G06F16/11

System for Dissemination of Sensitive Information
20230050924 · 2023-02-16 ·

The present disclosure provides a system for disseminating sensitive information. The system includes a software application which comprises a mobile application installed on a mobile device that enables a user to capture images, via a camera provided by the mobile device, of one or more documents which can then be subsequently uploaded to a remote database. The software application may also include a web-based application. The software application comprises a document checklist, document validation module, and an external communication module. After the electronic files are uploaded to the remote database the user may utilize the document validation module to cross-reference certain personal information is consistently disclosed within each of the one or more documents. The external communication module is configured to allow the user to select one or more electronic files from the remote database and electronically transmit the selected files to another party via an electronic facsimile (E-Fax).

SYSTEMS AND METHODS FOR MATCHING ELECTRONIC ACTIVITIES WITH RECORD OBJECTS BASED ON ENTITY RELATIONSHIPS

The present disclosure relates to systems and methods for matching electronic activities with record objects based on entity relationships. The method can include accessing a plurality of electronic activities, identifying an electronic activity, identifying a first participant associated with a first entity and a second participant associated with a second entity, determining whether a record object identifier is included in the electronic activity, identifying a first record object of the system of record that includes an instance of the record object identifier, and storing an association between the electronic activity and the first record object. The method can include determining a second record object corresponding to the second entity, identifying, using a matching policy, a third record object linked to the second record object and identifying a third entity, and storing, by the one or more processors, an association between the electronic activity and the third record object.

SYSTEM AND METHOD FOR AN ULTRA HIGHLY AVAILABLE, HIGH PERFORMANCE, PERSISTENT MEMORY OPTIMIZED, SCALE-OUT DATABASE

A shared-nothing database system is provided in which parallelism and workload balancing are increased by assigning the rows of each table to “slices”, and storing multiple copies (“duplicas”) of each slice across the persistent storage of multiple nodes of the shared-nothing database system. When the data for a table is distributed among the nodes of a shared-nothing system in this manner, requests to read data from a particular row of the table may be handled by any node that stores a duplica of the slice to which the row is assigned. For each slice, a single duplica of the slice is designated as the “primary duplica”. All DML operations (e.g. inserts, deletes, updates, etc.) that target a particular row of the table are performed by the node that has the primary duplica of the slice to which the particular row is assigned. The changes made by the DML operations are then propagated from the primary duplica to the other duplicas (“secondary duplicas”) of the same slice.

System and method for synchronizing data between a customer data management system and a data warehouse

Systems and methods for synchronizing data between a customer data management system and a data warehouse system. A data warehouse server may constantly monitor a dynamic metadata flow from the customer data management system, compare it with the metadata in the data storage device, and dynamically update the metadata in the data storage device. The data warehouse server may track activities over time and accumulate a long running history, which may include multiple versions of accounts in the customer data management system, e.g., the account as of today, the account as of yesterday, and another version that was the account two weeks ago.

Automated orchestration of cyber protection of a set of storage volumes

An Orchestrated Data Recovery (ODR) Cyber Protection Automation (CPA) operates to ensure one-to-one creation of snapsets of a production site and corresponding snapsets of a cyber vault. During an initiation phase, the ODR CPA monitors synchronization of a snapset of production volumes from the production site to the cyber vault. If additional snapsets of the production volumes are created prior to completion of synchronization of the first snapset, the additional snapsets are also synchronized to the cyber vault. Once the initial synchronization of the storage volumes has been completed, the ODR CPA causes a Storage Volume Creation and Management System (SVCMS) to create a snapset of the storage volumes at the cyber vault. Subsequently, each time a snapset is created of the production site, the ODR CPA orchestrates synchronization of the snapset to the cyber vault and creation of a corresponding snapset at the cyber vault.

Interactive and dynamic timeline data merging and management

Techniques for improved data services are provided. Upon receiving a first request from a first client, a first timeline comprising a first plurality of events for an asset indicated in the first request is generated. Upon receiving a second request from a second client, a second timeline comprising a second plurality of events is generated. A first submission for the asset is provided to the first client, comprising updating a first graphical user interface (GUI) output on a first device of the first client. Upon determining that the first client approved the first submission, a merged timeline is generated based on the first and second timelines, where the merged timeline includes the first and second pluralities of events, comprising: updating the first GUI output on the first device, and a second GUI output on a second device of the second client, to indicate the merged timeline.

Methods and systems for encoding URI for arbitrary payload data based on alphanumeric encoding methods
11580064 · 2023-02-14 · ·

Computer-implemented methods and systems for efficient alphanumeric encoding for arbitrary payload data are disclosed. The computer-implemented method, performed by a server system, includes accessing URI-oriented payload data. The method further includes converting the URI-oriented payload data into an alphanumeric data type based, at least in part, on an alphanumeric encoding method. The alphanumeric encoding method may be one of BASE36, BASE37, BASE38-QR-URI-UNRESERVED, BASE42, BASE45, Base64, Base66, Base183, and Base191. The method further includes generating a machine-readable code based, at least in part, on the converted URI-oriented payload data.

Systems and methods for using linked documents

Systems, methods, and non-transitory computer readable media are provided for using linked documents. A system may receive, from a computing device, a request for a document. Content of the document may be defined based on state information and stateless information. A system may determine a local replica of the document in a local database. The local replica of the document may be linked to a primary replica of the document. The local replica of the document may include a snapshot of the primary replica of the document. The primary replica of the document may be stored in a remote database which may be accessible through a remote server. The system may subscribe to the primary replica of the document through the remote server, and may provide access to the document to the computing device based at least in part on the subscription to the primary replica of the document.

Storage system and data processing method

The functions of a mainframe environment are expanded by leveraging the functions of an open environment. A second storage of an open system externally connected to a first storage of a mainframe system comprises a second main volume of an open environment generated in association with a main logical device of the second storage, and a second sub volume of an open environment generated in association with a sub logical device of the second storage; the first storage comprises a first main volume of a mainframe environment generated in association with the main logical device of the second storage, and a first sub volume of a mainframe environment generated in association with the sub logical device of the second storage; when the first storage receives a data processing request from a host, the first storage reflects the processing request in the second storage and completes the processing; and when the first storage receives an execution request of a prescribed function, the first storage causes the second storage to execute the function.

Snapshot performance optimizations

Techniques for creating and using snapshots may include: receiving a request to create a new snapshot of a source object; determining whether a first generation identifier associated with the source object matches a second generation identifier associated with a base snapshot of the source object; determining whether the source object has been modified since the base snapshot was created; and responsive to determining the first generation identifier matches the second generation identifier and also determining that the source object has not been modified since the base snapshot was created, associating the new snapshot with the base snapshot thereby indicating that the new snapshot and the base snapshot have matching content and denote a same point in time copy of the source object.