G06F21/50

MALWARE DETECTION AND MITIGATION SYSTEM AND METHOD

A method and system for updating and applying a ruleset used for determining and mitigating malware threats. Communications of computing devices are monitored and first data file extracted. A first and second set of features are extracted. A first rule is applied to the first set of features of the first data file to determine a non-match. A second rule is applied to the second set of features to determine a match. A third rule is generated based on the first set of features, non-match, and match. Communications of a particular computing device are monitored and second data file extracted. A first set of features of the second data file are extracted. The third rule is applied to the first set of features of the second data file to determine a match. The second data file is disabled, blocked, or deleted based the match determination by the third rule.

Cyber security sharing and identification system

Systems and techniques for sharing security data are described herein. Security rules and/or attack data may be automatically shared, investigated, enabled, and/or used by entities. A security rule may be enabled on different entities comprising different computing systems to combat similar security threats and/or attacks. Security rules and/or attack data may be modified to redact sensitive information and/or configured through access controls for sharing.

Cyber security sharing and identification system

Systems and techniques for sharing security data are described herein. Security rules and/or attack data may be automatically shared, investigated, enabled, and/or used by entities. A security rule may be enabled on different entities comprising different computing systems to combat similar security threats and/or attacks. Security rules and/or attack data may be modified to redact sensitive information and/or configured through access controls for sharing.

Securing access to group accounts on a computer system
11599620 · 2023-03-07 · ·

A system, method, and computer program to implement Public Key Infrastructure (“PKI”)-based access controls on a computing device independently of the operating system's user identification and authorization system. A software application on a standalone, non-networked computing device detects a “smart card” with a PKI certificate identifying the card holder. The identity of the card holder is verified against a registry stored on the computing device separately from the operating system's user identification and authorization system. Verification of the identity of the card holder results in setting the state of the computer system as “authorized” or “unauthorized.” In the unauthorized state, user input and viewing of information is prevented. The software application may thus identify individual smart card holders and provide secure access to data and resources, and track authorized and unauthorized access on computing devices that must remain in an “always logged in” state.

Securing access to group accounts on a computer system
11599620 · 2023-03-07 · ·

A system, method, and computer program to implement Public Key Infrastructure (“PKI”)-based access controls on a computing device independently of the operating system's user identification and authorization system. A software application on a standalone, non-networked computing device detects a “smart card” with a PKI certificate identifying the card holder. The identity of the card holder is verified against a registry stored on the computing device separately from the operating system's user identification and authorization system. Verification of the identity of the card holder results in setting the state of the computer system as “authorized” or “unauthorized.” In the unauthorized state, user input and viewing of information is prevented. The software application may thus identify individual smart card holders and provide secure access to data and resources, and track authorized and unauthorized access on computing devices that must remain in an “always logged in” state.

Hardware trust boundaries and graphs in a data confidence fabric

Hardware trust boundaries in a data confidence fabric are provided. Nodes in a data confidence fabric are provisioned with identifies and confidence scores. Hardware-based trust insertion technologies are applied to data in the data confidence fabric. Protocols allow nodes to join the data confidence fabric and be aware of other nodes. Paths of data can be graphed and audited.

Hardware trust boundaries and graphs in a data confidence fabric

Hardware trust boundaries in a data confidence fabric are provided. Nodes in a data confidence fabric are provisioned with identifies and confidence scores. Hardware-based trust insertion technologies are applied to data in the data confidence fabric. Protocols allow nodes to join the data confidence fabric and be aware of other nodes. Paths of data can be graphed and audited.

Composite biometric authentication

Composite biometric authentication is provided to multiple users that share a financial account. The users can enroll the account for composite biometric authentication. The enrollment can include recording multiple biometrics of each user and storing them as a composite to use in authenticating user requests to authorize transactions involving the shared financial account. A unique combination of biometrics can be generated including a biometric of the multiple biometrics of each of the users and stored such that the unique combination must be provided to authenticate a future user request. To proceed with a transaction, a user of the multiple users initiates the transaction and provides their part of the unique combination. The other users provide their part of the unique combination by providing the specific biometric of the multiple biometrics they have previously provided. The transaction proceeds when all shares of the unique combination are provided and authenticated.

Composite biometric authentication

Composite biometric authentication is provided to multiple users that share a financial account. The users can enroll the account for composite biometric authentication. The enrollment can include recording multiple biometrics of each user and storing them as a composite to use in authenticating user requests to authorize transactions involving the shared financial account. A unique combination of biometrics can be generated including a biometric of the multiple biometrics of each of the users and stored such that the unique combination must be provided to authenticate a future user request. To proceed with a transaction, a user of the multiple users initiates the transaction and provides their part of the unique combination. The other users provide their part of the unique combination by providing the specific biometric of the multiple biometrics they have previously provided. The transaction proceeds when all shares of the unique combination are provided and authenticated.

Real-time vulnerability monitoring

An apparatus is provided including at least one platform; an intrusion prevention system configured to communicative couple with the at least one platform; a firewall configured to communicative couple with the at least one platform; at least one first data storage configured to communicative couple with the at least one platform; and at least one second data storage configured to communicative couple with the at least one platform. The at least one platform is configured to perform a plurality of operations that collective protect one or more networked devices.