G06F21/6272

Trusted communications between untrusting parties
11582209 · 2023-02-14 · ·

A system and method is disclosed for assuring that networked communications between parties playing a game on a network (e.g., the Internet) are not tampered with by either of the parties for illicitly gaining an advantage over the other party. An initial sequence of tokens (e.g., card representations) for playing the game are doubly encrypted using an encryption key from each of the parties. Accordingly, during play of the game neither party can modify the initial sequence of game tokens during the game. At termination of the game, at least one of the parties can fully decrypt the initial sequence of tokens, and thereby, if desired, compare the played token sequence with the corresponding the initial token sequence.

Providing services according to a context environment and user-defined access permissions

Disclosed are various embodiments for establishing a connection between a client device and a third-party entity device and providing services associated with a third-party entity to the client device according to user-defined access permissions. A context environment can be determined according to user data and third-party entity data. Services available to the user device can be selected according to the context environment, the user-defined access permissions and third-party defined instructions. Upon selecting the services, the services are provided to the client device and a connection between the client device and a third-party entity device can be established.

MEDIA TRANSIT MANAGEMENT IN CYBERSPACE
20230039068 · 2023-02-09 ·

An embodiment for media transit management is provided. The embodiment may include receiving one or more images and one or more pre-set configuration criteria regarding management of an image file. The embodiment may also include monitoring for an attempted sharing of the image file. The embodiment may further include in response to determining each object in the one or more images matches each object in the image file, identifying at least one other user who is attempting to share the image file. The embodiment may also include in response to determining the at least one other user is not authorized to share the image file, analyzing the one or more pre-set configuration criteria correlated with the image file. The embodiment may further include in response to determining the image file does not meet the one or more pre-set configuration criteria, prompting the participating user to respond to a notification.

Facilitating processing of a query on shareable data in a temporary vault
11556667 · 2023-01-17 · ·

A method includes obtaining, by a consumer computing device of a data communication network, a temporary credential in accordance with a temporary credential protocol. The method continues with accessing, by the consumer computing device, a temporary vault in accordance with the temporary credential, where the temporary vault stores or is to store a set of shareable data records. The method continues with facilitating, by the consumer computing device, execution of a data analysis function on the set of shareable data records to produce an analytical result. The method continues with receiving, by the consumer computing device from the temporary vault, the analytical result. The method continues with storing, by the consumer computing device, the analytical result in memory associated with the user computing device.

Data storage method, device, related equipment and cloud system for hybrid cloud

Embodiments of this application provide a hybrid-cloud data storage method and apparatus, a related device, and a cloud system. The data storage method includes: obtaining, by a gateway of a private cloud, to-be-stored data; determining partial data to be encrypted in the to-be-stored data, to obtain first target data; obtaining a first ciphertext obtained after the first target data is encrypted, the first target data being encrypted according to a first key provided by an encryption chip connected to the gateway; generating second target data including the first ciphertext according to the first ciphertext; generating a data slice corresponding to the second target data according to the second target data; and transmitting the data slice corresponding to the second target data to a public cloud for storage.

SECURE RESTORE OF A COMPUTING SYSTEM
20230011413 · 2023-01-12 ·

Examples described herein relate to a method and a system, for example, a restore management system for providing secure restore of computing system. In some examples, the restore management system may determine that the computing system is restored. Further, the restore management system may isolate the computing system by restricting access to the computing system for any data traffic other than data traffic associated with a security fix to be applied to the computing system. Furthermore, the restore management system may determine that the security fix has been successfully applied to the computing system and, in response to determining that the security fix has been successfully applied, the restore management system may remove the computing system from isolation.

SYSTEMS AND METHODS FOR STORING AND SHARING TRANSACTIONAL DATA USING DISTRIBUTED COMPUTING SYSTEMS
20180006831 · 2018-01-04 ·

A computer system that interfaces with a blockchain is provided. The computer system receives match data for a match between a first data transaction request that is associated with a first identifier and a second data transaction request that is associated with a second identifier. A first blockchain transaction is generated based on the match data and stored to a blockchain. At least one further blockchain transaction is generates that splits the match into two different transactions—one between the first identifier and an intermediary and the second between the intermediary. These are recorded to the blockchain via the further blockchain transactions.

SYSTEM AND METHOD FOR GLOBAL DATA SHARING

Sharing data in a data exchange across multiple cloud computing platforms and/or cloud computing platform regions is described. An example method can include generating a consumer account corresponding to a first cloud entity and receiving, by the first cloud entity, a copy of a data set from a provider account corresponding to a second cloud computing entity, wherein the first cloud computing entity and the second cloud computing entity represent different regions of a cloud computing platform. The method may also include accessing, by the consumer account, the copy of the data set.

PROVIDING GLOBAL ACCESSIBILITY TO PRESCRIBED MEDICATIONS
20230005609 · 2023-01-05 ·

Systems and methods for providing user-controlled access to prescribed medications are provided. A cloud-based prescription database includes prescriptions, each associated with a unique patient identifier, locations of pharmacies, and available stock for the pharmacies. A unique patient identifier is received from a user device and the related prescriptions are retrieved from the database and displayed for user selection. Pharmacies which are geographically proximate to a location of the given user device which report availability of the medication associated with the user selected prescription are displayed at a map at the given user device.

Methods and systems for managing third-party data risk

Some embodiments of the present disclosure disclose methods and systems for assessing the data risk management capabilities of data processors that receive second-party data as part of an engagement to provide support services. In some embodiments, the transfer of the second-party data to the data processors can be monitored to identify file transfers including unauthorized personally identifiable information (PII) attributes. In some embodiments, the database of the data processor may be scanned to locate any residual second-party data that should be removed after the data processor's engagement to provide the support services have expired.