G06F21/6218

ODOMETER FRAUD DETECTION VIA DATA STORAGE ON COMPONENTS

An example operation includes one or more of incrementing an epoch value related to a transport event, transmitting the incremented epoch value to at least one component on the transport, receiving an odometer reading comprising the epoch value and comparing the epoch value of the odometer reading and the incremented epoch value to determine whether the odometer reading is valid.

AUTOMATICALLY ASSIGNING DATA PROTECTION POLICIES USING ANONYMIZED ANALYTICS
20230052851 · 2023-02-16 ·

Embodiments for a system and method of selecting data protection policies for a new system, by collecting user, policy, and asset metadata for a plurality of other users storing data dictated by one or more protection policies. The collected metadata is anonymized with respect to personal identifying information, and is stored in an anonymized analytics database. The system receives specific user, policy and asset metadata for the new system from a specific user, and matches the received specific user metadata to the collected metadata to identify an optimum protection policy of the one or more protection policies based on the assets and protection requirements of the new system. The new system is then configured with the identified optimum protection policy as an initial configuration.

Extensible platform for orchestration of data with enhanced security
20230046370 · 2023-02-16 ·

In a computer system, an orchestration platform includes extensible components that interact with external systems and technology. The platform is secured by means of architectural features, encryption, and access control.

Local controller for local API authorization method and apparatus

Some embodiments provide a local controller on a set of host computers that reduce the volume of data that is communicated between the server set and the set of host computers. The local controller executing on a particular host computer, in some embodiments, receives a portion of the namespace including only the policies (e.g., opcode) that are relevant to API-authorization processing for the applications executing on the particular host computer provided by a local agent executing on the computer to authorize the API requests based on policies and parameters. The local controller analyzes the received policies (e.g., policy opcodes) and identifies the parameters (e.g. operands), or parameter types, needed for API-authorization processing (e.g., evaluating the policy opcode upon receiving a particular API request) by the local agent. In some embodiments, the local controller performs this analysis for each updated set of policies (e.g., policy opcodes).

CONDITIONAL ROLE DECISION BASED ON SOURCE ENVIRONMENTS
20230047320 · 2023-02-16 ·

Example implementations can involve a system, which can involve a server configured to distribute role decision condition expressions created based on user input to one or more storage devices; and the one or more storage devices, which can involve a processor, configured to, for receipt of a request, determine user identification information, request source environment information and requested contents from the request; determine a role from the role decision condition expressions based on the user identification information and request source environment information; and determine whether or not the request can be executed based on the role.

Fine-grained access control via database roles

Embodiments of the present disclosure relate to sharing database roles using hidden roles. A database role may be generated within a database container having a plurality of data objects, wherein the database role exists exclusively within the database container. A set of grants to a particular subset of the plurality of data objects of the database container may be assigned to the database role. For each of a set of share objects to which the database role is to be granted: a hidden role having no identifier may be created, the database role may be granted to the hidden role, and the hidden role may be granted to a share object. Each of the set of share objects are mounted within a consumer account to generate a set of imported database containers within the consumer account, wherein each imported database container includes an individualized grant of the database roles.

Virtualized file server smart data ingestion

In one embodiment, a system for managing a virtualization environment includes a set of host machines, each of which includes a hypervisor, virtual machines, and a virtual machine controller, and a data migration system configured to identify one or more existing storage items stored at one or more existing File Server Virtual Machines (FSVMs) of an existing virtualized file server (VFS). For each of the existing storage items, the data migration system is configured to identify a new FSVMs of a new VFS based on the existing FSVM, send a representation of the storage item from the existing FSVM to the new FSVM, such that representations of storage items are sent between different pairs of FSVMs in parallel, and store a new storage item at the new FSVM, such that the new storage item is based on the representation of the existing storage item received by the new FSVM.

Reducing latency of digital content delivery over a network
11580186 · 2023-02-14 · ·

A system including an electronic document inspection device that identifies a set of electronic documents using a search query; a composite page generator that generates a composite page that i) is hosted by a different domain than at least some electronic documents in the set of electronic documents and ii) includes electronic documents from the set of electronic documents; an asset package generator that generates digital content asset packages, each digital content asset package including i) digital content assets and ii) instructions that specify a configuration of the digital content assets for the respective digital content asset package; and an asset package list generator that generates a digital content asset package list specifying an order of presentation of the digital content asset packages, wherein the composite page, the digital content asset packages, and the digital content asset package list are transmitted to a user device that provides the search query.

Permissions from entities to access information

In some examples, in response to a request from a client device for information relating to a transaction stored by a blockchain, a system identifies, using information stored in a distributed storage system that stores data for the blockchain, multiple data owner entities from which permissions are to be obtained for access of the information, and determines an authorization requirement for the information based on a smart contract. The system sends authorization information based on the authorization requirement to trigger a retrieval of authorization tokens from the identified data owner entities for access of the information, and sends the information to the client device in response to receiving the authorization tokens.

Setup procedures for an electronic device
11582517 · 2023-02-14 · ·

In some embodiments, an electronic device can guide the user in setting up the device for the first time or after a factory reset. In some embodiments, an electronic device facilitates suggesting and installing applications on the electronic device during device setup. In some embodiments, an electronic device facilitates transferring settings and information from another electronic device during device setup.