Patent classifications
G06F21/6245
DATA RISK OF AN INSTANCE
Each instance environment of a plurality of computing instance environments is associated with its corresponding set of users belonging to one or more user groups, its corresponding processes, and its corresponding data access privileges. For at least one of the computing instance environments, database tables accessible by the corresponding computing instance environment are analyzed to determine whether each of the database tables includes data belonging to one or more sensitive data categories. Based at least in part on a result of the analysis determining whether each of the database tables includes data belonging to the one or more sensitive data categories, a data risk metric is determined for the corresponding computing instance environment.
System for Dissemination of Sensitive Information
The present disclosure provides a system for disseminating sensitive information. The system includes a software application which comprises a mobile application installed on a mobile device that enables a user to capture images, via a camera provided by the mobile device, of one or more documents which can then be subsequently uploaded to a remote database. The software application may also include a web-based application. The software application comprises a document checklist, document validation module, and an external communication module. After the electronic files are uploaded to the remote database the user may utilize the document validation module to cross-reference certain personal information is consistently disclosed within each of the one or more documents. The external communication module is configured to allow the user to select one or more electronic files from the remote database and electronically transmit the selected files to another party via an electronic facsimile (E-Fax).
DATA PROCESSING SYSTEMS AND METHODS FOR BUNDLED PRIVACY POLICIES
Data processing systems and methods, according to various embodiments, are adapted for determining an applicable privacy policy based on various criteria associated with a user and the associated product or service. User and product criteria may be obtained automatically and/or based on user input and analyzed by a privacy policy rules engine to determine the applicable policy. Text from the applicable policy can then be presented to the user. A default policy can be used when no particular applicable policy can be identified using by the rules engine. Policies may be ranked or prioritized so that a policy can be selected in the event the rules engine identifies two, conflicting policies based on the criteria.
SYSTEMS AND METHODS FOR MATCHING ELECTRONIC ACTIVITIES WITH RECORD OBJECTS BASED ON ENTITY RELATIONSHIPS
The present disclosure relates to systems and methods for matching electronic activities with record objects based on entity relationships. The method can include accessing a plurality of electronic activities, identifying an electronic activity, identifying a first participant associated with a first entity and a second participant associated with a second entity, determining whether a record object identifier is included in the electronic activity, identifying a first record object of the system of record that includes an instance of the record object identifier, and storing an association between the electronic activity and the first record object. The method can include determining a second record object corresponding to the second entity, identifying, using a matching policy, a third record object linked to the second record object and identifying a third entity, and storing, by the one or more processors, an association between the electronic activity and the third record object.
VARIABLE TRANSPORT DATA RETENTION AND DELETION
An example operation includes one or more of encrypting, by a transport, received data based on a first biometric associated with an occupant, unencrypting, by the transport, the encrypted data, based on a verification of a second biometric, wherein the second biometric is a continuum of the first biometric, and providing, by the transport, the unencrypted data to the occupant.
WATERMARKING OF GENOMIC SEQUENCING DATA
Examples are described for dynamically applying a digital watermark to a file, such as a dataset of genomic sequencing data. In one example, a method of dynamically applying a watermark to at least a portion of a file includes generating, using a secret key, a first random seed, generating, using the first random seed, an ordered pseudorandom set of integers, generating, using entity information and timing information, a second random seed, selecting, using the second random seed, a subset of the ordered pseudorandom set of integers, and modifying data at data locations in the file corresponding to at least a portion of the identifiers included in the subset to generate a watermarked file. The method may further include performing a check to determine whether the watermark is present in a file using a sequence of watermark elements that are generated based on the secret key.
In-Vehicle Speech Interaction Method and Device
An in-vehicle speech interaction method and a device are provided. The method includes: obtaining user speech information; determining a user instruction based on the user speech information; determining, based on the user instruction, whether response content to the user instruction is privacy-related; and determining, based on whether the response content is privacy-related, whether to output the response content in a privacy protection mode, to protect privacy from being leaked.
SECURE COMPUTATION SYSTEM, SECURE COMPUTATION SERVER APPARATUS, SECURECOMPUTATION METHOD, AND SECURE COMPUTATION PROGRAM
Each of a secure computation server apparatuses includes a random number generation part that generates random numbers using a pseudo random number generator shared among the secure computation server apparatuses; a seed storage part that shares and stores a seed(s) used for generating random numbers in the random number generation part; a pre-generated random number storage part that stores random numbers generated by the random number generation part; a share value storage part that stores a share(s) to be a target of processing; a logical operation part that computes a carry to be transmitted and received among the secure computation server apparatuses using the random numbers and the share(s) to be a target of processing; an inner product calculation part that removes a mask from the carry; and an arithmetic operation part that performs a processing of erasing the carry to obtain a processing result.
DATA PROCESSING METHOD, APPARATUS, AND SYSTEM, DEVICE, AND MEDIUM
A data providing apparatus obtains first privacy data and second privacy data, encrypts the first privacy data by using an encryption algorithm to obtain a ciphertext of the first privacy data, and sends the ciphertext of the first privacy data and the second privacy data to a data processing apparatus. The data processing apparatus inputs the ciphertext of the first privacy data and the second privacy data into a ciphertext computation function to obtain a ciphertext of a data processing result. In this way, the first privacy data is used in computation in a ciphertext form, thereby ensuring security. In addition, the second privacy data is used in computation in a plaintext form, thereby reducing ciphertext input for the ciphertext computation function.
ADDITIVE AND SUBTRACTIVE NOISE FOR PRIVACY PROTECTION
This disclosure relates to using additive and subtractive noise for preserving the privacy of users. In one aspects, a method includes obtaining a first set of genuine user group identifiers that identify user groups that include a user as a member. A second set of user group identifiers is generated for the user by removing zero or more genuine user group identifiers from the first set to generate the second set and adding, to the second set, one or more fake user group identifiers for user groups that do not include the user as a member. A probabilistic data structure is generated based on the second set of user group identifiers. The probabilistic data structure is transmitted to a recipient computing system. Data indicating a set of digital components including at least one digital component selected based on the probabilistic data structure is received. A given digital component is presented.