Patent classifications
G06F21/6209
Providing access to usage reports on a cloud-based data warehouse
Providing access to usage reports on a cloud-based data warehouse including maintaining, by a management module, a metadata table on the cloud-based data warehouse, wherein the metadata table comprises usage reports for a plurality of organizations; receiving, by the management module, a request for the metadata table from an administrator account for a first organization of the plurality of organizations; granting, by the management module, the administrator account permission to access a filtered portion of the metadata table, wherein the filtered portion of the metadata table is generated by filtering the metadata table by an organization identifier of the first organization; and providing, by the management module, the filtered portion of the metadata table to the administrator account.
DATA ACCESS METHOD AND APPARATUS
A data access method performed by a processing device is disclosed. The processing device manages a storage device based on a log-structured file system (LFS), where the processing device writes a target file to the storage device based on an out place update (OPU) mechanism; and the processing device writes file attribute information corresponding to the target file in the storage device to out of band (OOB) data of the storage device, to restore, after abnormal power-off, access to the target file by using the file attribute information stored in the OOB data. In this way, when writing the target file to the storage device, the processing device may write a file attribute corresponding to the target file to the OOB data, so that after abnormal power-off, access to the target file may be restored by using the file attribute information.
DEPLOYING A SYSTEM-SPECIFIC SECRET IN A HIGHLY RESILIENT COMPUTER SYSTEM
A computer-implemented method for providing a system-specific secret to a computing system having a plurality of computing components is disclosed. The method includes storing permanently a component-specific import key as part of a computing component and storing the component-specific import key in a manufacturing-side storage system. Upon a request for the system-specific secret for a computing system, the method includes identifying the computing component comprised in the computing system, retrieving a record relating to the identified computing component, determining the system-specific secret protected by a hardware security module and determining a system-specific auxiliary key. Furthermore, the method includes encrypting the system-specific auxiliary key with the retrieved component-specific import key, thereby creating a auxiliary key bundle, encrypting the system-specific secret and storing the auxiliary key bundle and a system record in a storage medium of the computing system.
CLIENT-PROVISIONED CREDENTIALS FOR ACCESSING THIRD-PARTY DATA
Accessing third-party service provider data on behalf of a first-party service provider without having to provide credentials to a first-party service provider server(s) is described. A credential may be received via a user interface presented by a mobile payment application associated with a service provider, the credential being associated with a user account of a user and a third-party service provider. The mobile payment application may then send the credential to a computing device(s) of the third-party service provider, which causes a session to be established between the mobile payment application and the third-party device(s). The mobile payment application may receive, via the session, user data associated with the user account from the third-party device(s), and may send, without having provided the credential to a computing device(s) of the service provider, at least a portion of the user data to the computing device(s) of the service provider.
MEDIA TRANSIT MANAGEMENT IN CYBERSPACE
An embodiment for media transit management is provided. The embodiment may include receiving one or more images and one or more pre-set configuration criteria regarding management of an image file. The embodiment may also include monitoring for an attempted sharing of the image file. The embodiment may further include in response to determining each object in the one or more images matches each object in the image file, identifying at least one other user who is attempting to share the image file. The embodiment may also include in response to determining the at least one other user is not authorized to share the image file, analyzing the one or more pre-set configuration criteria correlated with the image file. The embodiment may further include in response to determining the image file does not meet the one or more pre-set configuration criteria, prompting the participating user to respond to a notification.
Method and system to facilitate assessment, authorization, and monitoring of policy documents related to an organization
A method for facilitating assessment, authorization, and monitoring of policy documents in organizations for cyber security. The method includes a process of receiving indications of policy documents related to an organization from a user, thus, allowing the user to manager cyber security controls of written policy documents in accordance with regulations and standards. The method also includes retrieving regulations from external databases. Further, the method includes analysis of policy documents against regulations and generating insights. Subsequently, the method transmits the generated insights and/or reports to the user. Further, the method includes receiving monitoring data related to the organization from one or more user's PC devices. Further, the method uses a MD5 (Message Digest algorithm 5) hashing function to ensure that a document has not been tampered with and may include a time-based trigger utilizing a standard green/yellow/red light chart for ongoing authorizations and monitoring.
Dynamic updating of query result displays
Described are methods, systems and computer readable media for dynamic updating of query result displays.
METHOD AND SYSTEM FOR LOGGING EVENT DATA
The invention relates to a method for asseverating video images, photos, audio-video and/or data in general, acquired from different sources (10, 11, 12, 13), wherein the images are first validated to verify the absence of tampering and then subjected to a step of certifying, in which they are encrypted.
The encrypted images are accessible only to authorised and identified users, who are provided with the decryption code. The invention also comprises a system for implementing the method.
Data certification system and process for centralized user file encapsulation, encryption, notarization, and verification using a blockchain
A process for centralized user file encapsulation, encryption, notarization and verification using a blockchain and a system that certifies data in a proprietary “capsule” file format, with tamper-proof blockchain are disclosed. By utilizing a hybridization of both cloud and blockchain storage mechanisms, the present invention allows for the performant and cost-effective certification of large amounts of data. Furthermore, the generation of the capsule allows for users to store both the data payload and its digital notarization. The system then allows for users to share the capsule with others (by way of permissions enforced by the notary system) and upload it for verification of authenticity at a later point in time.
Secure DRM-agnostic key rotation
Systems and methods for managing provisioning of keys prior to a key rotation are provided. A license server generates a license that is associated with a renewal time. The renewal time is a time that is prior to a key rotation time, and triggers a receiver device to send a renewal request prior to the key rotation time. The renewal time may be a randomized time prior to the key rotation time that differs for different receiver devices. The license is transmitted to the receiver device. The license server then receives a renewal request from the receiver device that is triggered at the renewal time. The license server generates a next license that comprises a next key, whereby the next key is a decryption key for decrypting the encrypted signal after the key rotation time. The next license is transmitted to the receiver device prior to the key rotation time.