H04L2463/121

Event specific entity relationship discovery in data intake stage of a distributed data processing system

A security platform employs a variety techniques and mechanisms to detect security related anomalies and threats in a computer network environment. The security platform is big data driven and employs machine learning to perform security analytics. The security platform performs user/entity behavioral analytics (UEBA) to detect the security related anomalies and threats, regardless of whether such anomalies/threats were previously known. The security platform can include both real-time and batch paths/modes for detecting anomalies and threats. By visually presenting analytical results scored with risk ratings and supporting evidence, the security platform enables network security administrators to respond to a detected anomaly or threat, and to take action promptly.

Data retrieval in security anomaly detection platform with shared model state between real-time and batch paths

A security platform employs a variety techniques and mechanisms to detect security related anomalies and threats in a computer network environment. The security platform is big data driven and employs machine learning to perform security analytics. The security platform performs user/entity behavioral analytics (UEBA) to detect the security related anomalies and threats, regardless of whether such anomalies/threats were previously known. The security platform can include both real-time and batch paths/modes for detecting anomalies and threats. By visually presenting analytical results scored with risk ratings and supporting evidence, the security platform enables network security administrators to respond to a detected anomaly or threat, and to take action promptly.

SYSTEM AND METHODS FOR TAMPER PROOF INTERACTION RECORDING AND TIMESTAMPING
20190278921 · 2019-09-12 ·

A system and method for securely recording voice communications, comprising an authentication server, further comprising at least a software components operating on a network-capable computing device, and a database, wherein an authentication server verifies the validity of voice communications and a database stores voice communication recordings.

ELECTRONIC DEVICE AND METHOD FOR MANAGING ELECTRONIC KEY THEREOF
20190279448 · 2019-09-12 ·

An electronic device and a method for managing an electronic key thereof are provided. The electronic device includes a wireless communication circuit, a hardware-based security element comprising circuitry configured to provide a timestamp, a processor operatively coupled with the communication circuit and the security element, and a memory operatively coupled with the processor. The memory stores instructions that when executed by the processor, control the electronic device to: launch an application related with an electronic key of a door lock, receive an input for using the electronic key to open the door lock through the application, determine the validity of credential information related with the input, based at least in part on the timestamp, and open the door lock based on the validity of the credential information.

COMPACT TIMESTAMP, ENCODERS AND DECODERS THAT IMPLEMENT THE SAME, AND RELATED DEVICES, SYSTEMS AND METHODS
20190281144 · 2019-09-12 ·

Compact timestamps and related methods, systems and devices are described. An encoder is configured to generate compact timestamps of the disclosure by sampling states of linear feedback shift registers (LFSRs). A decoder may be configured to determine timing information responsive to the compact timestamps.

System and method for tracking and archiving mobile communications

A system tracks and archives communications between a mobile device and a telephone (which could be another mobile device) or an enterprise application software module. A gateway receives communications from and sends communications to a mobile software application installed on a mobile device. Communications can include text, multimedia voice and/or video information. When the mobile software application or enterprise application software module directs a communication to the telephone, the gateway determines whether to send the communication to the telephone via a copy of the mobile software application on the telephone or via a PBX system or a virtual number. Furthermore, the gateway sends a copy of the communication to an archiving system. To process the communication for archiving, the gateway can reformat the communication, create metadata associated with it, associate tags with it, encrypt it, compress it and/or transmit it.

PASSPORT-CONTROLLED FIREWALL
20190273722 · 2019-09-05 ·

A method and system for dynamically modifying rules in a firewall infrastructure. A signed passport is encrypted based on a public key certificate registered with a trusted signer. The signed passport includes a hash value that includes a heart-beat time-out interval and a firewall rule. A trigger signal within the heart-beat time-out interval is generated. The signed passport and the trigger signal are transmitted within the heart-beat time-out interval to a border control agent of a firewall in the firewall infrastructure. In response to receiving, from the border control agent, a continuous confirmation of the firewall rule within a time interval shorter than the heart-beat time-out interval, the firewall is modified according to the firewall rule. In response to determining that the trigger signal was not received by the border control agent within the heart-beat time-out interval, the firewall rule is reset.

SECURE AUTHENTICATION OF USER AND MOBILE DEVICE
20190273615 · 2019-09-05 ·

An authentication method is disclosed. To authenticate a user, a mobile device may request identification and verification from the user. Upon receiving a positive identification and verification response from the user, the mobile device may generate a cryptogram using a user identification (ID) associated with the user, a timestamp, a device ID associated with the mobile device, a service provider application ID associated with the service provider application, and a service provider device ID. The mobile device may transmit the generated cryptogram, the user ID, the timestamp, the device ID, the service provider application ID, and the service provider device ID, to a service provider computer associated with the service provider application. The service provider computer may decrypt the cryptogram and compare the decrypted data elements to the received data elements to validate and authenticate the user.

Method for dynamic authentication of an object

There is provided a data processor implemented method for dynamic authentication of an object. There is also provided non-transitory computer readable storage mediums and systems for carrying out dynamic authentication of an object.

Passing content securely from web browsers to computer applications
10397191 · 2019-08-27 · ·

Systems and methods are disclosed for securely passing context information from a server to a client device. In particular, in one or more embodiments, the disclosed systems and methods embed an identifier in a digital file provided to a client device. In one or more embodiments, the disclosed systems and methods utilize the embedded identifier to securely pass context information between a client device and server, such that the client device can utilize the context information with regard to the digital file. In particular, one or more embodiments include systems and methods that securely pass login credentials from a remote server to a client device such that the client device can utilize a digital file to access one or more features of a native software application.