G06F21/50

Text Analysis System, and Characteristic Evaluation System for Message Exchange Using the Same
20220343067 · 2022-10-27 ·

[Problem(s)] To provide a text analysis system that is low cost and able to detect text with a normal expressive or structural features.

[Solution] A text analysis system 100 according to the present invention includes a text acquisition portion 110 for acquiring text data; a feature extraction portion 120 for converting the text data acquired by the text acquisition portion 110 into a time series signal to extract a feature from the converted time series signal; a feature storage portion 130 for storing the feature extracted by feature extraction portion 120; and an anomalous text detection portion 140 for detecting anomalous text based on the feature in the feature storage portion 130.

Online identity verification platform and process
11611553 · 2023-03-21 · ·

An online identity verification application may be provided. According to an exemplary embodiment, an online identity verification application may utilize photographic, biometric, and documentation identification protocols. The verification application may use a multi-tier verification process based on identification protocols to verify the owner of a verification account and subsequently verify any linked accounts.

METHOD AND SYSTEM FOR COLLECTIVELY-DETERMINING STACKABLE SYSTEM ROLES IN AN INFORMATION HANDLING SYSTEM ENVIRONMENT
20220342694 · 2022-10-27 ·

A method for managing information handling systems includes initiating, by a stackable system role (SSR) manager of an information handling system of the set of information handling systems, a boot sequence, making a first determination that the boot sequence does not specify a SSR of the information handling system, and based on the first determination: performing a hardware evaluation to determine a SSR for the information handling system, broadcasting the SSR to the set of information handling systems, obtaining, in response to the broadcasting, SSR responses from each information handling system in the set of information handling systems, making a second determination, based on the SSR responses, that an SSR agreement between the set of information handling systems is obtained, based on the second determination, determining a final SSR, and continuing the boot sequence using the final SSR.

Maintainable distributed fail-safe real-time computer system
11481012 · 2022-10-25 · ·

A distributed maintainable real-time computer system is provided, wherein the real-time computer system includes at least two central computers and one, two or a plurality of peripheral computers. The central computers have access to a sparse global time, have identical hardware and identical software, but different startup data, wherein each functional central computer periodically sends time-triggered multi-cast life-sign messages to the other central computers according to a time plan a priori defined in its startup data, and wherein the peripheral computers (151, 152, 153, 154) can exchange messages (135) with the central computers (110, 120), and wherein at all times one central computer is in the active state and the other central computers are in the non-active state, and wherein after the apparent absence of a life-sign message of the active central computer expected at a planned reception time, that non-active functioning central computer which has the shortest start-up timeout takes over the function of the active central computer, and wherein each central computer (110, 120; 200) consists of three independent subsystems, an application computer (210), a storage medium having the startup data (230) characteristic of the central computer (200) and an internal monitor (220), wherein the internal monitor (220) periodically checks the correct functioning of the application computer (210), and wherein upon detection of an error the monitor (220) initiates a hardware reset and a restart of the application computer (210), and wherein preferably the active central computer initiates a maintenance action after an apparent absence of the life-sign messages expected at the planned reception times from a non-active central computer, which action can lead to the repair or replacement of a permanently failed central computer.

Maintainable distributed fail-safe real-time computer system
11481012 · 2022-10-25 · ·

A distributed maintainable real-time computer system is provided, wherein the real-time computer system includes at least two central computers and one, two or a plurality of peripheral computers. The central computers have access to a sparse global time, have identical hardware and identical software, but different startup data, wherein each functional central computer periodically sends time-triggered multi-cast life-sign messages to the other central computers according to a time plan a priori defined in its startup data, and wherein the peripheral computers (151, 152, 153, 154) can exchange messages (135) with the central computers (110, 120), and wherein at all times one central computer is in the active state and the other central computers are in the non-active state, and wherein after the apparent absence of a life-sign message of the active central computer expected at a planned reception time, that non-active functioning central computer which has the shortest start-up timeout takes over the function of the active central computer, and wherein each central computer (110, 120; 200) consists of three independent subsystems, an application computer (210), a storage medium having the startup data (230) characteristic of the central computer (200) and an internal monitor (220), wherein the internal monitor (220) periodically checks the correct functioning of the application computer (210), and wherein upon detection of an error the monitor (220) initiates a hardware reset and a restart of the application computer (210), and wherein preferably the active central computer initiates a maintenance action after an apparent absence of the life-sign messages expected at the planned reception times from a non-active central computer, which action can lead to the repair or replacement of a permanently failed central computer.

Clustering-based security monitoring of accessed domain names
11606384 · 2023-03-14 · ·

Domain names are determined for each computational event in a set, each event detailing requests or posts of webpages. A number of events or accesses associated with each domain name within a time period is determined. A registrar is further queried to determine when the domain name was registered. An object is generated that includes a representation of the access count and an age since registration for each domain names. A client can interact with the object to explore representations of domain names associated with high access counts and recent registrations. Upon determining that a given domain name is suspicious, a rule can be generated to block access to the domain name.

Clustering-based security monitoring of accessed domain names
11606384 · 2023-03-14 · ·

Domain names are determined for each computational event in a set, each event detailing requests or posts of webpages. A number of events or accesses associated with each domain name within a time period is determined. A registrar is further queried to determine when the domain name was registered. An object is generated that includes a representation of the access count and an age since registration for each domain names. A client can interact with the object to explore representations of domain names associated with high access counts and recent registrations. Upon determining that a given domain name is suspicious, a rule can be generated to block access to the domain name.

Method and Apparatus for Controlling Mobile Storage Device, and Computer-Readable Medium
20230131910 · 2023-04-27 · ·

Various embodiments include a mobile storage device control system. The system may include an independently operating scanning apparatus configured to: detect insertion of a mobile storage device, scan the mobile storage device to determine whether the mobile storage device poses a security threat, perform a specific operation on the mobile storage device so the specific operation is recorded in a file system log of the mobile storage device, and the record of the specific operation is used to mark whether the mobile storage device has been modified after being scanned. The system may include a control apparatus configured to: detect insertion of the mobile storage device, check whether the last record in the file system log in the mobile storage device is the record of the specific operation, if so, permit a user to access the mobile storage device and otherwise prohibit the user from accessing the mobile storage device.

Enterprise security measures

A system for managing security within an enterprise includes a computing device that receives a vulnerability, generates a user score for each user within the enterprise and generates a threat score for the vulnerability. A user device score may also be generated for each device associated with a user. Based on the user score and the threat score, a composite score is generated. After acquiring a security measure, the security measure is implemented based on the composite score and, at times, the user score.

Enterprise security measures

A system for managing security within an enterprise includes a computing device that receives a vulnerability, generates a user score for each user within the enterprise and generates a threat score for the vulnerability. A user device score may also be generated for each device associated with a user. Based on the user score and the threat score, a composite score is generated. After acquiring a security measure, the security measure is implemented based on the composite score and, at times, the user score.