G06F21/6236

Generating link information to access a file stored in a storage area associated with user identification information
09832197 · 2017-11-28 · ·

An information processing apparatus includes a memory that includes a first storage area and a second storage area and a processor that generates link information to access the file stored in the first storage area, in the second storage area associated with the user identification information associated with the first storage area, requests a notification server that transmits a notification, with identification information that identifies a communication apparatus that corresponds to the user identification information associated with the first storage area, and transfers, in response to a request from the communication apparatus that receives the notification, the link information stored in the second storage area associated with the user identification information corresponding to the communication apparatus and that further transfers, in response to access of the file by the communication apparatus using the link information, the file obtained from the first area to the communication apparatus.

Outcome-based data protection using multiple data protection systems
09830471 · 2017-11-28 · ·

In response to a request for data protection of a first resource of a first system, data protection methods are identified to provide data protection for the first resource. One or more of the data protection methods are selected based on one or more data protection objectives of a data protection plan that is associated with the first resource. The data protection objectives collectively specify an expected outcome of the data protection plan. For each of the selected data protection methods, a list of actions to be performed is determined to satisfy expected outcome of the data protection objectives. The list of actions is deployed to the first system and a second system that provides data protection for the first system, including provisioning one or more data protection services in the first and second systems to carry out the list of actions.

Multi-party data science collaboration
11669597 · 2023-06-06 · ·

The disclosure includes a system and method for multiparty collaboration including creating a first data object associated with first collaboration data, the first collaboration data associated with a first collaborating entity; generating a first object ownership log entry to an object ownership log associated with a collaboration, the first object ownership log entry including first identification information identifying the first data object and a first object owner identifying an owner of the first data object, wherein the first object owner associated with the first data object is the first collaborating entity; generating a first object tracking index entry associated with the first data object; receiving a user request associated with the first data object; and responding to the user request based on one or more of a user whitelist, the object ownership log, and the ownership tracking index.

QUERY PROCESSING USING DATA CLEAN ROOMS

A distributed database generates a cross reference table that cross references a first dataset from a first database account and a second dataset from a second account. The distributed database receives a query directed to a combination of the first and second datasets, and generates an interim table in the first database account by applying the query to the cross reference table and the first dataset. The distributed database generates results data in the second database account by applying the query to the interim table and the second dataset, and stores the results data in the first database account.

IMPLEMENTING LOGIC GATE FUNCTIONALITY USING A BLOCKCHAIN
20220358491 · 2022-11-10 ·

The invention presents a solution in which blockchain Transactions are created to implement the functionality of a logic gate. The invention may be implemented on the Bitcoin platform or an alternative blockchain platform. The transaction includes a locking script which comprises instructions selected so as to implement the functionality of a logic gate such as OR, AND, XOR, NOT and so on. In some examples, the instructions may be provided in a hashed form. When the script is executed (because a second transaction is attempting to spend the output associated with the locking script) the inputs will be processed by the conditional instructions to provide an output of TRUE or FALSE. The second transaction is transmitted to the blockchain network for validation and, if determined to be valid, it will be written to the blockchain. Validation of the second transaction can be interpreted as a TRUE output. Thus, the locking script of the first transaction provides the functionality of the desired logic gate. The invention provides numerous advantages and can be used in a wide variety of applications, such as for the implementation of control systems and processes.

Access control with multiple security ecosystems

A method according to one embodiment includes monitoring, by an access control device, for changes to a first access control database stored on the access control device, wherein the first access control database is associated with a first security ecosystem having a first set of security protocols; automatically updating a mediation database stored on the access control device to identify a change to the first access control database in response to a determination that the change occurred; and automatically updating a second access control database stored on the access control device based on the change identified in the mediation database and in response to the automatic update of the mediation database, wherein the second access control database is associated with a second security ecosystem different from the first security ecosystem and having a second set of security protocols different from the first set.

Computing network for using a cloud computing server to verify data received from an operating system

Disclosed herein is a cloud computing server for verifying data received from an operating system. The cloud computing server may receive user and system data, associate such user and system data with user and system accounts, transmit a message to a user device such as a mobile device and receive an acceptance or a rejection from the mobile device based on the transmitted message. The cloud computing server may also associate one or more tokens with user accounts based on the acceptance received from the mobile device. In one embodiment, the user data may include user identification data. The system data may include processing system name, processing system physical address, IP address, MAC address, etc.

MULTIPLE CLOUD AND REGION DATA CLEAN ROOMS

Embodiments of the present disclosure may provide a data clean room allowing secure data analysis across multiple accounts and across different regions and cloud providers. The data clean room may also restrict which data may be used in the analysis and may restrict the output. The overlap data may be anonymized to prevent sensitive information from being revealed. A version of a provider account can be created that is similar to a client account, such as in the same cloud type or the same region as the client database account. The client account can share data that is replicated to the provider account to complete client requests using an anonymized data and the cross reference table.

SECURE DATA REPLICATION

One or more techniques and/or computing devices are provided for secure data replication. For example, a first storage controller may host first storage within which storage resources (e.g., files, logical unit numbers (LUNs), volumes, etc.) are stored. The first storage controller may establish an access policy with a001 second storage controller to which data is to be replicated from the first storage. The access policy may define an authentication mechanism for the first storage controller to authenticate the second storage controller, an authorization mechanism specifying a type of access that the second storage controller has for a storage resource, and an access control mechanism specifying how the second storage controller's access to data of the storage resource is to be controlled. In this way, data replication requests may be authenticated and authorized so that data may be provided, according to the access control mechanism, in a secure manner.

Systems and methods for determining that files found on client devices comprise sensitive information
09805204 · 2017-10-31 · ·

The disclosed computer-implemented method for determining that files found on client devices comprise sensitive information may include (1) maintaining, on a server, a set of representations of files that have been classified as sensitive according to a data loss prevention policy, (2) receiving, from a client device, a message that includes a representation of a file on the client device, (3) determining that the representation of the file on the client device matches the representation of a sensitive file from the set of representations of files, (4) concluding, based on the representation of the file on the client device matching the representation of the sensitive file, that the file on the client device includes sensitive information, and (5) performing a security action in response to concluding that the file on the client device includes the sensitive information. Various other methods, systems, and computer-readable media are also disclosed.