H04L2463/121

PROCESS FOR LEGAL CERTIFICATION OF SUCCESSFUL INTERACTION

A process certifies an interaction between a user and an Organization. A Company WEB server requests an acquisition system (WIAS) generate a new redirection URL address (F-URL), simultaneously with sending a pre-redirected HTML form, the (F-URL) pointing to a gateway for verifying in the request the presence of a TOKEN/COOKIE indicating instantiation of a dedicated acquisition memory-storage on the server. If the TOKEN/COOKIE is not present the dedicated acquisition memory-storage is instantiated in the server and the certified acquisition step is started. Upon completion of the step for certified acquisition of the interaction the request of the user is again directed to the original URL address (O-URL), with confirmation of the acceptance to the user, the application of a time mark and an identification symbol, obtaining a certification having legal proof value, sent to a device for storing legal proof certifications.

SECURE BIOMETRIC AUTHENTICATION WITH CLIENT-SIDE FEATURE EXTRACTION

Provided is a process that includes: receiving, with a first device, a request to authenticate a user; obtaining, with the first device, an unstructured-data authentication input; extracting, with the first computing device, a plurality of features of the unstructured-data authentication input to form a structured-data representation; determining, with the first device, a first instance of a value that deterministically varies; and determining, with the first device, a first encrypted value based on both the structured-data representation and the first instance of the value that deterministically varies; and sending, with the first device, the first encrypted value to a second computing device

USING A MEASURE OF INFLUENCE OF SENDER IN DETERMINING A SECURITY RISK ASSOCIATED WITH AN ELECTRONIC MESSAGE

A measure of influence of a sender entity is determined for a message receiving entity based at least in part on an analysis of previous electronic messages sent by the sender entity. An electronic message associated with the sender entity is received. The measure of influence of the sender entity is utilized to determine a security risk associated with the received electronic message.

EMAIL VERIFICATION METHOD
20190190721 · 2019-06-20 ·

The invention is a method of verifying one or more emails sent by a valid sender to an intended recipient. One or more encrypted hash codes are computed from the email content and a private encryption key. The one or more hash codes are stored in an encryption memory, along with the data used to generate the one or more hash codes. The one or more hash codes are sent with the email content to the intended recipient. A verification request email is then received, containing a forwarded copy of the sent email. One or more verification hash codes are recomputed using the forwarded copy, and compared with the one or more hash codes stored in the encryption memory. A verification signal disclosing the verification result is sent to the intended recipient, via a non-email route.

BLOCKCHAIN INTEGRATION FOR SCALABLE DISTRIBUTED COMPUTATIONS
20190188046 · 2019-06-20 ·

An apparatus is configured to initiate distributed computations across a plurality of data processing clusters associated with respective data zones, to utilize local processing results of at least a subset of the distributed computations from respective ones of the data processing clusters to generate global processing results, and to update at least one distributed ledger maintained by one or more of the plurality of data processing clusters to incorporate one or more blocks each characterizing at least a portion of the distributed computations. Each of at least a subset of the data processing clusters is configured to process data from a data source of the corresponding data zone using one or more local computations of that data processing cluster to generate at least a portion of the local processing results. At least one of the data processing clusters is configured to apply one or more global computations to one or more of the local processing results to generate at least a portion of the global processing results.

METHOD FOR THE AUTOMATED CREATION OF RULES FOR A RULE-BASED ANOMALY RECOGNITION IN A DATA STREAM
20190182280 · 2019-06-13 ·

A method for creating rules for recognizing anomalies in a data stream of data packets. The method includes: providing a reference time signal having successive reference points in time; for at least two data portions from one or multiple data packets determined by a selected data packet type in a data stream section, ascertaining a time series of successive values of the relevant data portion, the values of the time series corresponding to the values of the relevant data portion or being a function of these values, the values of the relevant data portion each being assigned to a respective reference point in time of the respective reference points in time; carrying out a correlation method in order to ascertain, in each case, one correlation value for at least two different time series; creating a rule for the rule-based anomaly recognition method as a function of the ascertained correlation values.

Methods and devices for detecting and correlating data packet flows in a lawful interception system

The following disclosure relates a method and mediation device (100) in a Lawful Interception (LI) system for detecting and correlating copies of SIP and RTP flows, from different domains EPS or IMS, said method comprising to determine a unique IMS Communication Identity Number, IMS CIN, and a corresponding correlation set of identifiers, storing each unique IMS CIN together with its correlation set for an intercepted communication session, correlating a SIP or RTP flow received from one domain to the same SIP or RTP flows of the same communication session received from the other domain by comparing the flow identity information of the received flow to the stored correlation sets for identifying a matching correlation set and its unique IMS CIN and sending to a LEA requesting for LI of the target said received SIP or RTP flow comprising said identified unique IMS CIN for a matching correlation set.

Securing access to vehicles

A method for securing an access method for vehicles includes a mobile device and a remote control device for administration of access rights. The mobile device is repeatedly connected to the remote control device and characteristic synchronizing data are generated for each connection. One part of the synchronization data is stored in the mobile device and in the remote control device. Characteristic prior synchronization data of a preceding connection is transmitted from the mobile device to the remote control device. A consistency check is performed in the remote control device between the prior synchronization data received from the mobile device and the prior synchronization data stored in the remote control device. If the data are consistent, the connection is terminated and a synchronization interval is waited before the connection is restored for the next synchronization. If the data are inconsistent, the mobile device is blocked from further access to vehicles.

System and method for detecting creation of malicious new user accounts by an attacker

A system is provided for detecting creation of malicious user accounts. The system includes a processor, a memory, and an application including instructions configured to: collect data corresponding to creation of new user accounts, where the new user accounts are associated with at least two distinct organizations, at least two distinct subscriptions, or at least two distinct customers, and where each of the new user accounts has a user name; determine properties based on the data and for a group of similar ones of the user names; evaluate the properties of the new user accounts corresponding to the group of similar ones of the user names and determine whether a probability for the new user accounts to be created having the group of similar ones of the user names is less than a predetermined threshold, and generate an alert based on a result of the evaluation of the properties.

METHOD AND SYSTEM FOR GENERATING AN ENTITIES VIEW WITH RISK-LEVEL SCORING FOR PERFORMING COMPUTER SECURITY MONITORING
20190173893 · 2019-06-06 ·

A security platform employs a variety techniques and mechanisms to detect security related anomalies and threats in a computer network environment. The security platform is big data driven and employs machine learning to perform security analytics. The security platform performs user/entity behavioral analytics (UEBA) to detect the security related anomalies and threats, regardless of whether such anomalies/threats were previously known. The security platform can include both real-time and batch paths/modes for detecting anomalies and threats. By visually presenting analytical results scored with risk ratings and supporting evidence, the security platform enables network security administrators to respond to a detected anomaly or threat, and to take action promptly.