G06F21/6272

SYSTEMS AND METHODS FOR DOCUMENT HIERARCHY PERMISSIONING
20230028302 · 2023-01-26 · ·

Provided herein are systems, methods, and computer readable media for document hierarchy permissions. This may include providing a permission database comprising a plurality of users, a plurality of advisors, and a plurality of categories. A candidate document is received at a network device. A candidate user, a candidate routing action, and a candidate document category are identified from the candidate document. A candidate document permission attribute is generated identifying the candidate user, candidate file location, and the candidate document category. The candidate document is stored, and the candidate document permission attribute corresponding to the candidate document is stored.

SECURE PLATFORM FOR THE DISSEMINATION OF DATA
20230229810 · 2023-07-20 ·

A method including receiving, at a data distribution platform, a selection of a data package comprising a high fidelity ata package. The method also includes filtering, automatically by a filtering application of the data distribution platform, the high fidelity data package to form a marketing data package. Filtering includes removing sufficient data from the high fidelity data package such that the marketing data package is a marketing data package. The method also includes publishing the marketing data package within the data distribution platform.

Systems and methods for generating and managing dynamic customized electronic tokens for electronic device interaction

Systems and methods are provided for generating and managing dynamic customized electronic tokens for electronic device interactions. A system for transferring data between a user device associated with a user and a remote device may include a memory storing instructions and a processor configured to execute the stored instructions. The stored instructions may configure the processor to receive, via a network, transaction information from the remote device, access information associated with an electronic token, and provide the electronic token to the remote device. The electronic token may be associated with at least one of the user or the user device, and a token server may generate the electronic token based on the received transaction information, and determine one or more expiration parameters for the electronic token.

Data management system, data management apparatus, and non-transitory computer readable medium storing data management program
11704296 · 2023-07-18 · ·

A data management system includes a management apparatus including a processor, and plural storage devices. The processor is configured to generate hash values corresponding to data to be managed according to a predetermined calculation rule, the plural storage devices stores first hash values that are hash values generated by the processor at a first point in time, and the processor is configured to perform determination of invariance related to the plural first hash values or the data by comparing sets including the plural of first hash values read out from the plural storage devices and second hash values that are hash values regenerated according to the calculation rule at a second point in time later than the first point in time.

Retrieving hidden digital identifier

A method of providing access to securely held data is provided. A user interacts with the service provider to obtain access to a service by using a device to provide a digital identifier to the service provider, without the digital identifier being made known to the user. At a later date the user wishes to retrieve securely stored data relating to their use of the service. However, because the user does not know the digital identifier, they are unable to identify themselves to the service provider using the digital identifier. The present disclosure provides a secure method for exchanging private identifiers, which allows the user to identify themselves to the service provider in order to gain access to securely stored data relating to the user's previous use of the service. The user can do this using the device on which the digital identifier is stored, or another device.

Systems and methods for storing and sharing transactional data using distributed computer systems
11695578 · 2023-07-04 · ·

A computer system that interfaces with a blockchain is provided. The computer system receives match data for a match between a first data transaction request that is associated with a first identifier and a second data transaction request that is associated with a second identifier. Based on the match data, first and second blockchain transactions are generated. The first blockchain transaction is from a first identifier to an intermediary identifier and the second blockchain transaction is from the intermediary identifier to the second identifier. The first and second blockchain transactions are submitted to the blockchain. A further blockchain transaction is generated and submitted to the blockchain that includes a programmatic structure with a timer condition.

System for performing service by using biometric information, and control method therefor

A system for performing a service by using biometric information is disclosed. A system according to the present disclosure comprises an electronic device, a first server and a second server, and a control method of the system comprises the steps of: allowing the electronic device to acquire first biometric information; allowing the electronic device to acquire first encrypted data, in which the first biometric information is encrypted, by using the acquired first biometric information and a first encryption key, and to transmit same to the first server, allowing the first server to acquire second encrypted data, in which the first encrypted data is encrypted, by using the first encrypted data received from the electronic device and a second encrypted key, and first user identification information corresponding to the first biometric information, and to transmit same to the second server; allowing the second server to match the second encrypted data and the first user identification information corresponding to the biometric information, which are received from the first server, and to store same; allowing the second server to acquire authentication information on the basis of the matched second encrypted data and first user identification information, and to transmit same to the first server, and allowing the first server to register the authentication information on the biometric information.

Generating and continuously maintaining a record of data processing activity for a computer-implemented system

Technologies related to generating and continuously maintaining a record of data processing activities are described herein, where the processing record is generated on behalf of an enterprise that operates an enterprise computing system. The processing record includes numerous fields related to the processing of data by the enterprise computing system, and such fields are automatically generated based upon information pertaining to the enterprise computing system that is acquired from several different sources.

DATA MANAGEMENT

In some examples, a method for data management, the method comprises booting a trusted diskless operating system image via a device firmware component, accessing a non-volatile storage of the device using the trusted diskless operating system image; and retrieving user data from the non-volatile storage of the device, and/or writing user data received from a remote location to the non-volatile storage of the device.

Device resource management during video streaming and playback
11528532 · 2022-12-13 · ·

Techniques described herein include evaluation and management of device hardware, software, and network resources during streaming, downloading, or playback of video resources on client devices from remote locations. Certain aspects relate to evaluating the current resources available at a client device, such as memory, processing capacity, device battery status, network availability and/or network data quotas, in view of a video resource request. Based on the evaluation of the client device's resources, and estimations of the effects that video streaming/downloading and playback may have on the client device's resources, the client device may control, customize, and/or alter the retrieval or playback of requested video resources.