Patent classifications
H04L63/10
SYSTEMS AND METHODS FOR POSTURE CHECKING ACROSS LOCAL NETWORK ZONE ZTNA CONTROL
Systems, devices, and methods are discussed for providing ZTNA control across multiple related, but independently provisioned networks.
Computer implemented networking system and method for creating, sharing and archiving content including the use of a user interface (UI) virtual environment and associated rooms, content prompting tool, content vault, and intelligent template-driven content posting (AKA archive and networking platform)
A computer implemented networking system and method for content-creating, sharing, and archiving, includes maintaining profiles for a plurality of users each having an account that stores and displays user-authored content posts that are quality controlled, and generating, for each user profile, a virtual structure (e.g. building or house) displayed via a UI, and including a main room and a plurality of sub-rooms each being associated with a respective category, and wherein the main room provides navigation to the sub-rooms. The approach includes generating the user-authored content posts for each of the users via posting templates that prompt a user to input and organize various content based upon the template guidance for the respective category to control the quality of the user-authored content posts. A prompting tool operates within the virtual building for each profile by displaying prompts within each of the sub-rooms and related to the respective category and includes a prioritized list of user tasks.
PMEM cache RDMA security
Techniques are described for providing one or more clients with direct access to cached data blocks within a persistent memory cache on a storage server. In an embodiment, a storage server maintains a persistent memory cache comprising a plurality of cache lines, each of which represent an allocation unit of block-based storage. The storage server maintains an RDMA table that include a plurality of table entries, each of which maps a respective client to one or more cache lines and a remote access key. An RDMA access request to access a particular cache line is received from a storage server client. The storage server identifies access credentials for the client and determines whether the client has permission to perform the RDMA access on the particular cache line. Upon determining that the client has permissions, the cache line is accessed from the persistent memory cache and sent to the storage server client.
Central user management in a distributed healthcare information management system
Centralized support user management in a distributed healthcare information management system. Support user management may include generation of permission data that may be distributed from a central server to one or more local systems. The local systems may execute a healthcare information management application such as, for example, a pharmacy workflow management application. In any regard, central support users at the central server may periodically require access to the local systems to perform, among other activities, technical support or troubleshooting in relation to the application executed at the local system. In turn, provision of permission data from the central server to the local system may allow support users to access the local system with specific permission identification's provided specific ones of the support users. In turn, specific user permissions may be established and support user tracking may be carried out at the local systems.
Method, system, and computer program product for identifying a malicious user
A method, system, and computer program product for identifying a malicious user obtain a plurality of service requests for a service provided by a processing system, each service request of the plurality of service requests being associated with a requesting user and a requesting system, and a plurality of service responses associated with the plurality of service requests, each service response of the plurality of service responses being associated with the processing system; and identify the requesting user as malicious based on the plurality of service requests and the plurality of service responses.
REQUEST AUTHORIZATION
A computer implemented method for generating a dispatch datagram is disclosed. The computer implemented method includes receiving, at a dispatcher, a request from a client. The method further includes generating an authorization header based on the received request. The authorization header includes one or more rules for handling the request. The method further includes wrapping the received request and the generated authorization header together to generate a dispatch datagram.
Secure online transactions
A user device and a server conduct a secure online transaction. The user device transmits received user login and credentials to the server, as well as one or more properties of the user device, such as a list of applications stored on the user device. The server transmits one or more restrictions back to the user device, such as which ports to close, which applications to close, and what features of applications and the operating system should be limited during the transaction. After implementing the restrictions, the user device and the server conduct the online transaction. A unique ID may be transmitted throughout the transaction and the unique ID may be a hash. After the transaction, the user device purges transaction data, restores normal operation, and notifies the server. The transaction may be conducted in a second tunnel and the other communication via a first tunnel.
Managing content item collections
Disclosed are systems, methods, and non-transitory computer-readable storage media for managing content item collections. For example, in embodiment, a client device may receive first user input selecting a content item collection. The client device may generate a graphical user interface for presenting the content item collection. The content item collection may include one or more tiles. Each tile may correspond to a content item embedded into the content item collection and stored by a content management system. The client device may present the content item collection including the one or more tiles. The client device may present, within each of the one or more tiles, an image representing the corresponding content item.
Utilizing encryption key exchange and rotation to share passwords via a shared folder
This disclosure describes methods, non-transitory computer readable storage media, and systems that provide secure password sharing across a plurality of users and client devices via a shared folder. For example, in one or more embodiments, the disclosed system retrieves a public key set including public encryption keys for client devices having access to the shared folder. The disclosed system provides the public key set to a client device requesting to share the shared folder. The disclosed system receives an encrypted payload for the shared folder and a shared encryption key that is utilized to encrypt the payload and is encrypted in the shared folder utilizing the public key set. The disclosed system also detects key rotation events and notifies one or more client devices to generate a modified shared encryption key and re-encrypt the payload for storage within the shared folder.
Decentralized data protection system for multi-cloud computing environment
In a multi-cloud computing environment comprising a plurality of cloud platforms with each cloud platform comprising one or more nodes, a method maintains a decentralized metadata database framework, wherein each node comprises a decentralized metadata database component operatively coupled to each other decentralized metadata database component of the framework and wherein each of at least two of the decentralized metadata database components stores a set of metadata records corresponding to protected data stored across the plurality of cloud platforms. Further, the method manages one or more access requests directed to the protected data through one or more of the decentralized metadata database components of the framework.