-
公开(公告)号:US20250023888A1
公开(公告)日:2025-01-16
申请号:US18351147
申请日:2023-07-12
Applicant: Wells Fargo Bank, N.A.
Inventor: Jerry Reynolds , Venkat Sriram Karicherla , Michael Sbandi
IPC: H04L9/40
Abstract: A system for a business entity is disclosed that is configured to execute an authorized countermeasure against a malicious actor via a smart contract in response to the system determining that the malicious actor has performed a malicious action. The system determines that a smart contract established between the business entity and an official agency defines an authorized countermeasure to be performed in the event of the malicious action. The system also determines that the malicious actor has performed the malicious action on the business entity. In response to the determination that the malicious actor has performed the malicious action, the system executes the authorized countermeasure with respect to the malicious actor, which may include one or more of a ransomware attack, a malware distribution, a beacon, a Distributed Denial of Service attack, a destruction of data, an encryption of data, a tokenization of data, or a scrambling of data.
-
公开(公告)号:US12229548B1
公开(公告)日:2025-02-18
申请号:US18156785
申请日:2023-01-19
Applicant: Wells Fargo Bank, N.A.
Inventor: Edward J. Patterson , Matthew Thomas McDonald , Michael Sbandi , John Masiliunas , Richard Lee Goble , Brian Matthew White , Jerry Reynolds
IPC: G06Q10/00 , G06F8/41 , G06F8/70 , G06F9/445 , G06F9/455 , G06F18/214 , G06F21/57 , G06N20/00 , H04L9/40
Abstract: Techniques described herein include assessing factors that may affect the quality of software under development by a development team or that may be used to evaluate the health of software already deployed in a computing environment. In one example, this disclosure describes a method that includes collecting, by a computing system, historical information about a plurality of prior development projects; correlating, by the computing system, the historical information with each of a plurality of developers that participated in one or more of the plurality of prior development projects; collecting, by the computing system, information about an application developed by a subset of the plurality of developers; generating, by the computing system and based on the information about the application and the correlated historical information, a predicted outcome for the application; and taking an action, by the computing system and based on the predicted outcome, to prevent the predicted outcome.
-