Patent classifications
G06F21/6236
Secure data comparison using data clean rooms
Disclosed herein are methods and systems for secure data comparison using data clean rooms. In an embodiment, a computer system generates a replica database based on a provider database, which stores a cross reference table that cross references a client dataset of a client database and a provider dataset of the provider database. The system receives, at the replica database, a table that is generated by the client database using the cross-reference table. The system transmits, from the replica database, the table to the provider database. The system receives, at the replica database, a results dataset that is generated by the provider database by applying a database statement to the provider database using the table generated by the client database. The system shares, from the replica database, the results dataset with the client database.
Security, safety, and redundancy employing controller engine instances
The claimed subject matter provides a system and/or method that facilitates employing safety within an industrial environment. An enhancing component can implement at least one of a security level, authentication, authorization, or an access right to a validated action to at least one of the controller or the controller engine instance. The enhancing component can further separate two or more entities within the industrial environment, the first entity related to process control and the second entity related to process safety. Additionally, the enhancing component can employ at least one of a backup controller or a backup controller engine instance in the event of at least one of a software error or a hardware error within the industrial environment.
Functional architecture pattern for safety related applications
A functional architecture pattern has a first software module, an operating system module, a first board support package, and a first microcomputer. The functional architecture pattern further has a second software module, a second board support package, and a second microcomputer that are logically separated from the first software module, the operating system module, the first board support package, and the first microcomputer. The first software module is developed according to quality management standards, while the operating system module, both first and second board support packages, and the third software module are developed according to safety integrity levels standards so as to make a logical split-off on three levels between the first software module software and the second software module.
METHODS AND SYSTEMS TO MANAGE DATA OBJECTS IN A CLOUD COMPUTING ENVIRONMENT
The present disclosure relates to managing activity taken with respect to cloud-based software services. A platform manages data objects processed by software services and/or those entities that initiate processing events. The platform uses identifiers such as, for example, a persistent identifier (PID) to track processing events. The platform implements rules and/or permissions related to the managed data objects and/or managed entities to determine whettler processing events are in compliance. The platform may update database records, send alerts, send data graphs, or provide a real-time stream related to the managed data objects and/or managed entities. In addition, embodiments involve determining whether a PID-associated managed data object has been modified during processing to generate an additional version of the PID-associated managed data object and, if an object version is present, processing the additional version of the PID-associated managed data object to generate an integrated first PID-associated managed data object.
Sharing information between nexuses that use different classification schemes for information access control
Systems and methods for sharing information between distributed computer systems connected to one or more data networks. In particular, a replication system implements methodologies for sharing database information between computer systems where the databases use different classification schemes for information access control.
Arbitrarily Grouping Computer System Resources
A method for arbitrarily grouping computer system resources includes receiving a resource policy to be applied to a group of resources associated with a user. The resource policy includes a unique user-defined label assigned to each resource of the group of resources. The method also includes identifying the group of resources among a plurality of resources using the user-defined label. Here, the plurality of resources is associated with the user and distributed across a plurality of different computing environments. For each identified resource of the group of resources, the method also includes applying the resource policy to a corresponding identified resource by accessing the respective computing environment where the corresponding identified resource resides.
Private transfer learning
Embodiments are disclosed for a method for private transfer learning. The method includes generating a machine learning model comprising a training application programming interface (API) and an inferencing API. The method further includes encrypting the machine learning model using a predetermined encryption mechanism. The method additionally includes copying the encrypted machine learning model to a trusted execution environment. The method also includes executing the machine learning model in the trusted execution environment using the inferencing API.
Creating vendor-neutral data protection operations for vendors' application resources
Creating vendor-neutral data protection operations for vendors' application resources is described. Capabilities specified for data protection operations by a vendor of an application are input from a host of the application. Any capabilities specified for the data protection operations are used to create a vendor-neutral version of a data protection operation for a resource of the application. The vendor-neutral version of the data protection operation for the application resource is output to the host. A result of performing the vendor-neutral version of the data protection operation on the application resource is input from the host.
System and methods for quantitative data securitization via a value exposure, portioning, and exchange platform
A securitization, exposure, portioning, and exchange platform for enabling the securitization or fixing of quantitative values of asset data parcels, which correspond to external assets, and the exchange of asset data parcels between account systems operating via computers over a network. The security of asset data parcels, which corresponds to their quantitative integrity, is controlled by removing their exposure to changes in their corresponding external assets.
Policy-based printing system and methods using list for documents
A policy-based printing system is implemented to allow access to a private domain to print using a public domain. The private domain includes private servers that store documents. The public domain includes servers and a printing device. A public policy server uses a domain list and a protocol connection with a private authentication server to validate a user and identify which private domain to access. The public policy server receives requests from the printing device to process a print job of a document in the private domain. A list is generated from the private server storing the documents based on the policy or other criteria. The list is provided to the user so that an approved listed document can be selected for printing.