-
11.
公开(公告)号:US20220021655A1
公开(公告)日:2022-01-20
申请号:US16930555
申请日:2020-07-16
摘要: Typically, a business desires to track and monitor all applications run on its servers. Nonetheless, one or more unauthorized applications may be running on the business's servers, exposing the business to potential regulatory liability and security breaches. Apparatus and methods are provided for isolating and disabling one or more unauthorized applications running on a server. The apparatus may comprise a system including a content-filtering web proxy server configured to filter outgoing requests and data associated with the requests. The system may also include a remediation framework configured to monitor request data in a proxy log stored by the proxy server. The remediation framework may be triggered to perform remedial action when the remediation framework determines that a request and associated data, as stored in the proxy log, meets predetermined conditions. The remediation framework, when triggered, may execute steps to truncate functionality of the unauthorized applications.
-
12.
公开(公告)号:US20220006786A1
公开(公告)日:2022-01-06
申请号:US16920482
申请日:2020-07-03
摘要: Typically, a business desires to track and monitor all applications run on its servers. Nonetheless, one or more unauthorized applications may be running on the business's servers, exposing the business to potential regulatory liability and security breaches. Apparatus and methods are provided for isolating and disabling one or more unauthorized applications running on a server. The apparatus may comprise a system including a content-filtering web proxy server configured to filter outgoing requests and data associated with the requests. The system may also include a remediation framework configured to monitor request data in a proxy log stored by the proxy server. The remediation framework may be triggered to perform remedial action when the remediation framework determines that a request and associated data, as stored in the proxy log, meets predetermined conditions. The remediation framework, when triggered, may execute steps to truncate functionality of the unauthorized applications.
-
公开(公告)号:US11134062B1
公开(公告)日:2021-09-28
申请号:US16899657
申请日:2020-06-12
摘要: Typically, a business desires to track and monitor all applications run on its servers. Nonetheless, one or more unauthorized applications may be running on the business's servers, exposing the business to potential regulatory liability and security breaches. Apparatus and methods are provided for isolating and disabling one or more unauthorized applications running on a server. The apparatus may comprise a system including a content-filtering web proxy server configured to filter outgoing requests and data associated with the requests. The system may also include a remediation framework configured to monitor request data in a proxy log stored by the proxy server. The remediation framework may be triggered to perform remedial action when the remediation framework determines that a request and associated data, as stored in the proxy log, meets predetermined conditions. The remediation framework, when triggered, may execute steps to truncate functionality of the unauthorized applications.
-
14.
公开(公告)号:US20210266743A1
公开(公告)日:2021-08-26
申请号:US16799275
申请日:2020-02-24
发明人: Elena Kvochko , Michael Ogrinz , John C. Checco
摘要: Aspects of the disclosure relate to optimizing authentication and management of wireless devices in zero trust computing environments. In some embodiments, a computing platform may receive, from a user computing device, a connection request. Subsequently, the computing platform may generate, using an artificial-intelligence engine, a profile for the connection request. Based on the profile for the connection request generated using the artificial-intelligence engine, the computing platform may determine that the connection request is valid. In response to determining that the connection request is valid, the computing platform may establish a connection with the user computing device. Based on establishing the connection with the user computing device, the computing platform may assign an identity to the user computing device. After assigning the identity to the user computing device, the computing platform may monitor behavior of the user computing device based on the identity assigned to the user computing device.
-
公开(公告)号:US20210082257A1
公开(公告)日:2021-03-18
申请号:US17108109
申请日:2020-12-01
发明人: Matthew E. Carroll , Michael Ogrinz , Nathan Dent
摘要: Aspects of the disclosure relate to processing systems that implement an enhanced reality device to facilitate transactions at a screen-less automated teller machine (ATM). A computing platform may receive a request to initiate a transaction with a screen-less automated ATM. Based on the request to initiate the transaction, the computing platform may send pre-transaction interface information and commands directing the enhanced reality device to generate a pre-transaction interface. The computing platform may receive an authentication request from the screen-less ATM indicating its availability and requesting authentication information. In response to validating the authentication information, the computing platform may generate transaction interface information. The computing platform may send the transaction interface information to the enhanced reality device. The computing platform may receive a transaction completion indication from the screen-less ATM. After receiving the transaction completion indication, the computing platform may send haptic feedback indicating that the transaction is complete.
