OPTIMIZATION OF REDUNDANT USAGE PATTERNS BASED ON HISTORICAL DATA AND SECURITY CONSTRAINTS

    公开(公告)号:US20220021655A1

    公开(公告)日:2022-01-20

    申请号:US16930555

    申请日:2020-07-16

    IPC分类号: H04L29/06 H04L12/24

    摘要: Typically, a business desires to track and monitor all applications run on its servers. Nonetheless, one or more unauthorized applications may be running on the business's servers, exposing the business to potential regulatory liability and security breaches. Apparatus and methods are provided for isolating and disabling one or more unauthorized applications running on a server. The apparatus may comprise a system including a content-filtering web proxy server configured to filter outgoing requests and data associated with the requests. The system may also include a remediation framework configured to monitor request data in a proxy log stored by the proxy server. The remediation framework may be triggered to perform remedial action when the remediation framework determines that a request and associated data, as stored in the proxy log, meets predetermined conditions. The remediation framework, when triggered, may execute steps to truncate functionality of the unauthorized applications.

    OPTIMIZATION OF THE ISOLATION AND DISABLING OF UNAUTHORIZED APPLICATIONS BY DETECTION OF FALSE POSITIVES

    公开(公告)号:US20220006786A1

    公开(公告)日:2022-01-06

    申请号:US16920482

    申请日:2020-07-03

    摘要: Typically, a business desires to track and monitor all applications run on its servers. Nonetheless, one or more unauthorized applications may be running on the business's servers, exposing the business to potential regulatory liability and security breaches. Apparatus and methods are provided for isolating and disabling one or more unauthorized applications running on a server. The apparatus may comprise a system including a content-filtering web proxy server configured to filter outgoing requests and data associated with the requests. The system may also include a remediation framework configured to monitor request data in a proxy log stored by the proxy server. The remediation framework may be triggered to perform remedial action when the remediation framework determines that a request and associated data, as stored in the proxy log, meets predetermined conditions. The remediation framework, when triggered, may execute steps to truncate functionality of the unauthorized applications.

    Isolating and disabling unauthorized applications

    公开(公告)号:US11134062B1

    公开(公告)日:2021-09-28

    申请号:US16899657

    申请日:2020-06-12

    IPC分类号: H04L29/06 H04L29/08

    摘要: Typically, a business desires to track and monitor all applications run on its servers. Nonetheless, one or more unauthorized applications may be running on the business's servers, exposing the business to potential regulatory liability and security breaches. Apparatus and methods are provided for isolating and disabling one or more unauthorized applications running on a server. The apparatus may comprise a system including a content-filtering web proxy server configured to filter outgoing requests and data associated with the requests. The system may also include a remediation framework configured to monitor request data in a proxy log stored by the proxy server. The remediation framework may be triggered to perform remedial action when the remediation framework determines that a request and associated data, as stored in the proxy log, meets predetermined conditions. The remediation framework, when triggered, may execute steps to truncate functionality of the unauthorized applications.

    Optimizing Authentication and Management of Wireless Devices in Zero Trust Computing Environments

    公开(公告)号:US20210266743A1

    公开(公告)日:2021-08-26

    申请号:US16799275

    申请日:2020-02-24

    摘要: Aspects of the disclosure relate to optimizing authentication and management of wireless devices in zero trust computing environments. In some embodiments, a computing platform may receive, from a user computing device, a connection request. Subsequently, the computing platform may generate, using an artificial-intelligence engine, a profile for the connection request. Based on the profile for the connection request generated using the artificial-intelligence engine, the computing platform may determine that the connection request is valid. In response to determining that the connection request is valid, the computing platform may establish a connection with the user computing device. Based on establishing the connection with the user computing device, the computing platform may assign an identity to the user computing device. After assigning the identity to the user computing device, the computing platform may monitor behavior of the user computing device based on the identity assigned to the user computing device.

    Processing System for Providing Enhanced Reality Interfaces at an Automated Teller Machine (ATM) Terminal Platform

    公开(公告)号:US20210082257A1

    公开(公告)日:2021-03-18

    申请号:US17108109

    申请日:2020-12-01

    摘要: Aspects of the disclosure relate to processing systems that implement an enhanced reality device to facilitate transactions at a screen-less automated teller machine (ATM). A computing platform may receive a request to initiate a transaction with a screen-less automated ATM. Based on the request to initiate the transaction, the computing platform may send pre-transaction interface information and commands directing the enhanced reality device to generate a pre-transaction interface. The computing platform may receive an authentication request from the screen-less ATM indicating its availability and requesting authentication information. In response to validating the authentication information, the computing platform may generate transaction interface information. The computing platform may send the transaction interface information to the enhanced reality device. The computing platform may receive a transaction completion indication from the screen-less ATM. After receiving the transaction completion indication, the computing platform may send haptic feedback indicating that the transaction is complete.

    Hybrid graph and relational database architecture

    公开(公告)号:US10824676B2

    公开(公告)日:2020-11-03

    申请号:US16203861

    申请日:2018-11-29

    摘要: Aspects of the disclosure relate to searching a dual database graph. The dual database graph is resident on a dual database graph platform. The platform includes two or more nodes interconnected by one or more edges. The graph database stores graph data corresponding to the graph(s) and a relational database for storing metadata corresponding to the graph(s). The method includes receiving as input a search criterion. The search criterion may include a plurality of data points corresponding to a relational database node profile or a relational database subgraph profile. The platform may search the relational database for a subset of graphs that each includes a relational database node or a relational database subgraph that matches the node profile or subgraph profile of the search criterion. The platform may then retrieve a relational database node or a relational database subgraph that matches the node profile or subgraph profile.

    Reflexive benign service attack on IoT device(s)

    公开(公告)号:US10771502B2

    公开(公告)日:2020-09-08

    申请号:US16802926

    申请日:2020-02-27

    IPC分类号: H04L29/06 H04L29/08

    摘要: A method is provided for preventing an IoT device within a trusted system from being harnessed in a malicious DDOS attack. The method may include bombarding the IoT device. The bombardment may originate from within the system, and may inundate the IoT device with harmless packets in a manner mimicking a traditional DOS attack. The inundating may utilize the resources of the IoT device to respond to the bombardment, and may thereby render the IoT device unavailable for fraudulent uses.