Patent classifications
G06F21/50
System and method for integrating cyber fraud intelligence and payment risk decisions
The invention relates to a method and system that combines payment data and cyber fraud indicators to identify potential fraud in payment requests from a client. The system comprises: a memory that stores and maintains a list of known fraud characteristics and cyber fraud indicators; and a computer processor, coupled to the memory, programmed to: receive, via an electronic input, a payment instruction from the client; identify one or more cyber fraud indicators associated with the payment instruction; apply payment decisioning to merge the one or more cyber fraud indicators to the payment instruction; generate a risk score based on the payment decisioning to determine whether the payment instruction should be executed; and automatically apply the payment decisioning to the payment instruction.
System and method for integrating cyber fraud intelligence and payment risk decisions
The invention relates to a method and system that combines payment data and cyber fraud indicators to identify potential fraud in payment requests from a client. The system comprises: a memory that stores and maintains a list of known fraud characteristics and cyber fraud indicators; and a computer processor, coupled to the memory, programmed to: receive, via an electronic input, a payment instruction from the client; identify one or more cyber fraud indicators associated with the payment instruction; apply payment decisioning to merge the one or more cyber fraud indicators to the payment instruction; generate a risk score based on the payment decisioning to determine whether the payment instruction should be executed; and automatically apply the payment decisioning to the payment instruction.
INTELLIGENT ORCHESTRATION OF VIDEO OR IMAGE MIRRORING USING A PLATFORM FRAMEWORK
Embodiments of systems and methods for methods for the intelligent orchestration of video or image mirroring using a platform framework are described. In some embodiments, an Information Handling System (IHS) may include a processor and a memory coupled to the processor, the memory having program instructions stored thereon that, upon execution, cause the IHS to: receive a notification, via a platform framework, of a communication session; and in response to the notification, apply a video or image mirroring operation, via the platform framework, to at least a portion of content shared during the communication session.
INTELLIGENT ORCHESTRATION OF VIDEO OR IMAGE MIRRORING USING A PLATFORM FRAMEWORK
Embodiments of systems and methods for methods for the intelligent orchestration of video or image mirroring using a platform framework are described. In some embodiments, an Information Handling System (IHS) may include a processor and a memory coupled to the processor, the memory having program instructions stored thereon that, upon execution, cause the IHS to: receive a notification, via a platform framework, of a communication session; and in response to the notification, apply a video or image mirroring operation, via the platform framework, to at least a portion of content shared during the communication session.
System and method of adding tags for use in detecting computer attacks
Disclosed are systems and methods of adding tags for use in detecting computer attacks. In one aspect, the system comprises a computer protection module configured to: receive a security notification, extract an object from the security notification, search for the extracted object in a threat database, add a first tag corresponding to the extracted object in the threat database only when the extracted object is found in the threat database, search for signs of suspicious activity in a database of suspicious activities based on the received security notification and the added first tag, and when at least one sign of suspicious activity is found, extract a second tag from the database of suspicious activities and add the second tag to an object database, wherein the object database is used for identifying signature of targeted attacks based on security notifications, objects, first tags and second tags.
System and method of adding tags for use in detecting computer attacks
Disclosed are systems and methods of adding tags for use in detecting computer attacks. In one aspect, the system comprises a computer protection module configured to: receive a security notification, extract an object from the security notification, search for the extracted object in a threat database, add a first tag corresponding to the extracted object in the threat database only when the extracted object is found in the threat database, search for signs of suspicious activity in a database of suspicious activities based on the received security notification and the added first tag, and when at least one sign of suspicious activity is found, extract a second tag from the database of suspicious activities and add the second tag to an object database, wherein the object database is used for identifying signature of targeted attacks based on security notifications, objects, first tags and second tags.
SYSTEMS, METHODS, APPARATUSES AND COMPUTER PROGRAM PRODUCTS FOR EXECUTING DATA VERIFICATION OPERATIONS BETWEEN INDEPENDENT COMPUTING RESOURCES
Various embodiments are directed to apparatuses, methods, and computer program products for executing centralized data verification using supported data structures associated with one or more third-party system. In various embodiments, an apparatus is configured to retrieve from a verification system repository associated with a verification system a supported data structure associated with a data structure identifier from the verification system repository; based on the third-party system identifier associated with the data structure, provide a data structure inquiry request data packet to a third-party resource to request a verification data structure associated with the data structure identifier from the third-party resource; receive an unsupported verification data structure associated with the data structure identifier from the third-party resource in an unsupported format defined by the third-party resource; convert the unsupported verification data structure into a supported format in association with generating a supported verification data structure using one or more validation rules.
User authentication system
Described are systems and techniques configured to authenticate a user upon entry to a facility. Prior to entry, the user may log in to a secure website with valid credentials, whereupon a login image of the user at the time of login is acquired. In one implementation, optically encoded data is generated which includes data representative of the login image, an acquisition timestamp, and an identifier value. At entry of the user to the facility, an entry image of the user's face, an image of the optically encoded data as presented on a display of a computing device in possession of the user, and an entry timestamp are acquired. By determining the timestamp is within a valid range of time and the data representative of the login image corresponds to the entry image, the user is authenticated to the identifier value.
Determining the Exposure Level Of Vulnerabilities
A method includes receiving a scan request requesting to scan a set of network-connected assets designated for a network scan. For each respective network-connected asset, the method includes scanning, at a network security scanner using a first scanning privilege level, the respective network-connected asset. The method includes determining, based on the scan using the first scanning privilege level, whether the respective network-connected asset has a vulnerability. In response, the method includes scanning, at the network security scanner using a second scanning privilege level, the respective network-connected asset. The second scanning privilege level defines a lower level of access the network security scanner has than the first scanning privilege level. The method includes determining, based on the scans, an exposure level of the vulnerability. The method includes reporting the exposure level of the vulnerability to a user of the respective network-connected asset.
FPGA CHIP WITH PROTECTED JTAG INTERFACE
One aspect provides an FPGA chip mounted on a printed circuit board (PCB). The FPGA chip can include a joint test action group (JTAG) interface comprising a number of input/output pins and an enablement pin, and a control logic block coupled to the enablement pin of the JTAG interface. The control logic block can receive a control signal from an off-chip control unit and control a logical value of the enablement pin based on the received control signal, thereby facilitating the off-chip control unit to lock or unlock the JTAG interface. The FPGA chip can further include a detection logic block to detect an unauthorized access to the FPGA chip. An input to the detection logic is coupled to the enablement pin, and a conductive trace coupling the input of the detection logic block and the enablement pin is situated on an inner layer of the PCB.