-
公开(公告)号:US20230418949A1
公开(公告)日:2023-12-28
申请号:US17847805
申请日:2022-06-23
发明人: Dustin Paul Stocks , Kayla Ashley Rux , Viswanathan Venkatasubramanian , Ramkumar Korlepara , Sanjay Lohar , Eric Eugene Sifford , Ashley L. Jones , David Cuka
CPC分类号: G06F21/577 , G06F40/20 , G06N20/00
摘要: Arrangements for providing software vulnerability analysis and monitoring are provided. In some aspects, software bill of materials (SBOM) data may be received and software attributes may be extracted from the SBOM data. Author data may be received and analyzed using natural language processing and/or machine learning to identify author attributes. Current event or vulnerability data may be received. In some examples, one or more machine learning models may be executed to determine a confidence score associated with the software being analyzed. For instance, software attributes, author attributes, and current event data may be used as inputs in the machine learning model and a confidence score may be output. Based on the confidence score, one or more alerts may be generated and transmitted to one or more enterprise organization computing devices.
-
公开(公告)号:US20220407921A1
公开(公告)日:2022-12-22
申请号:US17352094
申请日:2021-06-18
发明人: Dustin Paul Stocks , Jinna Zevulun Kim , Robert Nyeland Huggins , Pratap Dande , George Anthony Albero
摘要: A system is provided including a host processor, a plurality of service processors, a universal processor associated with the host processor and capable of exchanging data with each service processor, a first user device of the first user and a second user device of a second user. The universal processor receives a request from the first user device for a data transaction between the host processor and a service processor, and in response generates a code that can be interpreted by the service processor. Universal processor transmits the code to the first user device, which transmits the code to the second user device. The second user device transmits the code to the service processor. The service processor decodes the code and requests the universal processor to perform the data transaction with the host processor. In response, the universal processor sets up the data transaction.
-
公开(公告)号:US12107925B2
公开(公告)日:2024-10-01
申请号:US17352094
申请日:2021-06-18
发明人: Dustin Paul Stocks , Jinna Zevulun Kim , Robert Nyeland Huggins , Pratap Dande , George Anthony Albero
IPC分类号: H04L67/141 , G06K7/14 , H04L67/146
CPC分类号: H04L67/141 , G06K7/1417 , H04L67/146
摘要: A system is provided including a host processor, a plurality of service processors, a universal processor associated with the host processor and capable of exchanging data with each service processor, a first user device of the first user and a second user device of a second user. The universal processor receives a request from the first user device for a data transaction between the host processor and a service processor, and in response generates a code that can be interpreted by the service processor. Universal processor transmits the code to the first user device, which transmits the code to the second user device. The second user device transmits the code to the service processor. The service processor decodes the code and requests the universal processor to perform the data transaction with the host processor. In response, the universal processor sets up the data transaction.
-
4.
公开(公告)号:US20230344930A1
公开(公告)日:2023-10-26
申请号:US17725258
申请日:2022-04-20
IPC分类号: H04M1/72421 , G06V40/16 , G06V40/20 , G08B25/01
CPC分类号: H04M1/72421 , G06V40/176 , G06V40/20 , G08B25/016
摘要: Automatically and covertly activating audio/video mechanisms within a mobile communication device when a user is confronted with a duress-inducing event or a situation based on receipt of a duress indicator. The duress indicator is a subtle user input, such as a personal gesture, personal audible code or device input that triggers the covert activation of audio/video recording mechanisms on a mobile communication device. As a result, audio and/or video data of a duress-inducing event can be captured absent other parties to the duress-inducing event being aware that audio/video data is being captured.
-
5.
公开(公告)号:US11636203B2
公开(公告)日:2023-04-25
申请号:US16907994
申请日:2020-06-22
摘要: Providing an isolation system that allows analysts to analyze suspicious information in a way that aids in preventing harmful information from spreading to other applications and systems on a network. A plurality of virtual containers may be used by analysts to analyze suspicious information. The analyst may set the virtual environment configurations (e.g., applications, programs, settings, etc.) of the virtual container. The analyst may determine how the suspicious information effects the virtual environment configuration and/or use tools to analyze the suspicious information. When harmful information is identified the virtual container may be discarded (e.g., folded up and deleted), and a new virtual container may be provided to the analyst to continue to analyze the suspicious information and/or new suspicious information.
