G06F2221/2147

METHOD OF USING ONE DEVICE TO UNLOCK ANOTHER DEVICE

A method of unlocking a second device using a first device is disclosed. The method can include: the first device pairing with the second device; establishing a trusted relationship with the second device; authenticating the first device using a device key; receiving a secret key from the second device; receiving a user input from an input/output device; and transmitting the received secret key to the second device to unlock the second device in response to receiving the user input, wherein establishing a trusted relationship with the second device comprises using a key generated from a hardware key associated with the first device to authenticate the device key.

Method and Apparatus for Securely Backing Up and Restoring a Computer System
20230009355 · 2023-01-12 ·

Data of a computer system can be secured from malware. During a Primary Operating System (PrimaryOS) run-time, the system determines if the computer system has been compromised and, if so, a Trusted Operating System (TrustedOS) is launched and assumes control of the hardware resources and the software resources of the computer system. The TrustedOS obtains a cryptographic key that is inaccessible to the PrimaryOS. The TrustedOS uses the cryptographic key to disable writing to a first portion of the storage media that includes the first set of logical block addresses. The PrimaryOS can incrementally back-up files to a second set of logical block addresses on a second portion of the storage media. Control of the hardware resources and the software resources is returned to the PrimaryOS.

DOCUMENT CREATION AND MANAGEMENT SYSTEM
20230214509 · 2023-07-06 ·

Described herein is a method, for managing creation and publication of a document in a documentation management system (DMS), that includes causing display of a first graphical user interface (GUI) on a first client device. The method includes authenticating a first user of the first client device, and causing display of an author view of a hierarchical document structure in a navigational pane of the first GUI. The method includes saving content received in an editor pane of the first GUI as a page in the DMS and associating the first user as an author of the page. The method includes generating a document entry displayed with a draft status indicator corresponding to the draft status of the page. The method includes causing display of a reader-view of the hierarchical document structure on a second GUI with the content of the page displayed in accordance with the draft status.

INDICATING USER INTERACTIONS ASSOCIATED WITH A DOCUMENT
20230214510 · 2023-07-06 ·

In association with a communication platform, one or more users can create, share, edit, and/or comment on a document. An indicator can be provided to one user that another user is presently interacting with the document. For example, the indicator can indicate information about a respective user, such as a permission level, virtual-space membership, and the manner in which the user is interacting with the document. In addition, the indicator may provide options to change or update information associated with a respective user, such as by inviting the user to join a virtual space of the communication platform and associated with the document or by changing permissions of the user with respect to the document.

Automatic ransomware detection with an on-demand file system lock down and automatic repair function

A method and system for detecting ransomware and repairing data following an attack. The method includes, collecting file statistics for files in a file system, identifying an affected file based on collected file statistics, locking down of access to the file system in response to identifying the affected file, undoing of reconcile processing, repairing the affected files, and unlocking access to the file system. The system includes a computer node, a file system, a plurality of disc storage components, a backup client, a backup client, and a hierarchical storage client. The hierarchical storage client is configured to collect file statistics for files in file system, identify affected files based on collected file statistics for the file, lock down of access to the file system in response to an identified affected file, undo reconcile processing, repair the affected file; and unlock access to the file system.

Controlling access to application data

A method, system and computer-readable storage medium for controlling access to application data associated with an application configured on a computing device. The method comprises: storing data comprising, for each of a plurality of access levels associated with the application, first data indicative of a combination of one or more credentials associated with the respective access level and an access level key corresponding to the respective access level, the access level key being encrypted by the combination of one or more credentials associated with the respective access level; determining, based on the first data, an access level in the plurality of access levels corresponding to a combination of one or more credentials available to the application; decrypting the access level key in the stored data corresponding to the determined access level using the combination of one or more credentials available to the application; and providing access to encrypted application data associated with the application and corresponding to the determined access level using, at least in part, the decrypted access level key corresponding to the determined access level.

ACCESS MANAGEMENT APPARATUS, NON-TRANSITORY COMPUTER READABLE MEDIUM, AND ACCESS MANAGEMENT METHOD
20230082547 · 2023-03-16 · ·

An access management apparatus includes: a memory storing data; and a processor configured to manage an access of a user to the data in accordance with a confidentiality score of the data and a reliability score of the user.

SYSTEM AND METHODS FOR TRACKING AUTHORSHIP ATTRIBUTION AND CREATING MUSIC PUBLISHING AGREEMENTS FROM METADATA
20230071263 · 2023-03-09 ·

Systems and methods relating to a platform for creating, monitoring, updating, and executing legal agreements for data files such as a collaborate digital media file using associated metadata. The platform enables music publishing agreements to be generated automatically by taking metadata from a DAW (digital audio workstation) that reflects the activity and contributions of each author associated with a file. Authorship metadata can be recorded on a ledger or blockchain by the platform. The platform enables calculation and disbursement of royalties to be automated by algorithmic determination of terms of an authenticated smart contract using authorship metadata for an associated media file generating the royalty. Authors may concurrently contribute from across a variety of different DAWs, local and remote, and computing resources may be distributed by the platform.

Systems and methods for resolving privileged edits within suggested edits

A method to incorporate a first edit and a second edit into an electronic document includes receiving the first edit and the second edit having a shared position in the electronic document, and determining whether the second edit is privileged relative to the first edit. The method further includes responsive to determining that the second edit is not privileged relative to the first edit, requiring the second edit to be independently accepted prior to incorporating the second edit into the electronic document, and responsive to determining that the second edit is privileged relative to the first edit, incorporating the second edit into the electronic document without requiring the second edit to be independently accepted, and responsive to receiving an acceptance of the first edit, causing the first edit and the second edit to be incorporated into the electronic document.

System and Method for Light Data File Duplication Prevention

A system for preventing duplication of a computer source file to a destination file includes a user application accessed by a user of a computer. An agent application hosted by the computer registers for a notification of a user interface action with an operating system (OS) of the computer. The agent receives notice from the OS of the user interface action and determines if the user interface action is indicative of a data file duplication operation of a source file to a destination file location The Agent compares a property of the source file and a property of the destination file location to a blocking criteria, and blocks the user interface action from reaching the application.