H04L63/30

Method and system for providing data privacy based on customized cookie consent

The disclosure herein describes a method and a system for providing data privacy based on customized cookie consent. The proposed customized cookie consent system enables user's data privacy by facilitating the user to customize a plurality of features for each individual cookie, wherein a cookie is customized for multiple features that includes a consent and expiry customization, a drill down at individual cookie, an online masking unmasking cookie data—an offline masking-unmasking cookie data, a consent lineage and a data subject rights for cookie data that further include data access, data portability, right to erasure based on machine learning techniques. Further the customized cookie consent system also provides recommendation for data privacy and obscured cookies using machine learning techniques.

Portable recording device for real-time multimedia streams

This disclosure describes a portable recording device that is configured to capture real-time multimedia data from a surrounding environment. The portable recording device may comprise one or more sensors to capture the real-time multimedia data, a category selector to selectively toggle between preset positions that designate a category classification to the real-time data, and an activation button to trigger one or more actions relating to the capture of the real-time multimedia data.

Single sign on (SSO) capability for services accessed through messages

Disclosed are various approaches for facilitating single sign-on (SSO) for third-party services that are accessible through messages (e.g., email) received by a user. A user can receive a message that includes an embedded URL or link that opens in a third-party service that requires authentication. Instead of requiring the user to enter authentication credentials for accessing the third-party service, a tunnel service can be used to intercept requests for authentication and redirect the requests to an identity manager that can issue a SSO token following an authentication of the user and device. Upon supplying the third-party service with the SSO token, the user can access the content associated with the third-party service without entering authentication credentials.

DLP Exact Data Matching
20220374599 · 2022-11-24 ·

Systems and methods of Exact Data Matching (EDM) include receiving customer specific sensitive data for a customer, wherein the customer specific sensitive data are converted into a plurality of tokens; receiving a configuration for exact data matching of the plurality of tokens; performing inline monitoring of a user associated with the customer; detecting a presence of one or more tokens of the plurality of tokens based on the inline monitoring; and, responsive to the detecting, performing an action based on the configuration.

System and method for controlling, monitoring and recording of wireless telecommunications services in penal institutions
11501395 · 2022-11-15 ·

A system for controlling, monitoring, and recording of wireless telecommunications services associated with penal institutions is provided comprising a portable electronic device and application executing on the device that present a listing of available call destinations based on receiving a first instruction from a first authorized party possessing the device. The application receives a second instruction comprising a choice of a first call destination from the listing. The application transmits a third instruction requesting connection with the destination and joins a second authorized party associated with the first call destination in a first voice session. The application joins the first authorized party to the first session. The application further joins the first party to a second voice session initiated by the second party based on determining that the second party initiated the second session from the first destination. The device originates and receives transmissions solely upon approval of the application.

Leveraging instrumentation capabilities to enable monitoring services
11494484 · 2022-11-08 · ·

The disclosed embodiments disclose techniques for leveraging instrumentation capabilities to enable monitoring services. During operation, an operating system kernel is instrumented to associate a sub-program with a target operation. Upon receiving a request from an application to perform the target operation, the operating system kernel executes the sub-program with kernel privileges in the process context of the application. The sub-program analyzes the memory space associated with the application to extract a desired data value. This extracted data value is returned to at least one of a specified target process or target location.

INCIDENT REPORT GENERATION FROM MULTIMEDIA DATA CAPTURE
20230083330 · 2023-03-16 ·

This disclosure describes an apparatus and system for classifying audio and video data captured by a portable recording device. The portable recording device may comprise a camera system enclosure that captures audio and video data that reflects a user’s point-of-view perception of their surroundings. The video and/or audio data may be transmitted in real-time, or near real-time, to a Central Multimedia Management (CMM) System at a Network Operations Center, or one or more mobile computing devices, via one or more networks. Alternatively, or additionally, the video and/or audio data may be stored within memory of the portable recording device. This disclosure further describes a CMM system that may act as a central repository of multimedia data from one or more portable recording device(s). The CMM system may further generate and assign incident report forms for each individual instance of real-time data that is recorded by a portable recording device.

PERSONAL SECURITY MONITORING
20230130298 · 2023-04-27 ·

Computer-implemented services provide personal security monitoring and/or oversight of interactions between parties that may be initiated online, and in some circumstances extended to real-world in-person interactions. Profiles associated with individuals involved in a transaction may be developed and centrally managed. Profiles may contain, e.g., information concerning a user's identity, historical and/or current location information, user communication information, and the like. Profile information may be used by a central security oversight platform and/or provided to third party systems for, e.g., assessing risks involved in a particular interaction, providing accountability amongst users, and assisting law enforcement or third parties in transaction intercession and/or investigation in the event that an interaction results in negative consequences.

Detection of network hops and latency through an opaque tunnel and detection misconfiguration of tunnels

Techniques for using traceroute with tunnels and cloud-based systems for determining measures of network performance are presented. Systems and methods include requesting a trace to a destination with a signature inserted into a trace packet; receiving a response to the trace packet; when the response does not include tunnel info, providing details in the response to a service where the details include parameters associated with a service path between the client and the destination; and, when the response includes tunnel info, segmenting the service path into a plurality of legs, causing a trace for each of the plurality of legs, and aggregating details for each of the plurality of legs based on the causing.

Inline secret sharing

Embodiments are directed to monitoring communication between computers using network monitoring computers (NMCs). NMCs identify a secure communication session established between two of the computers based on an exchange of handshake information associated with the secure communication session. Key information that corresponds to the secure communication session may be obtained from a key provider such that the key information may be encrypted by the key provider. NMCs may decrypt the key information. NMCs may derive the session key based on the decrypted key information and the handshake information. NMCs may decrypt network packets included in the secure communication session. NMCs may be employed to inspect the one or more decrypted network packets to execute one or more rule-based policies.