G06F21/6272

Method and system for providing data privacy based on customized cookie consent

The disclosure herein describes a method and a system for providing data privacy based on customized cookie consent. The proposed customized cookie consent system enables user's data privacy by facilitating the user to customize a plurality of features for each individual cookie, wherein a cookie is customized for multiple features that includes a consent and expiry customization, a drill down at individual cookie, an online masking unmasking cookie data—an offline masking-unmasking cookie data, a consent lineage and a data subject rights for cookie data that further include data access, data portability, right to erasure based on machine learning techniques. Further the customized cookie consent system also provides recommendation for data privacy and obscured cookies using machine learning techniques.

METHOD, COMPUTER PROGRAM PRODUCT AND PROCESSING CIRCUITRY FOR MAKING MEDICAL DATA AVAILABLE TO THIRD PARTIES
20220391536 · 2022-12-08 ·

Medical data are made available to third parties. The server has a first interface through which digital storage agreement is obtained. The digital storage agreement authorizes storage of medical data relating to a user in a central database connected to the server. In response to the digital storage agreement, a second interface of the server sends a first data request to a primary server. The first data request causes the primary server to forward medical data relating to the user to the second interface. The server stores the obtained medical data in the central database. A third interface receives a data enquiry from a third party with a request for the medical data relating to the user stored in the central database. In response, the server checks if the user has authorized sharing. Only if the user has authorized sharing, the server forwards a copy of the medical data.

Detection And Remediation Of Unauthorized Boot Of Storage Media

An apparatus includes a cryptographic key for decrypting content to be read from a storage media, and a control circuit. The control circuit is configured to, upon a boot of a server, dynamically generate a new boot authentication code using a prescribed method and determine a reconstituted boot authentication code. The reconstituted boot authentication code was reconstituted from an initial boot authentication code that was previously generated using the prescribed method. The control circuit is configured to compare the new and reconstituted boot authentication codes, and, based on a determination that the new and reconstituted boot authentication codes do not match, take a corrective action.

SYSTEM, METHOD, AND COMPUTER PROGRAM PRODUCT FOR SECURE KEY MANAGEMENT
20220374885 · 2022-11-24 ·

Provided are computer implemented systems, methods, and computer program products for secure key management, including receiving, by a remote data storage service, a request for data stored as encrypted data by the remote data storage service, the request initiated by a first entity, transmitting, to a first multi-party computation (MPC) server controlled by the first entity, an MPC request, receiving an MPC response from the first MPC server including a secret generated by a secure cryptoprocessor, and decrypting the encrypted data based at least partially on the MPC response. The computer implemented systems, methods, and computer program products may include blocking at least one of a subsequent MPC request from the data storage service, a subsequent MPC response to the data storage service, a link, or a connection between the data storage service and an MPC server computer of the entity to prevent decryption.

Computer-Implemented, User-Controlled Method of Automatically Organizing, Storing, and Sharing Personal Information
20230059467 · 2023-02-23 ·

A computer-implemented infrastructure providing a consistent graphical user interface that supports user-controlled organizing, storing, accessing and sharing of heterogeneous personal information of a specific user uses computer processes executed by a server system. The computer processes include receiving a set of items of information from a computing device operated on behalf of the specific user; for each item of information in the received set of items, obtaining, as a result of parsing the received set of items, new information; feeding to an artificial intelligence engine the new information, and other user information stored in association with an internal account of the specific user, in order to produce derived information; and storing the new information and the derived information, in a storage system in communication with the server system, in an encrypted format, and associating such stored item of information with an internal account of the specific user; wherein the stored items of information are made accessible only in accordance with permissions controlled by the specific user.

Adjusting efficiency of storing data in a storage network

A method for execution by a computing device to adjust data storage efficiency of data in a storage network includes determining an estimated overwrite frequency for a data segment for storage in memory of the storage network. The method continues by determining a storage approach for the data segment based on the estimated overwrite frequency. The method continues by processing the data segment based on the storage approach to produce a processed data segment. The method continues by error encoding the processed data segment to produce a set of encoded data slices, where a decode threshold number of encoded data slices is needed to recover the processed data segment. The method continues by storing the set of encoded data slices in the memory of the storage network.

Method and operation of a portable device and a cloud server for preserving the chain of custody for digital evidence

A process for preserving chain of custody for digital evidence captured at a portable device. The portable device transmits a request to upload the digital evidence to the cloud server via an intermediary storage device. The request includes digitally signed evidence metadata with data integrity code and authentication credentials. The portable device receives a response indicating approval to upload the digital evidence to the cloud server via the intermediary storage device. The portable device transmits the digital evidence to the intermediary storage device for uploading to the cloud server, and further transmits a request for approval to delete the digital evidence from the portable device. The portable device deletes the digital evidence only after receiving a response from the cloud server indicating an approval to delete the digital evidence from the portable device.

COMPUTER SYSTEM AND DEVICE FOR CONTROLLING USE OF SECURE MEDIA RECORDINGS

A network system is provided that enables a user to record media in connection with a user operating a service application to participate in a transport service. In examples, the network system includes a user computing device on which media is recorded and stored in an unrenderable state. The user can elect to make a media recording submission for a particular service activity (e.g., trip provided or received by user). In response to the media recording submission, the user computing device identifies one or more media files that contain media data which depict the service activity. The identified media files are transmitted to a service computing system where the media files can be rendered.

Computer-implemented, user-controlled method of automatically organizing, storing, and sharing personal information
11494664 · 2022-11-08 · ·

A computer-implemented infrastructure providing a consistent graphical user interface that supports user-controlled organizing, storing, accessing and sharing of heterogeneous personal information of a specific user uses computer processes executed by a server system. The computer processes include receiving a set of items of information from a computing device operated on behalf of the specific user; for each item of information in the received set of items, obtaining, as a result of parsing the received set of items, new information; feeding to an artificial intelligence engine the new information, and other user information stored in association with an internal account of the specific user, in order to produce derived information; and storing the new information and the derived information, in a storage system in communication with the server system, in an encrypted format, and associating such stored item of information with an internal account of the specific user; wherein the stored items of information are made accessible only in accordance with permissions controlled by the specific user.

Computer system and device for controlling use of secure media recordings

A network system is provided that enables a user to record media in connection with a user operating a service application to participate in a transport service. In examples, the network system includes a user computing device on which media is recorded and stored in an unrenderable state. The user can elect to make a media recording submission for a particular service activity (e.g., trip provided or received by user). In response to the media recording submission, the user computing device identifies one or more media files that contain media data which depict the service activity. The identified media files are transmitted to a service computing system where the media files can be rendered.