Patent classifications
G06F2221/21
Distributing search loads to optimize security event processing
Disclosed herein are methods, systems, and processes to distribute and disperse search loads to optimize security event processing in cybersecurity computing environments. A search request that includes a domain specific language (DSL) query directed to a centralized search cluster by an event processing application is intercepted. The event processing application is inhibited from issuing the search request to the centralized search cluster if a structured or semi-structured document matches the DSL query.
Distributing Search Loads to Optimize Security Event Processing
Disclosed herein are methods, systems, and processes to distribute and disperse search loads to optimize security event processing in cybersecurity computing environments. A search request that includes a domain specific language (DSL) query directed to a centralized search cluster by an event processing application is intercepted. The event processing application is inhibited from issuing the search request to the centralized search cluster if a structured or semi-structured document matches the DSL query.
CONTRACT NEGOTIATION ASSISTANCE SYSTEM AND METHOD
In some embodiments, systems, apparatuses, methods, and processes are provided to assist parties in contract negotiations. In some embodiments, a system for use by a first party in contract negotiation with a second party comprises: a control circuit; and a contract term playbook database accessible by the control circuit; wherein the control circuit is configured to: receive, from a user of the first party via a user interface, feedback from the second party regarding a contract term of a draft contract; access the contract term playbook database using the feedback; and output, to the user via the user interface, guidance for response to the second party regarding the contract term and preapproved by the first party.
USER AUTHENTICATION DEVICE
Examples disclosed herein involve a user authenticator that harvests energy from signals. An example involves an authentication manager to provide authentication information to an authorization device to enable access to a secure device in response to receiving a request signal from the authorization device for the authentication Information a power manager to harvest energy from the request signal to power the apparatus.
METHOD AND DEVICE FOR REALIZING VERIFICATION CODE
A method and device for realizing a verification code are provided. In some embodiments, a character verification code is obtained and displayed when it is determined to perform identity verification. The character verification code has an incorrect character based on a priori knowledge. The user is prompted to input a correct character corresponding to the incorrect character in the character verification code. Verification information is received. It is determined that the verification is successful when the verification information corresponds to the correct character of the prior knowledge; otherwise, the verification failed.
IDPS ACCESS-CONTROLLED AND ENCRYPTED FILE SYSTEM DESIGN
A method and system provides access control encryption for a file system. A resource management module manages access to data on a storage container and hosts a virtual file system including files representing the data on the storage container. An access control and encryption module encrypts each of the files with a respective file encryption key. The access control module generates a plurality of application containers each associated with a respective user and that include respective lists of files that the respective user is authorized to access. The access control and encryption module generates decrypts the files and allows access to files based on the lists of files in the application containers.
Late constraint management
A method and system for integrating restrictions in an identity management system is provided. The method includes generating a role/account attribute table storage from static and dynamic rule defined values. A role request for a first role associated with a user is received and a set of attributes comprising a result of the role request are calculated. The set of attributes are transmitted to a target system for evaluation and a result is received.
Storage data sanitization
Technologies are provided for secure sanitization of a storage device. A storage device can be configured to support an operational mode, into which the storage device is placed by default, and in which requests to cryptographically erase the storage device are rejected. The storage device can support a separate sanitization mode in which a request to cryptographically erase the storage device will be processed. Access to the sanitization mode can be restricted to trusted sources (such as a boot firmware of a computer connected to the storage device). The storage device can be configured to reject a command to place the storage device in the sanitization mode, unless the command is received during an initialization of the storage device. In at least some embodiments, the storage device can reject data access commands while it is in the sanitization mode.
ELECTRONIC DEVICE AND METHOD FOR PROVIDING LOCATION DATA
An electronic device is provided. The electronic device includes a user interface, a location sensor configured to sense a location of the electronic device, a processor electrically connected with the user interface and the location sensor, and a memory electrically connected with the processor and configured to store a first application program and a second application program. The memory is further configured to store instructions that, when executed, enable the processor to receive first location data with a first degree of accuracy regarding the location of the electronic device from the location sensor, process at least part of the first location data to generate second location data with a second degree of accuracy lower than the first degree of accuracy regarding the location of the electronic device, provide the at least part of the first location data to execute the first application program, and provide at least part of the second location data to execute the second application program.
Electronic device and method for providing location data
An electronic device is provided. The electronic device includes a user interface, a location sensor configured to sense a location of the electronic device, a processor electrically connected with the user interface and the location sensor, and a memory electrically connected with the processor and configured to store a first application program and a second application program. The memory is further configured to store instructions that, when executed, enable the processor to receive first location data with a first degree of accuracy regarding the location of the electronic device from the location sensor, process at least part of the first location data to generate second location data with a second degree of accuracy lower than the first degree of accuracy regarding the location of the electronic device, provide the at least part of the first location data to execute the first application program, and provide at least part of the second location data to execute the second application program.