G06F21/6281

INFORMATION PROCESSING SYSTEM, INFORMATION PROCESSING APPARATUS, AND NON-TRANSITORY COMPUTER READABLE MEDIUM STORING PROGRAM

An information processing system includes an information processing apparatus; and a server, in which the server acquires data to be processed from the information processing apparatus and executes processing on the data, and the information processing apparatus transmits the data to be processed to the server as a first job, and acquires data of a processing result for the data to be processed, which is transmitted to the server in the first job, as a second job different from the first job.

Systems and methods for personalized care management
11482324 · 2022-10-25 ·

Disclosed are systems and methods for personalized care management. A plurality of user devices corresponding to a plurality of authorized caregivers are configured to provide input data to a processing module 1004. The input data is associated with an actionable item being performed for at least one care receiver, wherein the actionable item includes one of: a scheduled actionable item and a non-scheduled actionable item. The processing module 1004 receives, the at least one input data based on the scheduled actionable item and the non-scheduled actionable item. A profile of the at least one care receiver is updated based on the received at least one input data, and thereafter stored in a database 1010. The plurality of authorized caregivers is facilitated to access the stored updated profiles of the at least one care receiver for further analysis.

TECHNOLOGIES FOR TRUSTED I/O WITH A CHANNEL IDENTIFIER FILTER AND PROCESSOR-BASED CRYPTOGRAPHIC ENGINE

Technologies for trusted I/O include a computing device having a processor, a channel identifier filter, and an I/O controller. The I/O controller may generate an I/O transaction that includes a channel identifier and a memory address. The channel identifier filter verifies that the memory address of the I/O transaction is within a processor reserved memory region associated with the channel identifier. The processor reserved memory region is not accessible to software executed by the computing device. The processor encrypts I/O data at the memory address in response to invocation of a processor feature and copies the encrypted data to a memory buffer outside of the processor reserved memory region. The processor may securely clean the processor reserved memory region before encrypting and copying the data. The processor may wrap and unwrap programming information for the channel identifier filter. Other embodiments are described and claimed.

ACHIEVING THE BEST COMPLIANCE RESULTS WHILE MINIMIZING SENSITIVE DATA PLACEMENT POLICY VIOLATIONS WITH A SMART SCHEDULER

Ensuring that there is a consistent and reliable manner for detecting and remedying potential policy violations from enterprise data sources by automating the scheduling of compliance checks on these enterprise data sources. These enterprise data sources include documents that are used by an enterprise that must be in compliance with a particular regulation.

METHODS AND APPARATUS FOR CONTAINER ATTESTATION IN CLIENT-BASED WORKLOADS

Methods, apparatus, and systems are disclosed for container attestation in client-based workloads. An example apparatus includes at least one memory, machine readable instructions, and processor circuitry to at least one of instantiate or execute the machine readable instructions to access a container attestation and an owner policy, the container attestation including a first signature and the owner policy including a second signature, determine that the first signature and the second signature are valid, iterate through configuration sets of the owner policy to identify a match between a claim of the container attestation and a configuration set, identify a resource constraint associated with the configuration set, and generate a resource description based on the resource constraint, the resource description to determine execution of a container workload on a client-based platform.

Method and system for container background unlock

Described herein is a system and method of application container access, the method includes performing a foreground unlock on an application container; creating a copy of a container key of the application container; locking the application container; receiving a background unlock trigger; determining whether a background unlock is authorized; performing the background unlock on at least a portion of the application container using the copy of the container key in response to determining the background unlock is authorized; and storing data in the at least a portion of the application container while the application container is in the background unlock.

Documenting and annotating code activities

One example method of operation may include identifying a code segment accessed during a code access event, scanning code of the code segment to identify a degree of sensitivity of the code, appending a code access annotation to the code segment based on detected actions performed to the code during the code access event, and updating a code log to identify the code access annotation.

METHODS AND SYSTEMS FOR DEEP LEARNING BASED API TRAFFIC SECURITY

The present invention relates to the field of networking and API/application security. In particular, the invention is directed towards methods, systems and computer program products for deep learning based API traffic analysis and network security. The invention provides an automated approach to threat and/or attack detection by machine learning based accumulation and/or interpretation of various API/application traffic patterns, identifying and mapping characteristics of normal traffic for each API, and thereafter identifying any deviations from the normal traffic parameter baselines, which deviations may be classified as anomalies or attacks.

DYNAMIC LOADING OF AN EXTENDING APPLICATION
20230123496 · 2023-04-20 ·

An apparatus, system and product including a software agent configured to monitor and interact with a Document Object Model (DOM) of a page of an Electronic Health Record (EHR) system; a runtime infrastructure that is loaded, dynamically, in the page in a first iframe; an EHR-specific EHR adapter that is loaded, dynamically, in the page; and an extending application that is loaded, dynamically, in the page in a second iframe, wherein the EHR-specific EHR adapter is configured to receive EHR-specific instructions from the software agent and communicate converted cross-EHR instructions to the runtime infrastructure, wherein the runtime infrastructure is configured to communicate the converted cross-EHR instructions to the extending application and receive cross-EHR instructions from the extending application, wherein the EHR-specific EHR adapter is configured to obtain the cross-EHR instructions and communicate converted EHR-specific instructions to the software agent.

Fleet monitoring

A system for providing security to a fleet of vehicles, the system comprising: a plurality of modules, each module configured to monitor messages propagating in an in-vehicle network of a vehicle comprised in the fleet; a memory having data characterizing messages, and software executable to: identify an anomaly in communications over the in-vehicle communication network; and instruct a communication interface, configured to support communication with an entity external to the vehicle, to transmit monitoring data responsive to the messages; and a processor configured to execute the software in the memory; and a data monitoring and processing hub external to the vehicles comprised in the fleet and operable to receive transmission of monitoring data from the plurality of modules.