Optimization of redundant usage patterns based on historical data and security constraints

    公开(公告)号:US11425100B2

    公开(公告)日:2022-08-23

    申请号:US16930555

    申请日:2020-07-16

    IPC分类号: H04L9/40 H04L41/5006

    摘要: Typically, a business desires to track and monitor all applications run on its servers. Nonetheless, one or more unauthorized applications may be running on the business's servers, exposing the business to potential regulatory liability and security breaches. Apparatus and methods are provided for isolating and disabling one or more unauthorized applications running on a server. The apparatus may comprise a system including a content-filtering web proxy server configured to filter outgoing requests and data associated with the requests. The system may also include a remediation framework configured to monitor request data in a proxy log stored by the proxy server. The remediation framework may be triggered to perform remedial action when the remediation framework determines that a request and associated data, as stored in the proxy log, meets predetermined conditions. The remediation framework, when triggered, may execute steps to truncate functionality of the unauthorized applications.

    Methods and apparatus for a multi-graph search and merge engine

    公开(公告)号:US11354325B2

    公开(公告)日:2022-06-07

    申请号:US16170317

    申请日:2018-10-25

    摘要: Aspects of the disclosure relate to a system for amalgamating a plurality of graphs. The system may include a set of graphs. A user may input search criteria via a user interface (“UI”) module. The system may search the set of graphs for a subset of qualifying graphs that satisfy the search criteria. The subset of graphs may be merged into an amalgamated graph. Merging the graphs may include superimposing the qualifying graphs over each other at a locus. The locus may be a node or a sub-graph. The amalgamated graph may be displayed via the UI module.

    Optimization of the isolation and disabling of unauthorized applications by detection of false positives

    公开(公告)号:US11258768B2

    公开(公告)日:2022-02-22

    申请号:US16920482

    申请日:2020-07-03

    摘要: Typically, a business desires to track and monitor all applications run on its servers. Nonetheless, one or more unauthorized applications may be running on the business's servers, exposing the business to potential regulatory liability and security breaches. Apparatus and methods are provided for isolating and disabling one or more unauthorized applications running on a server. The apparatus may comprise a system including a content-filtering web proxy server configured to filter outgoing requests and data associated with the requests. The system may also include a remediation framework configured to monitor request data in a proxy log stored by the proxy server. The remediation framework may be triggered to perform remedial action when the remediation framework determines that a request and associated data, as stored in the proxy log, meets predetermined conditions. The remediation framework, when triggered, may execute steps to truncate functionality of the unauthorized applications.

    AGGREGATED SENTIMENT ANALYSIS SYSTEM FOR THREAT PROTECTION

    公开(公告)号:US20210209306A1

    公开(公告)日:2021-07-08

    申请号:US16732417

    申请日:2020-01-02

    摘要: A system for aggregating sentiment analysis of communications between a plurality of entity groups is provided. The system may include a plurality of entity groups. Each entity group may include one entity, two entities or a plurality of entities. The system may include a plurality of communications. Each of the communications may be transmitted from a first entity. A first entity group may include the first entity. The plurality of entity groups may include the first entity group. Each of the communications may be transmitted to a second entity. The second entity may be included in a second entity group. The second entity group may be included in the plurality of entity groups. The system may also include a sentiment score determination module. The sentiment score determination module may determine an aggregate sentiment score for the plurality of communications. The sentiment score may determine a communication threat level.

    Cognitive automation-based engine to propagate data across systems

    公开(公告)号:US10917491B1

    公开(公告)日:2021-02-09

    申请号:US16808856

    申请日:2020-03-04

    摘要: Aspects of the disclosure relate to cognitive automation-based engine processing to propagate data across multiple systems via a private network to overcome technical system, resource consumption, and architecture limitations. Data to be propagated can be manually input or extracted from a digital file. The data can be parsed by analyzing for correct syntax, normalized into first through sixth normal forms, segmented into packets for efficient data transmission, validated to ensure that the data satisfies defined formats and input criteria, and distributed into a plurality of data stores coupled to the private network, thereby propagating data without repetitive manual entry. The data may also be enriched by, for example, correcting for any errors or linking with other potentially related data. Based on data enrichment, recommendations of additional target(s) for propagation of data can be identified. Reports may also be generated. The cognitive automation may be performed in real-time to expedite processing.

    REFLEXIVE BENIGN SERVICE ATTACK ON IOT DEVICE(S)

    公开(公告)号:US20190268370A1

    公开(公告)日:2019-08-29

    申请号:US15903154

    申请日:2018-02-23

    IPC分类号: H04L29/06 H04L29/08

    摘要: A method is provided for preventing an IoT device within a trusted system from being harnessed in a malicious DDOS attack. The method may include bombarding the IoT device. The bombardment may originate from within the system, and may inundate the IoT device with harmless packets in a manner mimicking a traditional DOS attack. The inundating may utilize the resources of the IoT device to respond to the bombardment, and may thereby render the IoT device unavailable for fraudulent uses.

    Processing system for providing enhanced reality interfaces at an automated teller machine (ATM) terminal platform

    公开(公告)号:US11410506B2

    公开(公告)日:2022-08-09

    申请号:US17108109

    申请日:2020-12-01

    摘要: Aspects of the disclosure relate to processing systems that implement an enhanced reality device to facilitate transactions at a screen-less automated teller machine (ATM). A computing platform may receive a request to initiate a transaction with a screen-less automated ATM. Based on the request to initiate the transaction, the computing platform may send pre-transaction interface information and commands directing the enhanced reality device to generate a pre-transaction interface. The computing platform may receive an authentication request from the screen-less ATM indicating its availability and requesting authentication information. In response to validating the authentication information, the computing platform may generate transaction interface information. The computing platform may send the transaction interface information to the enhanced reality device. The computing platform may receive a transaction completion indication from the screen-less ATM. After receiving the transaction completion indication, the computing platform may send haptic feedback indicating that the transaction is complete.

    Engine to Propagate Data Across Systems

    公开(公告)号:US20220086250A1

    公开(公告)日:2022-03-17

    申请号:US17533351

    申请日:2021-11-23

    摘要: Aspects of the disclosure relate to cognitive automation-based engine processing to propagate data across multiple systems via a private network to overcome technical system, resource consumption, and architecture limitations. Data to be propagated can be manually input or extracted from a digital file. The data can be parsed by analyzing for correct syntax, normalized into first through sixth normal forms, segmented into packets for efficient data transmission, validated to ensure that the data satisfies defined formats and input criteria, and distributed into a plurality of data stores coupled to the private network, thereby propagating data without repetitive manual entry. The data may also be enriched by, for example, correcting for any errors or linking with other potentially related data. Based on data enrichment, recommendations of additional target(s) for propagation of data can be identified. Reports may also be generated. The cognitive automation may be performed in real-time to expedite processing.