DATA PROCESSING TRANSACTIONS BETWEEN DISPARATE SYSTEMS USING A UNIVERSAL PROCESSOR

    公开(公告)号:US20220407921A1

    公开(公告)日:2022-12-22

    申请号:US17352094

    申请日:2021-06-18

    IPC分类号: H04L29/08 G06K7/14

    摘要: A system is provided including a host processor, a plurality of service processors, a universal processor associated with the host processor and capable of exchanging data with each service processor, a first user device of the first user and a second user device of a second user. The universal processor receives a request from the first user device for a data transaction between the host processor and a service processor, and in response generates a code that can be interpreted by the service processor. Universal processor transmits the code to the first user device, which transmits the code to the second user device. The second user device transmits the code to the service processor. The service processor decodes the code and requests the universal processor to perform the data transaction with the host processor. In response, the universal processor sets up the data transaction.

    System for isolated access and analysis of suspicious code in a disposable computing environment

    公开(公告)号:US11636203B2

    公开(公告)日:2023-04-25

    申请号:US16907994

    申请日:2020-06-22

    IPC分类号: G06F21/55 G06F9/455

    摘要: Providing an isolation system that allows analysts to analyze suspicious information in a way that aids in preventing harmful information from spreading to other applications and systems on a network. A plurality of virtual containers may be used by analysts to analyze suspicious information. The analyst may set the virtual environment configurations (e.g., applications, programs, settings, etc.) of the virtual container. The analyst may determine how the suspicious information effects the virtual environment configuration and/or use tools to analyze the suspicious information. When harmful information is identified the virtual container may be discarded (e.g., folded up and deleted), and a new virtual container may be provided to the analyst to continue to analyze the suspicious information and/or new suspicious information.

    SHORT-RANGE WIRELESS-ENABLED MOBILE COMMUNICATION DEVICE LEASH FOR CONTROLLING DEVICE AND APPLICATION ACCESS

    公开(公告)号:US20230345220A1

    公开(公告)日:2023-10-26

    申请号:US17725322

    申请日:2022-04-20

    IPC分类号: H04W4/80 H04W4/02 H04B5/00

    CPC分类号: H04W4/80 H04W4/023 H04B5/0056

    摘要: A mobile communication device leash is provided which communicates via short-range-wireless communication (e.g., Near-Field Communication (NFC), BLUETOOTH®, ZIGBEE® or the like) with an associated mobile communication device. Once the mobile communication device is outside of the short-range wireless communication range (or outside of a predetermined range within the short-range wireless communication range) an action is triggered to control access to the mobile communication device itself and/or access functionality provided by the mobile communication device. The leash may be a simplistic wireless device, such as a wristband, card device or smart tag device having the sole function of controlling access to the mobile communication device itself (e.g., shutdown or locking the device) and/or access functionality provided by the mobile communication device (e.g., locking certain application or limiting access to data within certain applications).

    System for identifying suspicious code embedded in a file in an isolated computing environment

    公开(公告)号:US11574056B2

    公开(公告)日:2023-02-07

    申请号:US16913427

    申请日:2020-06-26

    摘要: Providing an isolation system that allows analysts to analyze suspicious information in way that aids in preventing harmful information from spreading to other applications and systems on a network. A plurality of virtual containers may be used by analysts to analyze suspicious information. The suspicious information may first be checked for signatures or patterns before being analyzed by the analyst or the isolation system. The identified signatures or patterns are then compared with the stored signatures or patterns to determine whether the suspicious information comprises harmful information or not. When the identified signatures or patterns are matched with stored signatures or patterns, the system may determine that the suspicious information comprises harmful information and performs one or more mitigation actions.

    SYSTEM FOR IDENTIFYING SUSPICIOUS CODE IN AN ISOLATED COMPUTING ENVIRONMENT BASED ON CODE CHARACTERISTICS

    公开(公告)号:US20210397699A1

    公开(公告)日:2021-12-23

    申请号:US16908155

    申请日:2020-06-22

    摘要: Providing an isolation system that allows analysts to analyze suspicious information in way that aids in preventing harmful information from spreading to other applications and systems on a network. A plurality of virtual containers may be used by analysts to analyze suspicious information. The suspicious information may first be hashed before being analyzed by the analyst. The hash for the suspicious information may be compared to stored hashes. When the hash meets a stored harmful hash the suspicious information may be determined to include harmful information without having to be further analyzed. When the hash meets a stored acceptable hash the suspicious information may be determined to be acceptable information without having to be further analyzed. Should the hash for the suspicious information fail to meet any stored hashes, then the suspicious information may be analyzed for harmful information within the virtual container.

    Short-range wireless-enabled mobile communication device leash for controlling device and application access

    公开(公告)号:US11974206B2

    公开(公告)日:2024-04-30

    申请号:US17725322

    申请日:2022-04-20

    IPC分类号: H04W4/80 H04B5/77 H04W4/02

    CPC分类号: H04W4/80 H04B5/77 H04W4/023

    摘要: A mobile communication device leash is provided which communicates via short-range-wireless communication (e.g., Near-Field Communication (NFC), BLUETOOTH®, ZIGBEE® or the like) with an associated mobile communication device. Once the mobile communication device is outside of the short-range wireless communication range (or outside of a predetermined range within the short-range wireless communication range) an action is triggered to control access to the mobile communication device itself and/or access functionality provided by the mobile communication device. The leash may be a simplistic wireless device, such as a wristband, card device or smart tag device having the sole function of controlling access to the mobile communication device itself (e.g., shutdown or locking the device) and/or access functionality provided by the mobile communication device (e.g., locking certain application or limiting access to data within certain applications).