G06F2221/2137

Method for configuring operating time period for mailbox content and instant messaging content in system

A method for setting an operation time range of mailbox content and instant messaging content in a system is disclosed in the present invention, wherein a method for setting an operation time of mailbox content includes: selecting a role, a user or an employee as a mailbox user; setting a permission time range for each mailbox user, wherein said permission time range includes one or more of the following types: a time range from a time point, which is determined by going backwards from a current time for a fixed time length, to the current time, a time range from a start time to a current time, a time range from a deadline to a system initial time, and a time range from a start time to a deadline; and the content within the permission time range of the mailbox user in a mailbox account used by the mailbox user being operated by said mailbox user. In the present invention, by setting a permission time range, only the content set within the permission time range in the mailbox account or the instant messaging account can be operated, thus improving the security of data information in the mailbox account and the instant messaging account.

RUNTIME RISK ASSESSMENT TO PROTECT STORAGE SYSTEMS FROM DATA LOSS

Embodiments of the runtime risk assessment process monitors deliberate or potentially data destructive operations against a filter of dynamic risk assessment. A filter process recognizes the following conditions as highly indicative of increased risk factors: (1) recent creation of the security officer role, (2) changing of the system time or clock, and (3) disabling of system alerts. If all three of these events occur, the system recognizes this as indicative of a high probability of data attack. The runtime risk assessment process imposes a delay on the execution of each of these commands to provide time to alert the user and an opportunity to re-enter the commands at the end of the delay period. Thus, a potentially dangerous sequence of commands will not occur automatically or immediately, but will instead be delayed to provide an extra validation check or user action.

Systems and methods for securing and disseminating time sensitive information using a blockchain
11704429 · 2023-07-18 · ·

An information computer system is provided for securely releasing time-sensitive information to recipients via a blockchain. A submitter submits a document to the system and a blockchain transaction is generated and submitted to the blockchain based on the document (e.g., the document is included as part of the blockchain transaction). An editor may edit the document and an approver may approve the document for release to the recipients. Each modification and/or approval of the document is recorded as a separate transaction on the blockchain where each of the submitter, editor, approver, and recipients interact with the blockchain with corresponding unique digital identifiers—such as private keys.

Output system, information processing system, including circuitry to generate a character string to perform authentication for a user, and authentication method
11704079 · 2023-07-18 · ·

An output system includes circuitry to generate information on a character string in response to an authentication request including user identification information transmitted from an output apparatus. The circuitry further transmits the information on the character string to an information processing device. In response to receiving the information on the character string and the user identification information from the output apparatus that has received the information on the character string and the user identification information from the information processing device, the circuitry further performs authentication for a user identified by the user identification information, based on the information on the character string and the user identification information, and transmits an authentication result to the output apparatus.

Deploying and Utilizing a Dynamic Data Stenciling System with a Smart Linking Engine
20230224279 · 2023-07-13 ·

Aspects of the disclosure relate to deploying and utilizing a dynamic data stenciling system with a smart linking engine. A computing platform may receive source data from one or more data source systems. Subsequently, the computing platform may identify a target application hosted by an enterprise application host platform as being an intended recipient of a portion of the source data. Then, the computing platform may select a dynamic data stencil from a plurality of available data stencils. Thereafter, the computing platform may overlay the portion of the source data onto the target application using the dynamic data stencil. In addition, by overlaying the portion of the source data onto the target application using the dynamic data stencil, the computing platform may cause the target application to execute one or more data processing functions using the portion of the source data received from the one or more data source systems.

Access management system with a multi-environment policy

Methods, systems, and computer storage media for providing access to computing environments based on a multi-environment policy are provided. The a multi-environment policy is configurable to define rules that have provider-controlled and customer-controlled computing environment parameters for approving access to provider-controlled computing environments and customer-controlled computing environments. In operation, a request associated a computing environment are received. The computing environment is associated with a multi-environment policy. The multi-environment policy is configurable to define the rules based on access vectors having grouped computing environment aspects for control and visibility associated with accessing computing environments. Based on the request, a determination whether the request is for a provider-controlled or a customer-controlled computing environment is made. Based on the multi-environment policy, approval-request parameters of an approval-request are communicated to receive approval-request response values. And, based on receiving the approval-request response values, a request response indicating approval or denial of the request is communicated.

Systems and Methods to Provide Temporary Document Access for Secure File Sharing
20230214508 · 2023-07-06 ·

Techniques for providing temporary document access for secure file sharing are disclosed. An example method includes receiving a request from a first user to share a file, and generating, by an encryption module, a secure access link corresponding to the file that does not indicate a storage platform or a file name. The example method also includes transmitting the secure access link to a second user, and receiving an input from the second user during the accessibility duration corresponding to the secure access link. Responsive to receiving the input, the example method includes validating the access key to determine whether or not the second user should be granted access to the file; and responsive to determining that the user should be granted access to the file, retrieving an updated version of the file from the storage platform, and transmitting the updated version of the file to the second user.

Login token management

Techniques for securing user data in a healthcare data management system are described. A client system receives a request to authenticate a user. The user is associated with applications and roles. The user is authenticated, at the client system, for all applications and all roles. A login token relating to the authenticated user is maintained at the client system. A role is selected for the user, and an authorization token relating to the selected role is maintained at the client system. A session for the user is initiated. This includes generating an encrypted session cookie relating to the user and the session, storing the encrypted session cookie at the client system, and periodically updating a timestamp for the session cookie.

SKIN TEXTURE CONTROL SYSTEM, SKIN TEXTURE CONTROL METHOD, SKIN TEXTURE SAMPLING DEVICE, AND COMPUTER-READABLE MEDIUM
20230215213 · 2023-07-06 ·

A skin texture control system, a skin texture control method, a skin texture sampling device, and a computer-readable medium storing a code of the skin texture control method are provided. The skin texture control system includes a skin texture feature generation module for generating a skin texture feature of a skin texture, which includes a sampling unit for sampling the skin texture and generating skin texture sampling data in a first period of a working period; and a feature generating unit for generating skin texture stripe data according to the skin texture sampling data and generating the skin texture feature of the skin texture by the skin texture stripe data in a second period; and a control module connected to the skin texture feature generating module for receiving the skin texture feature and outputting a control command by the skin texture feature of the skin texture in a third period.

Monitoring code provenance

One example method of operation may include determining one or more of a file type and a code segment accessed during a code access event, identifying code origin information appended to the code segment during previous code access events, appending an updated code access location to the code segment identifying the current code access event and a current code location, and applying one or more code access restrictions to the code segment based on the current code location.