribute of restricted content. The first DLP control identifies a restriction to a computer function when the restricted content is rendered on a display of a computing device. The method includes storing the DLP restriction data in a memory device associated with an operating system of the computing device, detecting, by the operating system, that content rendered on the display of the computing device includes at least a portion of the restricted content as identified by the at least one content attribute, and restricting the computer function during a period of time in which the portion of the restricted content is rendered on the display.

SYSTEMS AND METHODS FOR QUEUE CONTROL BASED ON CLIENT-SPECIFIC PROTOCOLS
20230036796 · 2023-02-02 ·

The present disclosure generally relates to controlling access to resources by selectively processing requests stored in a task queue to prioritize certain requests over others, thereby preventing automated scripts from accessing the resources. More specifically, the present disclosure relates to a normalization and prioritization system for controlling access to resources by queuing resource requests based on a client-defined normalization process that uses one or more data sources.

Parallel blockchains for vehicle and user ID

Methods, systems, and devices for a cross-linked distributed ledger. The cross-referencing system includes multiple computing devices including a first computing device and a second computing device. A computing device of the multiple computing devices is configured to maintain a first cross-linked distributed ledger. The first cross-linked distributed ledger has a first set of multiple linked records that are associated with a first identifier. The first computing device includes a processor. The processor is configured to link or provide a first record associated with the first identifier to the first cross-linked distributed ledger. The first record has a first reference to a second record. The second record is within a second set of multiple cross-linked records of a second cross-linked distributed ledger.

ADAPTING ARTIFICIAL INTELLIGENCE (AI) ECOSYSTEM SPECIFICATIONS

Adapting specifications of an artificial intelligence (AI) ecosystem are adapted, using a computer, based on an existing AI ecosystem of a user. A login is received, at the computer having a remote-based account of a user, to a new AI ecosystem. Specifications are determined from an existing AI ecosystem of the user, and the specifications include preferences and historical data related to the existing AI ecosystem based on usage of existing machines. Adaptive functionality is derived, using the computer, for new machines in the new AI ecosystem. The adaptive functionality is based on the specifications including the preferences and the historical data for the existing AI ecosystem. The specifications including the adaptive functionality is applied to the new machines of the new AI ecosystem.

Natural language interface for a data management system

A data processing system which includes a data management system located in a first network, the data management system providing operations for modifying data stored by the first data management system, and a natural language processing system for processing natural language messages. The natural language processing system is located outside the first network. The system further comprises an interface application having access to the data management system adapted to: receive one or more natural language messages from a user; forward the natural language messages to the natural language processing system; receive an invocation message from the natural language processing system, the invocation message comprising operation data defining an operation to be performed at the data management system, the operation identified by the natural language processing system based on the natural language messages; and invoke the operation at the data management system based on the operation data.

Computing device compatible encryption and decryption
11610010 · 2023-03-21 · ·

A method and apparatus encrypting data for use by an application includes receiving a first clear data in a security application running concurrently with the application. The security application encrypts the first clear data to generate a first encrypted package and distributes the encrypted package for use by the application or by other applications running concurrently with the application. The security application also receives and decrypts encrypted packages from the application or one of the other applications to provide clear data for use by the application. The security application may be implemented as a data entry utility that can be accessed directly by the application.

FEATURELESS MACHINE ENHANCEMENT DISCOVERY AND VERIFICATION
20230131198 · 2023-04-27 ·

Method, computer program product, and computer system are provided. Program queries for an indicator of dependency between a usage domain and a control domain in a virtual machine (VM) configuration having a cryptographic AP adapter. The VM and the cryptographic AP adapter are both installed on a hardware server. Program sets an internal bitmap based on a result and generates one or more sets of AP commands, based on the setting of the internal bitmap. The sets of AP commands are directed to an adjunct processor (AP) message queue on a cryptographic AP in the VM configuration. Program enqueues the one or more sets of program instructions to the VM having an identifier corresponding to an offset in the program internal bitmap. Program receives status at completion of the one or more sets of AP commands from the VM having the cryptographic AP in the VM configuration.

Separately collecting and storing form contents

Apparatuses, systems and methods are described herein for separately collecting and storing form contents. Different information may be collected from a user on a form. Based on determining that portions of the form request private information, an extended reality (XR) environment may be provided to the user. The user may provide private information via an input method in the XR environment. The user may provide non-private information using a different input method outside of the XR environment. The private information may be processed and stored in a different database as compared to the non-private information. The database storing private information may have a higher security standard than the database storing non-private information.

EXPORTING DATA TO A CLOUD-BASED SERVICE

In some implementations, a device, using a browser extension of a browser application, may obtain the data from an application using a private endpoint of the application. The private endpoint of the application may be accessible via a private network in which the browser application is implemented and may not be accessible via a public network. The device, using the browser extension of the browser application, may transmit, to the cloud-based service, the data to cause the cloud-based service to populate a document with the data.

Snapshot management across cloud provider network extension security boundaries

Systems and methods for efficient and secure management of encrypted “snapshots” for a remote provider substrate extension (“PSE”) of a cloud provider network substrate are provided. The PSE may request and obtain a snapshot from the cloud provider network substrate, restore a volume from the snapshot, make changes to data in the restored volume, and/or initiate the creation and storage of a new snapshot that includes incremental updates to the original snapshot to reflect the changes made to data in the volume. An encrypted snapshot stored within the cloud provider network substrate may be decrypted using a cloud provider key designed for internal use only, and then re-encrypted using a PSE-specific key before providing the snapshot to the PSE, thereby avoiding the sharing of the cloud provider internal use only key outside the cloud provider network substrate.