Patent classifications
G06F2221/2101
Realestate as tradable digital assets through blockchain integration
An assignable realestate system includes a processor, a storage medium, a wireless device including a digital key, a lock assembly for access to realestate, a data file, and a blockchain application. The data file is stored in the medium, and includes a plurality of linked blocks. Each block includes a respective asset transaction data of a plurality of asset transaction data with each data being time stamped. The blockchain application is stored in the medium and executed by the processor. The blockchain application is configured to apply the data file to determine a current asset transaction data of the plurality of asset transaction data and output an authorization signal to the lock assembly associated with the device for access to the realestate.
RUNTIME RISK ASSESSMENT TO PROTECT STORAGE SYSTEMS FROM DATA LOSS
Embodiments of the runtime risk assessment process monitors deliberate or potentially data destructive operations against a filter of dynamic risk assessment. A filter process recognizes the following conditions as highly indicative of increased risk factors: (1) recent creation of the security officer role, (2) changing of the system time or clock, and (3) disabling of system alerts. If all three of these events occur, the system recognizes this as indicative of a high probability of data attack. The runtime risk assessment process imposes a delay on the execution of each of these commands to provide time to alert the user and an opportunity to re-enter the commands at the end of the delay period. Thus, a potentially dangerous sequence of commands will not occur automatically or immediately, but will instead be delayed to provide an extra validation check or user action.
System-on-chip and method for operating a system-on-chip
In different example embodiments, a system-on-chip is provided. The system-on-chip can have a control circuit with a plurality of control circuit areas, wherein the control circuit is configured to control a device, a security circuit which has a separately secured key memory and a hardware accelerator for cryptographic operations, wherein the security circuit is configured to electively enable either a read-only access or a read and write access to at least one of the control circuit areas, wherein the security circuit is furthermore configured to provide a communication path by means of the key memory and the hardware accelerator for the secured communication with a diagnostic system disposed outside the security circuit, to make the selection between the read access and the read and write access to the at least one selected area of the control circuit depending on a certificate supplied to the security circuit and authenticated by means of information stored in the key memory, and to execute the read access or the read and write access.
Data Validation in a Mobile Communication Network
A virtualized network function included in a mobile communication network may be capable of performing validation of sensor data. The sensor data may be generated by one or more sensors monitoring a tangible asset that is being transported between geographical locations. The sensor data may be received by the virtualized network function from an Internet-enabled device in communication with the mobile communication network. In some cases, a contract management application included in the virtualized network function may validate the sensor data based on one or more compliance thresholds describing a shipment condition of the tangible asset. Based on determining whether the sensor data indicates a compliant shipment condition for the tangible asset, the contract management application may modify a contract associated with the tangible asset.
System and method for performing remote security assessment of firewalled computer
Methods and systems for scanning an endpoint terminal across an open computer network are disclosed. An exemplary method includes providing a scanner engine in a computer server in communication with an open computer network, and establishing a secure connection across the open computer network between the scanner engine and a scanner agent installed on the endpoint terminal in communication with the open computer network. Commands for collecting data regarding the endpoint terminal are sent from the scanner engine across the secure connection to the scanner agent. The scanner engine then receives the collected data from the scanner agent across the secure connection, analyzes the data to assess a current posture of the endpoint terminal, and determines any updates for the endpoint terminal from the analysis. Updates are sent across the secure connection to the scanner agent for installation on the endpoint terminal, and the secure connection may then be terminated.
Systems and methods for securing and disseminating time sensitive information using a blockchain
An information computer system is provided for securely releasing time-sensitive information to recipients via a blockchain. A submitter submits a document to the system and a blockchain transaction is generated and submitted to the blockchain based on the document (e.g., the document is included as part of the blockchain transaction). An editor may edit the document and an approver may approve the document for release to the recipients. Each modification and/or approval of the document is recorded as a separate transaction on the blockchain where each of the submitter, editor, approver, and recipients interact with the blockchain with corresponding unique digital identifiers—such as private keys.
AUTOMATED ASSOCIATION OF MEDIA WITH OCCURRENCE RECORDS
A system, method and program storage device are provided for automatically associating evidence recorded by a plurality of cameras with a discrete occurrence, including: receiving occurrence data pertaining to the discrete occurrence and storing at least a portion of the occurrence data in an occurrence record; receiving first evidence data comprising at least a video data portion and a metadata portion of the evidence recorded by a first camera of the plurality of cameras and storing it in an evidence record; receiving second evidence data comprising at least a video data portion and a metadata portion of the evidence recorded by a second camera of the plurality of cameras and storing it in the evidence record; automatically associating information stored in the evidence record with information stored in the occurrence record based on a correspondence of at least two criteria including a first criterion of time; identifying, based on the automatic association, a first image data portion of the evidence recorded by the first camera that is related to the discrete occurrence while excluding a second image data portion of the evidence recorded by the first camera that is unrelated to the discrete occurrence; and identifying, based on the automatic association, a third image data portion of the evidence recorded by the second camera that is related to the discrete occurrence while excluding a fourth image data portion of the evidence recorded by the second camera that is unrelated to the discrete occurrence.
GOVERNED DATABASE CONNECTIVITY (GDBC) THROUGH AND AROUND DATA CATALOG TO REGISTERED DATA SOURCES
An embodiment includes receiving, at database connectivity (DBC) layer, a request to access data of a data source, wherein the data source is registered with a data catalog that includes data governance artifacts, and wherein the request is made via a connection that bypasses the data catalog. The embodiment also includes comparing, by a governance manager at the DBC layer, an access privilege level for a credential associated with the request to access requirements of requested data included in data protection rules of the governance artifacts. The embodiment also includes masking, by the governance manager, a portion of the data provided in response to the request, wherein the portion of the data has an access requirement that is not met by the access privilege level for the credential associated with the request.
Method for detecting intrusions in an audit log
A method detects intrusions in an audit log including records of user sessions with activity features and a user label of a claimed user of the user session. Probabilities that a user session belongs to a user are predicted. A probability is predicted for each combination of a user and a user session of the audit log based on the activity features of the user sessions. A user group including users with similar activity features is constructed based on the predicted probabilities. An anomaly score for a user session of the audit log and a claimed user of the user session belonging to the user group is determined based on a probability that the user session belongs to the user group. An intrusion is detected if the anomaly score of the user session and the claimed user exceeds a predetermined threshold.
Systems and methods for artificial model building techniques
Embodiments disclosed describe a security awareness system may adaptively learn the best design of a simulated phishing campaign to get a user to perform the requested actions, such as clicking a hyperlink or opening a file. In some implementations, the system may adapt an ongoing campaign based on user's responses to messages in the campaign, along with the system's learned awareness. The learning process implemented by the security awareness system can be trained by observing the behavior of other users in the same company, other users in the same industry, other users that share similar attributes, all other users of the system, or users that have user attributes that match criteria set by the system, or that match attributes of a subset of other users in the system.