Abstract:
A new approach is proposed that contemplates systems and methods to support a sandboxed application plug-in distribution framework. An installation package containing a monitoring plug-in, a display plug-in, and/or third part components is received by a first application running on a first computing device. The first application installs the display plug-in and saves the monitoring plug-in to a centralized database. The first application sends an instruction to a second application running on a second computing device to retrieve the monitoring plug-in from the database and install the monitoring plug-in on the second computing device. Upon receiving a user request, the display plug-in of the first application sends a query to the monitor plug-in of the second application. In response to the query, the monitoring plug-in sends the requested monitored data collected by the second application to the display plug-in, which then formats and presents the monitored data to the user.
Abstract:
A new approach is proposed that contemplates systems and methods to support email account takeover detection and remediation by utilizing an artificial intelligence (AI) engine/classifier that detects and remediates such attacks in real time. The AI engine is configured to continuously monitor and identify communication patterns of a user on an electronic messaging system of an entity via application programming interface (API) calls. The AI engine is then configured to collect and utilize a variety of features and/or signals from an email sent from an internal email account of the entity. The AI engine combines these signals to automatically detect whether the email account has been compromised by an external attacker and alert the individual user of the account and/or a system administrator accordingly in real time. The AI engine further enables the parties to remediate the effects of the compromised email account by performing one or more remediating actions.
Abstract:
A new approach is proposed to support anti-fraud user training and protection by identifying and training individuals within an entity who are at high risk of being targeted in an impersonating attack. An AI engine automatically collects historical electronic messages of each individual in the entity on an electronic messaging system via an application programming interface (API) call. The AI engine then analyzes contents the collected historical electronic messages and calculates a security score for each individual via AI-based classification. The AI engine identifies high-risk individuals within the entity based on their security scores and launches simulated impersonating attacks against these individuals to test their security awareness. The AI engine then collects and analyzes responses to the simulated attacks by those high-risk individuals in real time to identify issues in the responses and to take corresponding actions to prevent the high-risk individuals from suffering damages in case of real attacks.
Abstract:
A new approach is proposed that contemplates systems and methods to support safe preview and immediate delivery of a document from a document producer to an end user while protecting the user from accidentally opening the original document if it has been tampered with by an email attacker. First, the original document is submitted to a safe preview server cluster, where a passcode is generated for the document and the document is processed for policy assessments of possible security threats. The document is then encrypted with the generated passcode and provided to the user together with results of the policy assessments and a preview of content of the document for preview upon request. Based on the user's choice, the user can retrieve the passcode from the server and decrypt the document with the passcode wherein the original document is deleted from the safe preview server cluster once it is downloaded.
Abstract:
A new approach is proposed to support automated dynamic reconfiguration of a mobile device of a client from using a primary document service to a secondary document service by the same service provider based on pushed data received via the mobile device. When the client logs in to his/her account at the primary cloud-based document service by default and later receives an invite sent by another client via the secondary document appliance, a document app on the client's mobile device would automatically reconfigure itself to use the secondary document appliance for a specific set of operations on a document as required by the invite instead. The client may then access the secondary document appliance to view the document, sign it, and complete the entire process within the document app. Following the client's completion of the operations, the document app is automatically reconfigured back to use its primary cloud-based document service.
Abstract:
A device includes a database, a controller, and a PVN router. The database is configured to store network settings information and tracks devices connected to a network. The controller is configured to control access of devices to one another after establishing a connection to the network. The PVN router is configured to receive a provisioning request from a requesting to connect to the network. The PVN router is further configured to transmit a provisioning response to the requesting device based on instantiation of a PVN template received from the database. The PVN template is generated based on the network settings information and further based on the control access determined by the controller. The provisioning response establishes a connection between the requesting device and the network. The requesting device is inaccessible by a subset of devices already connected in the network after the connection is established and vice versa.
Abstract:
A single Point of Recordation Terminal (PORT) is disclosed. The PORT is configured to detect one or more events of interest, generate one or more representations of the event and establish the timing relationship among the multiple representations of the event of interest. The PORT is further configured to associate a unique ID of the PORT with the representations, encrypt and upload the representations to the cloud.
Abstract:
A new approach is proposed that contemplates systems and methods to support authorized access by a second client to files stored on a local content appliances (CA), wherein each content appliance is a storage device/host configured to locally maintain entire or parts of files owned and maintained by a first user. First, a first client agent is configured to establish a region including at least one local CA and to provide authoritative copies of one or more of its files and/or their parts containing sensitive information of the first client to be stored and maintained on the CA in the region instead of uploading them to a cloud storage. The first client agent uploads only metadata of the files to the cloud storage wherein the metadata includes information on storage location and access permission of the files and/or their parts. A second client agent is configured to retrieve the metadata of the files from the cloud storage and to request access to the authoritative copies of the files and/or their parts directly from the local CA in the region based on the retrieved metadata.
Abstract:
A cloud file event server transmits file events necessary to synchronize a file system of a file share client. A tree queue director circuit receives file events and stores each one into a tree data structure which represents the hierarchical paths of files within the file share client. An event normalization circuit sorts the file events stored at each node into sequential order and moots file events which do not have to be performed because a later file event makes them inconsequential. A thread scheduling circuit assigns a resource to perform file events at a first node in a hierarchical path before assigning one or more resources to a second node which is a child of the first node until interrupted by the tree queue director circuit or until all file events in the tree data structure have been performed.
Abstract:
Documents are scored and displayed with annotations for best practices, and variances from normal ranges of clauses and clause groups. Custom rules developed for an industry or for an enterprise further distinguish which documents need further review or approval by senior staff because of higher risks or commitments than standard terms and conditions. A display provides the document transformed with annotations about the scores or rules triggered by each group of clauses and accepts comments and approval or objections to acceptance of the document. The absence of best practices clauses for the category is noted for reference.