Abstract:
The present invention describes a system and method for tokenization of data. The system includes a receiver configured to receive a request for tokenization. The request for tokenization comprises an input data to be tokenized. The system also includes a parser configured to determine one or more datatype from the input data. The system further includes a trained artificial neural network to generate a token for the input data based on a tokenization technique corresponding to the datatype of the input data.
Abstract:
The technique relates to a method and apparatus for dynamic destruction of data in a remote data storage platform. This involves receiving a first set of data records with random values and then updating the random values associated with the subsets of the first set of data records into actual values through one or more update operations. After sequential steps of updates, a second set of data records with actual values are obtained. After working of this data for a period of time the owner of the data again begins updating the actual values associated with the subset of the second set of data records into random values. When all the data records are updated to random values the owner of the data successfully ends the Service Level Agreement period.
Abstract:
The technique relates to a method and apparatus for dynamic destruction of data in a remote data storage platform. This involves receiving a first set of data records with random values and then updating the random values associated with the subsets of the first set of data records into actual values through one or more update operations. After sequential steps of updates, a second set of data records with actual values are obtained. After working of this data for a period of time the owner of the data again begins updating the actual values associated with the subset of the second set of data records into random values. When all the data records are updated to random values the owner of the data successfully ends the Service Level Agreement period.
Abstract:
The present invention relates to a method to detect online privacy violation. The method comprising steps of embedding a tracker into a web browser to open at least one data consumer website or at least one third party website wherein a user submits at least one data value into their corresponding data field in a data consumer website; generating one or more privacy profile using the tracker wherein the profile assists the user to select one or more data fields as per the user preferences; capturing the user selected one or more data fields and their corresponding plurality of browsing history using the tracker; storing the profile and the plurality of browsing history into at least one database; triggering of the tracker for detecting online privacy violation in a third party website and submitting at least one data field into at least one input field to detect online privacy violation for the submitted data field.
Abstract:
The present invention describes a system, method and computer product program for computation of alarm time. The system includes an alarm device for generating an alarm. The system also includes an alarm application hosted on the alarm device for providing at least one user defined alarm condition. The system further includes an alarm engine for receiving the user defined alarm condition, initiating a probe to receive data from data sources, processing the received alarm conditions and the received data to compute the alarm time and next probe time repeating iteratively until the next probe time is less than the computed alarm time. The system generates alarm at the computed alarm time when the next probe time becomes greater than the alarm time.
Abstract:
The invention relates to a system and method providing access of one or more heterogeneous digital contents to at least one online Digital Rights Management (DRM) user by a DRM server. This invention involves receiving digital contents from the publishers and those digital contents are encrypted and user rights are granted to access the contents by the publisher. The DRM server stores the decryption information, user rights and user information in a repository. After authenticating the user who is connected with the DRM server through a DRM client, the DRM server sends a license to the DRM user which includes the decryption information and the user rights. The DRM client decrypts the contents based on the license information in the memory of the user's computer device and thus the content and the license are not locally stored.
Abstract:
The technologies relate to a system and method for electronic signature agnostic verification. The method involves receiving a request to verify an electronic signature, thereafter validating an integrity of the electronic signature on the basis of one or more predefined validation parameters and validation fields, then analyzing the validated electronic signature to obtain one or more features of the validated electronic signature, further decoding the analyzed electronic signature using one or more decode parameters, and finally comparing the decoded electronic signature with a predefined value received from one or more sources, to check the correctness of the decoded electronic signature. The technique supports various electronic signature formats and electronic signature standards.
Abstract:
The present invention provides a method and system for verifying integrity of cloud data using unconnected trusted device. The method involves requesting encrypted data though a terminal from a metadata offsite location on a cloud storage then entering encrypted data into an unconnected trusted device thereafter obtaining sentinel data from one or more predefined sentinel locations in encrypted data then requesting original data from the cloud storage through the terminal from the unconnected trusted device thereafter comparing sentinel data and original data for integrity and finally displaying the results.
Abstract:
The present invention describes a system, method and computer product program for computation of alarm time. The system includes an alarm device for generating an alarm. The system also includes an alarm application hosted on the alarm device for providing at least one user defined alarm condition. The system further includes an alarm engine for receiving the user defined alarm condition, initiating a probe to receive data from data sources, processing the received alarm conditions and the received data to compute the alarm time and next probe time repeating iteratively until the next probe time is greater than the computed alarm time. The system generates alarm at the computed alarm time when the next probe time becomes greater than the alarm time.
Abstract:
The present invention provides a method and system for calculating a security index of an application hosted in a cloud environment. The application is mapped to a cloud service provider of the cloud environment, and a set of security controls and a set of security metrics applicable for the application are identified. The set of security controls and the set of security metrics are encapsulated into a security profile object by a security control module. A set of values of the set of security metrics are retrieved from the cloud service provider, by a cloud probe module, and the security index of the application is calculated.