G06F16/1824

METHODS AND SYSTEMS FOR REDUCING THE STORAGE VOLUME OF LOG MESSAGES

Automated methods and systems for compressing log messages stored in a log message databased are described herein. The automated methods and systems perform lossy compression of an original set of log messages by identifying log messages that represent each of the various types of events recorded in the original set. The log messages in the original set are overwritten by corresponding representative log messages. Source coding is used to construct a source coding scheme and variable length binary codewords for each of the representative log messages. The representative log messages are replaced by the codewords, which occupies significantly less storage space than the original set. The lossy compressed set of log messages can be decompressed to obtain the representative log messages using the source coding scheme.

Systems and methods for device and user authorization

Systems and methods are described for authorizing users and/or devices. An example method may comprise receiving, from a user device, a request to access a function associated with a service account. The request may comprise an identifier of the user device. The example method may comprise determining, based on the identifier, a primary authority holder of the service account. The example method may comprise determining that a first record on a first distributed ledger associated with the primary authority holder indicates that the user device is associated with the primary authority holder. The example method may comprise determining that a second record on a second distributed ledger associated with the user device indicates that the user device is associated with the primary authority holder. The example method may comprise granting, based on the request, the first record, and the second record, the user device access to the function.

Cluster instance balancing of a database system across zones

The subject technology selects a particular zone among multiple zones based on a target skew to meet a global balancing of cluster instances. The subject technology deploys a particular type of cluster instance to the particular zone. The subject technology, for each zone from the multiple zones, determines a respective number of cluster instances. The subject technology identifies a second particular type of cluster instance to remove based on a total number of the second particular type of cluster instance in the multiple zones and a second total number of the particular type of cluster instance in the multiple zones. The subject technology removes the second particular type of cluster instance from a second particular zone to meet the global balancing of cluster instances in the multiple zones.

CRYPTOGRAPHIC SYSTEMS AND METHODS USING DISTRIBUTED LEDGERS
20230216667 · 2023-07-06 · ·

The disclosure relates to, among other things, systems and methods for facilitating the secure recording of assertions made by entities tied to identities. Embodiments of the disclosed systems and methods may allow users to make non-revocable, difficult to forge, cryptographic assertions tied to their identities through the posting of entries in an immutable ledger. In certain embodiments, a user's cryptographic assertions may be preceded by ledger entries which feature certificates from trusted authorities that tie the keys used for making assertions to the user's identity. Further embodiments provide for a mechanism for disabling further entries posted under a user's key, either automatically or at the user's initiation.

Data labeling awareness for backup systems

Embodiments for a method performing data migration such as backups and restores in a network by identifying characteristics of data in a data saveset to separate the data into defined types based on respective characteristics, assigning a data label to each defined type, defining migration rules for each data label, discovering assigned labels during a migration operation; and applying respective migration rules to labeled data in the data saveset. The migration rules can dictate storage location, access rights, replication periods, retention periods, and similar parameters.

Distributed, crowdsourced internet of things (IoT) discovery and identification using Block Chain

Disclosed embodiments relate to distributed, crowd-sourced Internet of Things (IoT) discovery using Block Chain. In one example, a method includes scanning a network and generating a signature based on IoT device traits discovered, determining whether the signature is already in a verified or an unverified Block Chain, when the signature exists in the verified Block Chain, providing a verified entry including at least the IoT device type, otherwise, when the signature exists in the unverified Block Chain, providing an unverified entry including at least the IoT device type, incrementing a count, and promoting the unverified entry to the verified Block Chain when the count reaches a threshold, and otherwise, when the signature is in neither Block Chain, using the traits to guess the IoT device type, generating a new entry including the IoT device type, a location, and a timestamp, and storing the new entry in the unverified Block Chain.

Information processing system, information processing method, and storage medium

An information processing system includes a file acquirer that acquires a file used in a meeting, an authentication processor that selects, if a password is set to the file acquired by the file acquirer, an authentication scheme of the password, based on meeting information about the meeting, and executes a process of authenticating the password by the selected authentication scheme, and a file executer that executes the file if the password is authenticated by the authentication processor.

Integrated universal file converter
11693817 · 2023-07-04 · ·

Universal, automatic file conversion may be provided by a universal file conversion system or application. An input file may be received by the universal file conversion system. An input file type for the input file and a recipient of the input file may be determined. Programs available to the recipient for accessing a file may be determined. A target file type accessible to the recipient may be determined for converting the input file. A sequence of file conversions to convert the input file to the target file type may be determined. The input file may be converted to the target file type based on the sequence of file conversions. The converted file may be provided to the recipient. The recipient may return the converted file, and the converted file may be automatically converted back to the original input file type and provided to the original source of the input file.

Threat information sharing based on blockchain

Systems and methods provide a platform for threat information sharing. A method comprises transmitting an access permission request to a blockchain network. The request asks for access to cyber threat information stored in at least one cyber threat information storage system. The information may come from a plurality of organizations. The blockchain network may include a blockchain ledger storing access control information from the plurality of organizations. Upon receipt of a reference to an access permission token generated by the blockchain network using at least one smart contract, a transaction request to the cyber threat information server may be sent. In response to the transaction request including the reference to the access permission token, the requested cyber threat information may be retrieved from the cyber threat information server.

Mobile platform file and folder selection functionalities for offline access and synchronization
11537630 · 2022-12-27 · ·

Systems and methods for folder synchronization and offline synchronization via a mobile platform in a web-based collaboration environment are disclosed. One embodiment includes synchronizing user selected folders and/or sub-folders via the mobile platform, using portable devices including smart phones and tablets using any mobile operating system to allow offline access. Child or sub-folders of the selected folders and/or sub-folders are automatically detected and synchronized for offline access. Any change or new content detected on the client side or on the server side is also synchronized such that the selected folders and/or sub-folders on the client and server sides are up to date.