Patent classifications
H04L2463/121
Using a measure of influence of sender in determining a security risk associated with an electronic message
A measure of influence of a sender entity is determined for a message receiving entity based at least in part on an analysis of previous electronic messages sent by the sender entity. An electronic message associated with the sender entity is received. The measure of influence of the sender entity is utilized to determine a security risk associated with the received electronic message.
Pay with points virtual card
Systems and methods for providing a rewards payment form linked directly to a rewards account are described. The rewards points may be spent directly by the customer through the use of the payment form linked to the rewards account. The payment form may be a payment card (e.g., a physical card having an account number accessible via a magstripe, an EMV chip, etc.) or a virtual payment card loaded into a mobile wallet accessible by the customer. The rewards payment form allows the customer to spend the rewards points stored in the rewards account without first going through the extra step of converting the rewards points into currency.
METHOD AND DEVICE FOR AUTOMOTIVE BLOCKCHAINS
A method of processing a data packet in a vehicle having a plurality of nodes interconnected in a network by generating a chain of hash value blocks. The method comprising, for each of the nodes: receiving a data packet and a first hash value block associated with the data packet from a previous node; processing the data packet by providing a time stamp information to the data packet; generating a second hash value block based on the data packet, the first hash value block, and the time stamp information; and transmitting the processed data packet and the second hash value block to a subsequent node. The method further comprises the step of determining the latency time on the second hash value block.
SYSTEMS AND METHODS FOR PROTECTING BLUETOOTH LOW ENERGY DEVICES FROM ADDRESS TRACKING
Bluetooth Address Tracking (BAT) is an allowlist-based side channel attack to track Bluetooth devices, by either passively sniffing the Bluetooth packets, or actively replaying the sniffed ones. Securing addresses of Bluetooth Low Energy (BLE) is described, which uses an interval unpredictable, central and peripheral synchronized random media access control (MAC) address generation scheme to defend against passive BAT attacks, and uses a current timestamp to derive random MAC addresses to defeat active BAT attacks, such that attackers can no longer be able to replay them.
SYSTEMS, METHODS, AND DEVICES FOR IMPLEMENTING SECURITY OPERATIONS IN A SECURITY PLATFORM
Systems, methods, and devices implement security operations in security platforms implemented across web servers and application servers. Systems include a first server including one or more processors configured to identify one or more patterns of malicious activity based, at least in part, on event information associated with a request and at least one of a plurality of custom parameters, and a second server including one or more processors configured to host an application accessed by the client device, wherein the first server is coupled between the client device and the second server and is configured to handle requests between the client device and the second server. Systems also include a database system configured to store application data associated with the application and the client device.
UWB SYSTEM
Disclosed is an ultra-wideband (UWB) system and, more particularly, a UWB system using UWB ranging factor definition. The UWB system using the UWB ranging factor definition includes a memory in which a UWB ranging factor definition program is embedded and a processor which executes the program, wherein the program predefines UWB ranging factors to define a scrambled timestamp sequence (STS) index, an encryption key, and a nonce.
Systems and methods for location-based authentication
Systems and methods are disclosed for performing location-based authentication using location-aware devices. One method includes: receiving an access request comprising authentication credentials and a first location from a first location-aware device; receiving a second location from a second location-aware device associated with the authentication credentials; and upon determining that the first location and second location are within a pre-determined distance, authenticating the authentication credentials.
Audit log enrichment
A system for monitoring actual access to data elements in an enterprise computer network and providing associated data, the system including an at least near real time data element audit subsystem providing audit output data including at least one of a time stamp, identification of an accessor, user depository stored data regarding the accessor, accessed data element data, affected data element data, type of access operation, source IP address of access and access outcome data, in at least near real time, relating to actual access to data elements in the enterprise computer network, and an additional data providing subsystem receiving in at least near real time at least a part of the audit output data and utilizing the at least part of the audit output data for providing additional data which is not part of the audit output data.
Secure time service
Methods and apparatus for a secure time service are disclosed. A time server including a time source, a cryptographic key and a cryptographic engine is instantiated within a provider network. A time service endpoint receives a timestamp request from a client. The endpoint transmits a representation of the request to the time server, and receives, from the time server, an encryption of at least a timestamp generated using the time source. A response comprising the encryption of at least the timestamp is transmitted to the requesting client.
Real-time detection of network attacks
An apparatus includes multiple ports, packet communication processing circuitry coupled to the ports, and a processor that is configured to receive, from the packet communication processing circuitry, metadata that is indicative of a temporal pattern of control messages communicated via one or more of the ports, and to identify a network attack by applying anomaly detection to the temporal pattern of the control messages.