-
公开(公告)号:US20170243215A1
公开(公告)日:2017-08-24
申请号:US15050379
申请日:2016-02-22
摘要: A closed-loop system is operatively connected with a block chain distributed network for using the block chain distributed network for facilitating operation of a transaction record sharing system. Host and source institutions function to supply a consolidated transaction record to a user in response to a request from a user to the host institution. The request is determined to meet a condition of the block chain thereby verifying the request. The verified request for a transaction record is transmitted to at least one source institution. The transaction record of the source institution is accessed by the host institution. A consolidated transaction record is communicated to the user based on the transaction record.
-
公开(公告)号:US20230418949A1
公开(公告)日:2023-12-28
申请号:US17847805
申请日:2022-06-23
发明人: Dustin Paul Stocks , Kayla Ashley Rux , Viswanathan Venkatasubramanian , Ramkumar Korlepara , Sanjay Lohar , Eric Eugene Sifford , Ashley L. Jones , David Cuka
CPC分类号: G06F21/577 , G06F40/20 , G06N20/00
摘要: Arrangements for providing software vulnerability analysis and monitoring are provided. In some aspects, software bill of materials (SBOM) data may be received and software attributes may be extracted from the SBOM data. Author data may be received and analyzed using natural language processing and/or machine learning to identify author attributes. Current event or vulnerability data may be received. In some examples, one or more machine learning models may be executed to determine a confidence score associated with the software being analyzed. For instance, software attributes, author attributes, and current event data may be used as inputs in the machine learning model and a confidence score may be output. Based on the confidence score, one or more alerts may be generated and transmitted to one or more enterprise organization computing devices.
-
公开(公告)号:US10440051B2
公开(公告)日:2019-10-08
申请号:US15448888
申请日:2017-03-03
摘要: Embodiments of the invention are directed to systems, methods and computer program products for enhanced detection of polymorphic malicious content within an entity. In this regard, the present invention receives information associated with an incidence of an electronic file; receives an first hash value of the electronic file from a first network device and a second hash value of the electronic file from a second network device; compares the first hash value with the second hash value; determines that the electronic file is polymorphic based on at least the match; initiates an execution of a quantum optimization algorithm using a quantum optimizer to determine one or more hash value states associated with the electronic file for a third network device; and initiates a control signal configured to store the one or more hash value states in a database associated with the third network device.
-
公开(公告)号:US11057421B2
公开(公告)日:2021-07-06
申请号:US16594545
申请日:2019-10-07
摘要: Embodiments of the invention are directed to systems, methods and computer program products for enhanced detection of polymorphic malicious content within an entity. In this regard, the present invention receives information associated with an incidence of an electronic file; receives an first hash value of the electronic file from a first network device and a second hash value of the electronic file from a second network device; compares the first hash value with the second hash value; determines that the electronic file is polymorphic based on at least the match; initiates an execution of a quantum optimization algorithm using a quantum optimizer to determine one or more hash value states; receive information associated with an incidence of the electronic file at the third network device; determine that the electronic file is malware; and initiate an intrusion detection protocol configured to deny the electronic file access to the third network device.
-
公开(公告)号:US10762504B2
公开(公告)日:2020-09-01
申请号:US15050379
申请日:2016-02-22
摘要: A closed-loop system is operatively connected with a block chain distributed network for using the block chain distributed network for facilitating operation of a transaction record sharing system. Host and source institutions function to supply a consolidated transaction record to a user in response to a request from a user to the host institution. The request is determined to meet a condition of the block chain thereby verifying the request. The verified request for a transaction record is transmitted to at least one source institution. The transaction record of the source institution is accessed by the host institution. A consolidated transaction record is communicated to the user based on the transaction record.
-
公开(公告)号:US10135870B2
公开(公告)日:2018-11-20
申请号:US15050375
申请日:2016-02-22
摘要: A closed-loop system is operatively connected with a block chain distributed network for using the block chain distributed network for facilitating operation of a transaction record sharing system between member institutions comprising a host system and a source system. Host and source institutions function to share the transaction records from member institutions such that a host institution that is a member of the block chain may obtain the transaction records of all source institutions of the block chain. The transaction records are validated on the block chain such that the transaction records are secure represent a source of truth.
-
公开(公告)号:US20200045059A1
公开(公告)日:2020-02-06
申请号:US16594545
申请日:2019-10-07
摘要: Embodiments of the invention are directed to systems, methods and computer program products for enhanced detection of polymorphic malicious content within an entity. In this regard, the present invention receives information associated with an incidence of an electronic file; receives an first hash value of the electronic file from a first network device and a second hash value of the electronic file from a second network device; compares the first hash value with the second hash value; determines that the electronic file is polymorphic based on at least the match; initiates an execution of a quantum optimization algorithm using a quantum optimizer to determine one or more hash value states; receive information associated with an incidence of the electronic file at the third network device; determine that the electronic file is malware; and initiate an intrusion detection protocol configured to deny the electronic file access to the third network device.
-
公开(公告)号:US20180255073A1
公开(公告)日:2018-09-06
申请号:US15448888
申请日:2017-03-03
CPC分类号: H04L63/145 , G06F16/22 , H04L63/1416
摘要: Embodiments of the invention are directed to systems, methods and computer program products for enhanced detection of polymorphic malicious content within an entity. In this regard, the present invention receives information associated with an incidence of an electronic file; receives an first hash value of the electronic file from a first network device and a second hash value of the electronic file from a second network device; compares the first hash value with the second hash value; determines that the electronic file is polymorphic based on at least the match; initiates an execution of a quantum optimization algorithm using a quantum optimizer to determine one or more hash value states associated with the electronic file for a third network device; and initiates a control signal configured to store the one or more hash value states in a database associated with the third network device.
-
公开(公告)号:US20170244757A1
公开(公告)日:2017-08-24
申请号:US15050375
申请日:2016-02-22
IPC分类号: H04L29/06
CPC分类号: H04L63/20 , H04L9/3236 , H04L9/3247 , H04L63/08 , H04L63/10 , H04L2209/38 , H04L2209/56
摘要: A closed-loop system is operatively connected with a block chain distributed network for using the block chain distributed network for facilitating operation of a transaction record sharing system between member institutions comprising a host system and a source system. Host and source institutions function to share the transaction records from member institutions such that a host institution that is a member of the block chain may obtain the transaction records of all source institutions of the block chain. The transaction records are validated on the block chain such that the transaction records are secure represent a source of truth.
-
-
-
-
-
-
-
-