Patent classifications
G06F21/6245
System for implementing multi-dimensional data obfuscation
Systems, computer program products, and methods are described herein for implementing multi-dimensional data obfuscation. The present invention is configured to electronically receive, from a computing device of a user, a request to implement a multi-dimensional data obfuscation on a first database; initiate a data obfuscation engine on the first database based on at least receiving the request, wherein initiating further comprises: determining one or more data types associated with the one or more data artifacts; determining one or more exposure levels of the one or more data artifacts; retrieving, from a data obfuscation repository, one or more data obfuscation algorithms; and implementing the one or more data obfuscation algorithms on the one or more data artifacts based on at least the one or more data types; and generate an obfuscated first database based on at least initiating the data obfuscation engine on the first database.
Aggregation platform permissions
Apparatuses, systems, methods, and computer program products are presented for aggregation platform permissions. A hardware computing device is configured to aggregate a user's data from a first plurality of third-party service providers over a data network for the user to access through a second plurality of third-party service providers, the hardware computing device comprising a trusted intermediary between the first plurality of third-party service providers and the second plurality of third-party service providers. A permissions module is configured to monitor which of a second plurality of third-party service providers have access to which portions of data from which of a first plurality of third-party service providers. A graphical user interface is configured to display one or more user interface elements allowing a user to grant and/or revoke access to portions of data from a first plurality of third-party service providers individually to a second plurality of third-party service providers.
Method for controlling user information in an automatically learning device
A method in which user information is transmitted from at least one data source to a processing unit of a learning device. The user information is used, by the processing unit via a machine learner, to generate at least one user model. The at least one user model is adapted via an adaptation of parameters used by the at least one machine learner to generating the at least one user model. The parameters, used by the at least one machine learner for generating the at least one user model, are adapted as a function of at least one predefined rule. The user model generated on the basis of the adapted parameters is used to personalize at least one terminal.
Data loss prevention
Techniques for providing data loss prevention, including data exfiltration prevention and crypto-ransomware prevention, are provided. In some embodiments, a slack-space file system is created by using a modified packing algorithm to increase and/or optimize an amount of slack space created by files stored in a standard file system. A program for accessing and indexing the slack-space file system may be stored, and requests by a user to store data on a storage medium of a computer system may cause the information to be stored in the slack-space file system, where it may be protected from destructive malware that operates solely on the standard file system. In some embodiments, sensitive information may be hidden by storing the information in an alternate data stream of a file and by replacing the information in the unnamed data stream of the file with non-sensitive information that may appear to be sensitive.
Methods and apparatus to determine impressions using distributed demographic information
An example apparatus includes: at least one memory; instructions in the apparatus; and processor circuitry to execute the instructions to: access a cookie at a client device, the cookie including a priority listing indicative of an order in which beacon requests are to be sent to ones of a plurality of database proprietors; cause a first beacon request to be sent to a first database proprietor server, the first database proprietor server corresponding to a highest priority in the priority listing of the cookie, the first beacon request indicative of access to media at the client device; and cause a second beacon request to be sent to a second database proprietor server, the second database proprietor server corresponding to a lower priority than the highest priority in the priority listing of the cookie, the second beacon request indicative of the access to the media at the client device.
Data protection as a service
Embodiments of the present disclosure provide methods, apparatus, systems, computing devices, and computing entities for predictive data protection using a data protection policy determination machine learning model. In one embodiment, a method is provided comprising: processing a historical data corpus using the data protection policy determination machine learning model to generate a dynamic data protection policy update describing inferred data protection instructions; determining an attestation subset of the inferred data protection instructions by comparing the instructions and prior data protection instructions described by an existing data protection policy; for each inferred data protection instruction in the attestation subset, determining a per-instruction attestation determination based on end-user feedback; generating an updated data protection policy by updating the existing policy in accordance with each inferred instruction in the attestation subset whose per-instruction attestation determination describes an affirmative attestation determination; and performing the predictive data protection using the updated data protection policy.
System, device and method for secure message thread communication
A system, device and method for secure message thread communication is provided. The device comprises a communication interface; a display device; and, a controller configured to: generate, at the display device, a plurality of message threads, the plurality of message threads associated with different incident reports; receive multimedia data for transmission in a first message thread of the plurality of message threads; compare the multimedia data with data from the different incident reports; and when an association is determined between the multimedia data and respective data from an incident report associated with a second message thread, of the plurality of message threads: transmit, using the communication interface, the multimedia data in the second message thread, and not the first message thread.
Automated digital method and system of providing or sharing access
Advantageously, the invention is a competitor to money transfer systems. Conventional digital transactions facilitate electronic payment, such as money transfers, payment card charges, e-commerce transactions and other types of transactions. However, payees may be unbanked people (e.g., children) or people with no payment card (e.g., may have lost card), and payment card fund transfers may be expensive, time consuming, and cumbersome for financial institutions. Thus, there is need for an improved approach. The invention discloses an automated digital method of providing or sharing access to a payment card and/or similar financial account or non-card product, transactions between individuals or legal entities without physical transmission of a payment card, non-card product or its credentials, even without a recipient of an access having a payment card and/or financial account or non-card product, particularly by providing or sharing access to a payment card and/or similar financial account or non-card product of a sender.
Cryptographic data encoding method with enhanced data security
Data security and privacy are improved by a client providing a hashed version of collected data to a remote analysis service, and having the analysis service determine the relevancy of the data from the hashes before requesting the plaintext of the data. In one example, a browser plug-in obtains data which is divided into overlapping three-character sequences, and the sequences are hashed to produce a sequence of hashes. The sequence of hashes is sent by the plug-in to the remote service, which uses the hashes to determine if the associated data is relevant to the analysis performed by the remote service, without requiring access to the associated plaintext. After making the determination, the remote service may request that relevant data be provided to the service in plaintext form, while data that is not relevant need not be sent to the remote service.
Automated clinical documentation system and method
A method, computer program product, and computing system for proactive encounter scanning is executed on a computing device and includes obtaining encounter information of a patient encounter. The encounter information is proactively processed to determine if the encounter information is indicative of one or more medical conditions and to generate one or more result set. The one or more result sets are provided to the user.