-
6.
公开(公告)号:US20240061950A1
公开(公告)日:2024-02-22
申请号:US17889093
申请日:2022-08-16
CPC分类号: G06F21/6245 , G06F40/20 , G06F2221/2111 , G06F2221/2141
摘要: A system is provided for monitoring real-time data inputs across multiple channels, determining potential impacts to a network or entity policy taxonomy, and taking one or more automated, responsive actions based on determined impacts. In this way, the system described herein is able to optimize system processes and system protections on an enterprise-wide scale in response to current events, policy or regulation changes, or predicted measures taken by private or public entities that may necessitate adaptation of one or more workflow processes or technology taxonomies, either upstream or downstream of the system itself.
-
7.
公开(公告)号:US20230345220A1
公开(公告)日:2023-10-26
申请号:US17725322
申请日:2022-04-20
发明人: Dustin Paul Stocks
CPC分类号: H04W4/80 , H04W4/023 , H04B5/0056
摘要: A mobile communication device leash is provided which communicates via short-range-wireless communication (e.g., Near-Field Communication (NFC), BLUETOOTH®, ZIGBEE® or the like) with an associated mobile communication device. Once the mobile communication device is outside of the short-range wireless communication range (or outside of a predetermined range within the short-range wireless communication range) an action is triggered to control access to the mobile communication device itself and/or access functionality provided by the mobile communication device. The leash may be a simplistic wireless device, such as a wristband, card device or smart tag device having the sole function of controlling access to the mobile communication device itself (e.g., shutdown or locking the device) and/or access functionality provided by the mobile communication device (e.g., locking certain application or limiting access to data within certain applications).
-
8.
公开(公告)号:US11574056B2
公开(公告)日:2023-02-07
申请号:US16913427
申请日:2020-06-26
摘要: Providing an isolation system that allows analysts to analyze suspicious information in way that aids in preventing harmful information from spreading to other applications and systems on a network. A plurality of virtual containers may be used by analysts to analyze suspicious information. The suspicious information may first be checked for signatures or patterns before being analyzed by the analyst or the isolation system. The identified signatures or patterns are then compared with the stored signatures or patterns to determine whether the suspicious information comprises harmful information or not. When the identified signatures or patterns are matched with stored signatures or patterns, the system may determine that the suspicious information comprises harmful information and performs one or more mitigation actions.
-
公开(公告)号:US20210397699A1
公开(公告)日:2021-12-23
申请号:US16908155
申请日:2020-06-22
摘要: Providing an isolation system that allows analysts to analyze suspicious information in way that aids in preventing harmful information from spreading to other applications and systems on a network. A plurality of virtual containers may be used by analysts to analyze suspicious information. The suspicious information may first be hashed before being analyzed by the analyst. The hash for the suspicious information may be compared to stored hashes. When the hash meets a stored harmful hash the suspicious information may be determined to include harmful information without having to be further analyzed. When the hash meets a stored acceptable hash the suspicious information may be determined to be acceptable information without having to be further analyzed. Should the hash for the suspicious information fail to meet any stored hashes, then the suspicious information may be analyzed for harmful information within the virtual container.
-
10.
公开(公告)号:US11974206B2
公开(公告)日:2024-04-30
申请号:US17725322
申请日:2022-04-20
发明人: Dustin Paul Stocks
摘要: A mobile communication device leash is provided which communicates via short-range-wireless communication (e.g., Near-Field Communication (NFC), BLUETOOTH®, ZIGBEE® or the like) with an associated mobile communication device. Once the mobile communication device is outside of the short-range wireless communication range (or outside of a predetermined range within the short-range wireless communication range) an action is triggered to control access to the mobile communication device itself and/or access functionality provided by the mobile communication device. The leash may be a simplistic wireless device, such as a wristband, card device or smart tag device having the sole function of controlling access to the mobile communication device itself (e.g., shutdown or locking the device) and/or access functionality provided by the mobile communication device (e.g., locking certain application or limiting access to data within certain applications).
-
-
-
-
-
-
-
-
-