Patent classifications
G06F2221/2123
Creating malware prevention rules using malware detection and prevention system
Aspects of the present disclosure involve systems and methods computing devices to access a public network posing as a user to the network to detect one or more malware programs available for downloading through the network. More particularly, a malware detection control system utilizes a browser executed on a computing device to access a public network, such as the Internet. Through the browser, sites or nodes of the public network are accessed by the control system with the interactions with the sites of the public network designed to mimic or approximate a human user of the browser. More particularly, the control system may apply the one or more personality profiles to the browser of the computing device to access and interact with the nodes of the public network. Further, the control system may monitor the information retrieved from the network sites to detect the presence of malware within the nodes.
Secure identity binding
A first request is received for generation of a temporary alternate identifier for a user, wherein the user is identified within a service using a user service identifier, and wherein the temporary alternate identifier assists in binding the user service identifier with a resource identifier that identifies the user within a resource. The temporary alternate identifier is then generated and associated with the user service identifier. The temporary alternate identifier is then provided the user, and the temporary alternate identifier is also provided by the user to the resource. A second request is received, from the resource, for validation of the temporary alternate identifier. The user resource identifier is also received from the resource, for example as part of the second request. The user service identifier is then bound with the user resource identifier. Additionally, an indication is provided, to the resource, that the temporary alternate identifier is valid.
Information display considering privacy on public display
According to one embodiment, a method, computer system, and computer program product for displaying information on a public device is provided. The present invention may include displaying, based on information received from a connected mobile device, user information and dummy information on a display device. The present invention may further include displaying an indicator alongside the user information and a dummy indicator alongside the dummy information. The present invention may further include transmitting user information and dummy information to a display device, synchronizing display of the user information to the display device, and synchronizing haptic feedback based on a received visual pattern. The present invention may further include generating dummy information according to the type of information.
Pattern matching for authentication with random noise symbols and pattern recognition
Disclosed in some examples are methods, systems and machine-readable mediums which allow for more secure authentication attempts by implementing authentication systems with credentials that include interspersed noise symbols in positions determined by the user. These systems secure against eavesdroppers such as shoulder-surfers or man-in-the middle attacks as it is difficult for an eavesdropper to separate the noise symbols from legitimate credential symbols.
CREATING MALWARE PREVENTION RULES USING MALWARE DETECTION AND PREVENTION SYSTEM
Aspects of the present disclosure involve systems and methods computing devices to access a public network posing as a user to the network to detect one or more malware programs available for downloading through the network. More particularly, a malware detection control system utilizes a browser executed on a computing device to access a public network, such as the Internet. Through the browser, sites or nodes of the public network are accessed by the control system with the interactions with the sites of the public network designed to mimic or approximate a human user of the browser. More particularly, the control system may apply the one or more personality profiles to the browser of the computing device to access and interact with the nodes of the public network. Further, the control system may monitor the information retrieved from the network sites to detect the presence of malware within the nodes.
PROTECTION OF A CRYPTOGRAPHIC OPERATION
The present disclosure relates to a cryptographic method comprising: multiplying a point belonging to a mathematical set with a group structure by a scalar by performing: the division of a scalar into a plurality of groups formed of a same number w of digits, w being greater than or equal to 2; and the execution, by a cryptographic circuit and for each group of digits, of a sequence of operations on point, the sequence of operations being identical for each group of digits, at least one of the operations executed for each of the groups of digits being a dummy operation.
System and method for recommending alternative service providers
An automated system tracks digital service providers (DSP) data management agreements, DSP behavior, and user behavior, individually and in aggregate, to determine recommended alternatives for content/service sites/providers than those used by a user. The alternatives are selected based on their scoring and congruency or compliance with a user's target privacy data treatment parameters.
Early runtime detection and prevention of ransomware
Various automated techniques are described herein for the runtime detection/neutralization of malware executing on a computing device. The foregoing is achievable during a relatively early phase, for example, before the malware manages to encrypt any of the user's files. For instance, a malicious process detector may create decoy file(s) in a directory. The decoy file(s) may have attributes that cause such file(s) to reside at the beginning and/or end of a file list. By doing so, a malicious process targeting files in the directory will attempt to encrypt the decoy file(s) before any other file. The detector monitors operations to the decoy file(s) to determine whether a malicious process is active on the user's computing device. In response to determining that a malicious process is active, the malicious process detector takes protective measure(s) to neutralize the malicious process.
Lightweight replicas for securing cloud-based services
Methods, computer program products, computer systems, and the like, which provide security in cloud-based services using lightweight replicas, are disclosed. The methods, computer program products, computer systems, and the like include detecting an intrusion into an application server, dynamically provisioning a replica application server in a server system in response to the detecting the intrusion, and transitioning a datastream from the application server to the replica application server, where the application server is provisioned in the server system, the intrusion is an attack on the application server, and the attack is conducted via a datastream between a first computing system and the application server. The replica application server is a replica of at least a portion of the application server.
Protection Method and Device for Application Data
A protection method and device for application data are provided. The method includes: acquiring a data request sent by a monitored application, wherein the data request is used for requesting data in a first data source in which data needing protection is stored (S302); and redirecting the data request from the first data source to a second data source, wherein the second data source is used to store false data of the data needing protection (S304).