G06F2221/2135

TECHNIQUES FOR PRIVATE AND SECURE COLLECTION AND PROCESSING OF DATA FOR GENERALIZED ANALYSIS
20230009067 · 2023-01-12 ·

The present disclosure relates to techniques for collection and processing of data over a network, and in particular to in providing generalized analysis for preserving privacy of data sources. In some embodiments, a system receives a request for analytical data made by a requester, wherein the request includes: information for identifying one or more data source devices to be queried for input data, a type of data processing to be performed on the input data for generating the analytical data, and a data type for the analytical data. In response to receiving the request, the system causes the one or more data source devices to be queried for the input data. The system causes a response that includes the analytical data to be sent to the requester. Other embodiments are described throughout the present disclosure.

METHOD AND APPARATUS TO ENABLE A MARKET IN USED DIGITAL CONTENT
20180007018 · 2018-01-04 ·

Methods and apparatus to enable a distinction between “new” and “used” digital content and to enable a market in used digital content files between mobile phone terminals and an electronic store, securely, by means of a wireless telephony network and a server complex to handle contents right management, transaction reporting, inventory, content delivery, payment, and billing. A server receives a signal generated by a wireless user device that was sent over a wireless telephony network. The signal indicates an election for returning at least one previously purchased digital content item. The server deletes user rights for the at least one digital content item identified by the received signal and sends information to the user device that generated the signal. Access to the associated digital content item at the user device is removed according to the sent information.

METHODS AND APPARATUS TO COLLECT DISTRIBUTED USER INFORMATION FOR MEDIA IMPRESSIONS AND SEARCH TERMS
20230239162 · 2023-07-27 ·

Disclosed examples include accessing a search term from a client device; accessing a first identifier, the first identifier corresponding to a first database proprietor, the first identifier to access first user information corresponding to a user of the client device; accessing a second identifier, the second identifier corresponding to a second database proprietor, the second identifier to access second user information corresponding to the user of the client device; providing the search term, the first identifier, and the second identifier in a message; and transmitting the message to a server.

FUSE BASED REPLAY PROTECTION WITH CONSERVATIVE FUSE USAGE

A TPM is implemented in an SOC for thwarting PIN state replay attacks. Programmable fuses are used as a counter and an on-die RAM stores a blown-fuse count and a TPM state that includes a PIN-failure count and a fuse count. TPM initialization includes incrementing the TPM state PIN-failure count if the blown-fuse count is greater than the TPM state fuse count. Once a PIN is received, if the TPM state PIN-failure count satisfies a PIN failure policy and the PIN is correct, the TPM state PIN-failure count is cleared, and if the PIN is incorrect, a fuse is blown and the blown-fuse count is incremented. If the fuse blow fails, TPM activity is halted. If the fuse blow succeeds, the TPM state PIN-failure count is incremented and the TPM state fuse count is set equal to the blown-fuse count. The TPM state is saved to off-die non-volatile memory.

SYSTEMS, DEVICES AND METHODS FOR USING A CENTRAL SERVER TO PROVIDE MULTI-TIERED ACCESS AND CONTROL OF A COMPUTER DEVICE
20230028528 · 2023-01-26 ·

Systems and methods for controlling and tracking computer devices using a secure communication path between a central server and a machine control-file watchdog program. One or more machine control-files can be generated to control, limit and track a computer device using a machine control-file watchdog program. The system sets limits on the computer device to ensure the user operating the computer device stays within a restricted set of usage limitations. The machine control-file watchdog program protects the one or more machine control-files and additionally can report on all activities performed by the computer device to the central server.

INFORMATION PROCESSING APPARATUS, NON-TRANSITORY COMPUTER READABLE MEDIUM, INFORMATION PROCESSING METHOD
20230018462 · 2023-01-19 · ·

An information processing apparatus includes a processor configured to: receive, from each of plural information devices, operation information indicating an operation that has been performed on the information device, the operation information being associated with event information indicating an event caused by the operation in the information device, and accumulate the operation information in an operation log database; and refer to the operation log database and, if different operations associated with a same event have been performed on at least a part of the plural information devices and, among the at least a part of the plural information devices, at least one information device fewer than or equal to a threshold value has been subjected to a minority operation, which is an operation different from an operation performed on other information devices, issue a warning against the minority operation.

GOVERNED DATABASE CONNECTIVITY (GDBC) THROUGH AND AROUND DATA CATALOG TO REGISTERED DATA SOURCES

An embodiment includes receiving, at database connectivity (DBC) layer, a request to access data of a data source, wherein the data source is registered with a data catalog that includes data governance artifacts, and wherein the request is made via a connection that bypasses the data catalog. The embodiment also includes comparing, by a governance manager at the DBC layer, an access privilege level for a credential associated with the request to access requirements of requested data included in data protection rules of the governance artifacts. The embodiment also includes masking, by the governance manager, a portion of the data provided in response to the request, wherein the portion of the data has an access requirement that is not met by the access privilege level for the credential associated with the request.

Methods and systems for implementing parental controls

Methods and systems for a media guidance application that provides advanced parental control features such as allowing parents to establish parental controls in a dynamic and individualized manner and allowing parents to track and/or limit the amount of time that a child views media content of a particular type.

Detection of laser fault injection attacks on cryptographic devices
11546132 · 2023-01-03 · ·

Countermeasures against fault injection attacks of a cryptographic integrated circuit, and more specifically laser fault injection attacks are provided. The invention consists in generating sequences of bits belonging to a set of allowed sequences, and storing these sequences on a set of Flip-Flops. Then the sequences stored on the Flip-Flops are checked and, if they do not belong to the allowed sequence, this is the sign that a fault injection attack occurred and caused a bit flip in one of the flip-flops. An alarm signal is then generated.

Tracking application programming interface requests in a cloud computing system

Techniques are provided for tracking application programming interface (API) requests in a cloud computing environment. For example, a method for tracking API requests is implemented by an API gateway. The API gateway receives an API request which comprises a given API endpoint to access a target service of a computing system. The API gateway determines if the received API request is valid. In response to determining that the received API request is valid, the API gateway accesses at least one API counter associated with the given API endpoint of the received API request, wherein the at least one API counter is configured to count a number of times that the given API endpoint is accessed. The API gateway increments a count of the at least one API counter by one, and the API gateway routes the API request to the target service for execution.