-
公开(公告)号:US10824676B2
公开(公告)日:2020-11-03
申请号:US16203861
申请日:2018-11-29
发明人: Michael Ogrinz , Heather Linn
IPC分类号: G06F16/901 , G06F16/245 , G06F16/21 , G06F16/28 , G06F16/242
摘要: Aspects of the disclosure relate to searching a dual database graph. The dual database graph is resident on a dual database graph platform. The platform includes two or more nodes interconnected by one or more edges. The graph database stores graph data corresponding to the graph(s) and a relational database for storing metadata corresponding to the graph(s). The method includes receiving as input a search criterion. The search criterion may include a plurality of data points corresponding to a relational database node profile or a relational database subgraph profile. The platform may search the relational database for a subset of graphs that each includes a relational database node or a relational database subgraph that matches the node profile or subgraph profile of the search criterion. The platform may then retrieve a relational database node or a relational database subgraph that matches the node profile or subgraph profile.
-
公开(公告)号:US10771502B2
公开(公告)日:2020-09-08
申请号:US16802926
申请日:2020-02-27
发明人: Michael Ogrinz , David Hsiang , John C. Checco
摘要: A method is provided for preventing an IoT device within a trusted system from being harnessed in a malicious DDOS attack. The method may include bombarding the IoT device. The bombardment may originate from within the system, and may inundate the IoT device with harmless packets in a manner mimicking a traditional DOS attack. The inundating may utilize the resources of the IoT device to respond to the bombardment, and may thereby render the IoT device unavailable for fraudulent uses.
-
18.
公开(公告)号:US20190068590A1
公开(公告)日:2019-02-28
申请号:US16176340
申请日:2018-10-31
发明人: Elizabeth S. Votaw , Michael Ogrinz , Cameron D. Wadley , Jisoo Lee , Katherine Dintenfass , Graham M. Wyllie , Victoria L. Dravneek
CPC分类号: H04L63/0861 , G02B27/017 , G02B2027/0138 , G02B2027/014 , G02B2027/0141 , G02B2027/0178 , G02B2027/0187 , G06F3/005 , G06F3/011 , G06F3/014 , G06F3/017 , G06F3/03545 , G06F21/00 , G06F21/645 , G06K9/00161 , G06K9/00442 , G06K9/00892 , G06T11/00 , G06T11/60 , H04L9/0866 , H04L9/3231
摘要: An augmented reality user device includes a display, a physical identification verification engine, a gesture confirmation engine, and in interface. The display overlays a virtual file document onto a tangible object. The physical identification verification engine receives biometric data for a witness and confirms the witness's identity. The display displays a gesture motion from the signor. The gesture capture engine captures a gesture motion from the witness. The gesture capture engine generates a witness digital signature based on the captured gesture motion from the witness. The gesture capture engine generates a witness transfer token, the witness transfer token comprising the witness digital signature based on the captured gesture from the witness and the witness identity confirmation token. The interface communicates the witness transfer token to a server.
-
公开(公告)号:US20180159851A1
公开(公告)日:2018-06-07
申请号:US15367896
申请日:2016-12-02
摘要: A virtual reality system including a virtual reality user device with a display that presents a virtual reality environment to a user, an electronic transfer engine, and a virtual overlay engine. The virtual reality user devices receives network component data and security data for a network components. The virtual reality user devices generates overlays the security data onto the network component data to generate a virtual overlay.
-
公开(公告)号:US20180158060A1
公开(公告)日:2018-06-07
申请号:US15367551
申请日:2016-12-02
发明人: Amanda J. Adams , Joseph N. Johansen , Michael Ogrinz , Heather Dolan , William P. Jacobson , Manu J. Kurian
CPC分类号: G06Q20/409 , G06F3/017 , G06Q20/12 , G06Q20/3224 , G06Q20/401 , G06Q20/40145 , H04L63/0861 , H04L2463/102 , H04W12/06
摘要: A system for authorizing an electronic transaction in an augmented reality environment comprises an augmented reality user device and an authentication server. The augmented reality user device includes a display that overlays virtual objects onto a field of view of the user. The user device receives a request to verify information about a payment card used in an electronic transaction. The request includes a virtual authentication object, which is a virtual representation of an object capable of being manipulated by the user in a particular sequence to enter an authentication code. The user device displays the virtual authentication object to the user and detects gestures performed on the virtual authentication object. The user device sends the detected gestures to the authentication server. The authentication server determines the authentication code using the virtual authentication object and the detected gestures, and uses it to authorize the transaction.
-
-
-
-
-
-
-
-
-