Patent classifications
H04L9/40
SYSTEMS AND METHODS FOR IDENTIFYING ACCESS ANOMALIES USING NETWORK GRAPHS
In some instances, the disclosure provides a method for identifying access anomalies using network graphs. The method comprises obtaining access data for an entity, generating a network graph baseline profile based on the plurality of data elements, generating a network graph current profile based on the plurality of data elements, generating comparison data based on comparing the plurality of baseline network graphs with the one or more current network graphs and comparing the plurality of baseline nodes and the plurality of baseline edges with the plurality of current nodes and the plurality of current edges, determining, based on the comparison data, anomaly data comprising one or more flagged network accesses to the enterprise system, and providing the anomaly data indicating the flagged network accesses to an authentication system.
SYSTEM AND METHOD FOR WIRELESS COMMUNICATION OF ANALYTE DATA
Systems, methods, apparatuses, and devices, for the wireless communication of analyte data are provided. In some embodiments, a method and calibration station for calibrating a continuous analyte sensor system is provided. Methods and testing systems for testing a continuous analyte sensor system is provided. Continuous analyte sensor systems, display devices and peripheral devices configured for wireless communication of analyte, connection, alarm and/or alert data and associated methods are provided.
PRIVILEGED ELECTRONIC COMMUNICATIONS WITH INMATES
Systems and methods for providing secure communication between an inmate and an outside user are disclosed. In various aspects, account information of both the user and the inmate is stored. A message transmission is received from a first device that includes a header portion and an encrypted payload portion. The system verifies that confidential communication between the inmate and the outside user is permitted based on the header portion and the stored account information. Once verified, the message is transmitted to a second device without decrypting the payload portion of the message.
TECHNIQUES TO PROVIDE SENSITIVE INFORMATION OVER A VOICE CONNECTION
Embodiments may generally be directed components and techniques to detect a request to provide banking account information over a one or more voice connections, identify the requested banking account information, and generate speech data representing the banking account information requested. In embodiments further include communicating the speech data to another device.
SYSTEM AND METHOD FOR SIEM RULE SORTING AND CONDITIONAL EXECUTION
A method for processing security events by applying a rule-based alarm scheme may be provided. The method includes generating a rule index of rules and an indicator of compromise index for each of the rules. The method includes also processing the incoming security event by applying the rules, increasing a current rule counter relating to a triggered rule, and increasing a current indicator of compromise counter pertaining to the triggered rule. Furthermore, the method includes generating a pseudo security event from received data about known attacks and related indicators of compromise, processing the pseudo security events by sequentially applying the rules, increasing a current rule counter of pseudo security events, and increasing a current indicator of compromise counter for pseudo security events, and sorting the rules and sorting within each rule the indicator of compromise values in the indicator of compromise index.
CONTINUOUS AUTHENTICATION FOR DIGITAL SERVICES BASED ON CONTACTLESS CARD POSITIONING
Various embodiments are generally directed to continuous authentication of a user to a digital service based on activity of a contactless card positioned proximate to a computing device on which the digital service operates. For example, a series of periodic status messages may be provided between a client device and the contactless card to verify whether the contactless card remains active, wherein authorization to access the digital service continues while the contactless card is active, and terminates when the contactless card is inactive.
SYSTEMS AND METHODS FOR INTELLIGENT STEP-UP FOR ACCESS CONTROL SYSTEMS
Some embodiments may provide systems, methods and computer program code to method to facilitate an interaction involving a user which include determining that a user authentication is required to complete the interaction, identifying at least a first verified device associated with the user, and transmitting an authentication message to the at least first verified device.
MAP-BASED GRAPHICAL USER INTERFACE FOR MULTI-TYPE SOCIAL MEDIA GALLERIES
A social media platform provides a map-based graphical user interface (GUI) with multiple geographically anchored icons that are selectable to trigger playback of respective galleries of ephemeral messages. Each of the plurality of location-based ephemeral galleries comprises media content contributed by multiple different users. The ephemeral galleries are compiled based on geotag data associated with respective ephemeral messages submitted by multiple users to be publicly viewable via the map-based GUI. Two or more different types of galleries are represented in the map-based GUI by different, visually distinct types of gallery icon.
CUSTOMIZED SMART DEVICES AND TOUCHSCREEN DEVICES AND CLEANSPACE MANUFACTURING METHODS TO MAKE THEM
The present invention provides various aspects for processing multiple types of substrates within cleanspace fabricators or for processing multiple or single types of substrates in multiple types of cleanspace environments particularly to form hardware based encryption devices and hardware based encryption equipped communication devices and multi-chip modules such as chiplets. In some embodiments, a collocated composite cleanspace fabricator may be capable of processing semiconductor devices into integrated circuits and then performing assembly operations to result in product in packaged form. Customized smart devices, smart phones and touchscreen devices may be fabricated in examples of a cleanspace fabricator. The assembly processing may include steps to form hardware based encryption.
CONTAINER WITH ENCRYPTED SOFTWARE PACKAGES
The invention relates to a method for operating a container (100) providing a service to a user in a cloud environment, wherein the container is generated from a container image (51) which comprises an encrypted software package, the container image further comprising a decryption entity, wherein the method comprises the steps of receiving a message to set up the container (100) out of the container image (51), the message comprising an access identifier allowing access to a restricted area (60) to which the access is not provided without the access identifier, the restricted area comprising a plurality of decryption keys, and accessing the restricted area (60) using the access identifier received with the message, and retrieving a decryption key from the restricted area (60) based on the access identifier, and decrypting the encrypted software package with the retrieved decryption key in order to generate a decrypted software package, providing the service to the user based on the decrypted software package.