G06F21/31

Extensible platform for orchestration of data with enhanced security
20230046370 · 2023-02-16 ·

In a computer system, an orchestration platform includes extensible components that interact with external systems and technology. The platform is secured by means of architectural features, encryption, and access control.

PROACTIVELY PROTECTED PROCESSING SYSTEM AND METHOED FOR CYBERSECURITY
20230049144 · 2023-02-16 ·

A proactively protected (P2) processing system and method is invented for stopping the cyber-attacks from malicious usages of computing systems. The invention is applicable to eliminate the roots of the cyber-threats before a successful cyber-incident. Thereby, demand for resilient computing systems to survive a cyber-incident will be disappeared. Any recovery act and information loss is not happened. The invention dynamically switches a plurality of instruction sets at random or scheduled time for determining authorized operations with code compatibility. Therefore, a P2 processing system and method can detect and delete only unauthorized operations before being executed while executing authorized operations.

PROACTIVELY PROTECTED PROCESSING SYSTEM AND METHOED FOR CYBERSECURITY
20230049144 · 2023-02-16 ·

A proactively protected (P2) processing system and method is invented for stopping the cyber-attacks from malicious usages of computing systems. The invention is applicable to eliminate the roots of the cyber-threats before a successful cyber-incident. Thereby, demand for resilient computing systems to survive a cyber-incident will be disappeared. Any recovery act and information loss is not happened. The invention dynamically switches a plurality of instruction sets at random or scheduled time for determining authorized operations with code compatibility. Therefore, a P2 processing system and method can detect and delete only unauthorized operations before being executed while executing authorized operations.

IMAGE PROCESSING SYSTEM USING AUTHENTICATION INFORMATION ACQUIRED THROUGH TWO-FACTOR AUTHENTICATION, METHOD FOR CONTROLLING IMAGE PROCESSING SYSTEM, AND STORAGE MEDIUM
20230050211 · 2023-02-16 ·

To control an image forming apparatus using a service on a network, an information terminal performs two-factor authentication and acquires authentication information through the two-factor authentication so that the image forming apparatus accesses the service.

CENTRALIZED DYNAMIC PORTAL FOR CREATING AND HOSTING STATIC AND DYNAMIC APPLICATIONS

Embodiments of the present invention provide a system for creating and hosting static and dynamic applications. The system is configured for receiving one or more inputs from at least one user, wherein the one or more inputs are associated with creation of one or more applications, extracting one or more templates and present the one or more templates to the at least one user, selecting a template of the one or more templates, automatically selecting a server from one or more servers to host the one or more applications, establishing a connection to the server and extract a data set from the server, rendering data in the data set and apply the data to the template, via an artificial intelligence engine, generating one or more template previews based on applying the data to the template, and displaying the one or more template previews to the at least one user.

CENTRALIZED DYNAMIC PORTAL FOR CREATING AND HOSTING STATIC AND DYNAMIC APPLICATIONS

Embodiments of the present invention provide a system for creating and hosting static and dynamic applications. The system is configured for receiving one or more inputs from at least one user, wherein the one or more inputs are associated with creation of one or more applications, extracting one or more templates and present the one or more templates to the at least one user, selecting a template of the one or more templates, automatically selecting a server from one or more servers to host the one or more applications, establishing a connection to the server and extract a data set from the server, rendering data in the data set and apply the data to the template, via an artificial intelligence engine, generating one or more template previews based on applying the data to the template, and displaying the one or more template previews to the at least one user.

System and method for PIN entry on mobile devices
11580208 · 2023-02-14 · ·

A system for entering a secure Personal Identification Number (PIN) into a mobile computing device includes a mobile computing device and a peripheral device that are connected via a data communication link. The mobile computing device includes a mobile application and a display and the mobile application runs on the mobile computing device and displays a grid on the mobile computing device display. The peripheral device includes a display and an encryption engine, and the peripheral device display displays a grid corresponding to the grid displayed on the mobile computing device display. Positional inputs on the mobile computing device grid are sent to the peripheral device and the peripheral device decodes the positional inputs into PIN digits and generates an encrypted PIN and then sends the encrypted PIN back to the mobile computing device.

System and method for PIN entry on mobile devices
11580208 · 2023-02-14 · ·

A system for entering a secure Personal Identification Number (PIN) into a mobile computing device includes a mobile computing device and a peripheral device that are connected via a data communication link. The mobile computing device includes a mobile application and a display and the mobile application runs on the mobile computing device and displays a grid on the mobile computing device display. The peripheral device includes a display and an encryption engine, and the peripheral device display displays a grid corresponding to the grid displayed on the mobile computing device display. Positional inputs on the mobile computing device grid are sent to the peripheral device and the peripheral device decodes the positional inputs into PIN digits and generates an encrypted PIN and then sends the encrypted PIN back to the mobile computing device.

System for implementing multi-dimensional data obfuscation

Systems, computer program products, and methods are described herein for implementing multi-dimensional data obfuscation. The present invention is configured to electronically receive, from a computing device of a user, a request to implement a multi-dimensional data obfuscation on a first database; initiate a data obfuscation engine on the first database based on at least receiving the request, wherein initiating further comprises: determining one or more data types associated with the one or more data artifacts; determining one or more exposure levels of the one or more data artifacts; retrieving, from a data obfuscation repository, one or more data obfuscation algorithms; and implementing the one or more data obfuscation algorithms on the one or more data artifacts based on at least the one or more data types; and generate an obfuscated first database based on at least initiating the data obfuscation engine on the first database.

System for implementing multi-dimensional data obfuscation

Systems, computer program products, and methods are described herein for implementing multi-dimensional data obfuscation. The present invention is configured to electronically receive, from a computing device of a user, a request to implement a multi-dimensional data obfuscation on a first database; initiate a data obfuscation engine on the first database based on at least receiving the request, wherein initiating further comprises: determining one or more data types associated with the one or more data artifacts; determining one or more exposure levels of the one or more data artifacts; retrieving, from a data obfuscation repository, one or more data obfuscation algorithms; and implementing the one or more data obfuscation algorithms on the one or more data artifacts based on at least the one or more data types; and generate an obfuscated first database based on at least initiating the data obfuscation engine on the first database.