CONTROLLING USER ACTIONS AND ACCESS TO ELECTRONIC DATA ASSETS

    公开(公告)号:US20220374535A1

    公开(公告)日:2022-11-24

    申请号:US17663996

    申请日:2022-05-18

    Abstract: A computer system is disclosed that provides purpose-based control of user actions and access to electronic data assets. For example, the computer system may perform operations including: receiving, from a user, a request to perform an action; determining any checkpoint config objects associated with the action; displaying checkpoint dialog based on checkpoint config object; determining whether criteria associated with the checkpoint object are satisfied; and in response to determining that the criteria associated with the checkpoint object are satisfied: generating a checkpoint record object; and proceeding to perform the action.

    SECURE HIGH SCALE CRYPTOGRAPHIC COMPUTATION THROUGH DELEGATED KEY ACCESS

    公开(公告)号:US20230418953A1

    公开(公告)日:2023-12-28

    申请号:US17846648

    申请日:2022-06-22

    CPC classification number: G06F21/602 H04L9/088

    Abstract: An apparatus, computer-implemented method and computer program are disclosed for performing a cryptographic operation in a high-trust (HT) environment. The HT environment including a compute service and key storage service. The compute service receives from a user device, a user request for performing a cryptographic operation on at least a portion of a large-scale dataset. The user request including a user token associated with a user of the user device. The compute service sends to the key storage service, a cryptographic key access request corresponding to the received user request. The cryptographic key access request including data representative of the user token and/or a compute service token. The key storage service determines from the user token and/or compute service token whether the user has permission to have the cryptographic operation performed and/or whether to grant the compute service access to data representative of the cryptographic key in relation to the requested cryptographic operation when user has permission. In response to the key storage service granting access to the compute service, the key storage service sends to the compute service the requested cryptographic key/algorithm associated with the cryptographic operation of the user request. The compute service performs the cryptographic operation on the portion of the large-scale dataset based on the received cryptographic key/algorithm.

    Transaction-level data retention policy inheritance

    公开(公告)号:US12197385B2

    公开(公告)日:2025-01-14

    申请号:US18307553

    申请日:2023-04-26

    Abstract: A computer system provides transaction-level data retention policy inheritance. The system may perform operations including storing a first dataset comprising a plurality of transactions, each of the plurality of transactions comprising one or more data items; receiving a first transaction to the first dataset, the first transaction comprising one or more data items; determining a first retention policy for the first transaction; and storing the first retention policy with the first transaction. The system may further perform operations including calculating a deletion date for the first transaction based on the first retention policy; and storing the deletion date with the first transaction in the first dataset.

    TRANSACTION-LEVEL DATA RETENTION POLICY INHERITANCE

    公开(公告)号:US20230350843A1

    公开(公告)日:2023-11-02

    申请号:US18307553

    申请日:2023-04-26

    CPC classification number: G06F16/125 G06F16/162

    Abstract: A computer system provides transaction-level data retention policy inheritance. The system may perform operations including storing a first dataset comprising a plurality of transactions, each of the plurality of transactions comprising one or more data items; receiving a first transaction to the first dataset, the first transaction comprising one or more data items; determining a first retention policy for the first transaction; and storing the first retention policy with the first transaction. The system may further perform operations including calculating a deletion date for the first transaction based on the first retention policy; and storing the deletion date with the first transaction in the first dataset.

    TRANSACTION-LEVEL DATA RETENTION POLICY INHERITANCE

    公开(公告)号:US20250156373A1

    公开(公告)日:2025-05-15

    申请号:US18965516

    申请日:2024-12-02

    Abstract: A computer system provides transaction-level data retention policy inheritance. The system may perform operations including storing a first dataset comprising a plurality of transactions, each of the plurality of transactions comprising one or more data items; receiving a first transaction to the first dataset, the first transaction comprising one or more data items; determining a first retention policy for the first transaction; and storing the first retention policy with the first transaction. The system may further perform operations including calculating a deletion date for the first transaction based on the first retention policy; and storing the deletion date with the first transaction in the first dataset.

Patent Agency Ranking