Application mapping and alerting based on data dependencies

    公开(公告)号:US11704618B2

    公开(公告)日:2023-07-18

    申请号:US17465944

    申请日:2021-09-03

    摘要: Aspects of the disclosure relate to application mapping and alerting based on data dependencies in business and technology logic. In some embodiments, a computing platform may receive a request to map enterprise technology resources. Then, the computing platform may generate a business capability model. Next, the computing platform may cause a user computing device to display a graphical user interface comprising selectable graphical representations of applications associated with the enterprise technology resources. Then, the computing platform may receive a user input identifying an occurrence of a technology incident by selecting one of the graphical representations. In response to the selection, the computing platform may trace, using the generated business capability model, upstream or downstream impacts of the technology incident. Then, the computing platform may cause a visual representation of data dependencies indicating upstream or downstream impacts of the technology incident to be displayed on the user computing device.

    AUTOMATED MONITORING OF PROXIMATE DEVICES

    公开(公告)号:US20230125565A1

    公开(公告)日:2023-04-27

    申请号:US18087872

    申请日:2022-12-23

    摘要: Aspects of the disclosure relate to an automated monitoring of proximate devices. A computing platform may cause a reporting device to detect a target device in a local network, retrieve network data associated with the target device, and send, to an intermediate server, the network data. The computing platform may send, to the intermediate server, a query. The intermediate server may send the network data in response to the query. Based on the network data, the computing platform may determine an amount of time that has elapsed since network activity was previously detected for the target device, and based on a determination that the amount of time exceeds a predetermined time threshold, the computing platform may generate an alert notification indicating that the target device may need to be traced. Subsequently, the alert notification may be sent to the reporting device.

    Dynamic Enhanced Security Based on Biometric Authentication

    公开(公告)号:US20220114244A1

    公开(公告)日:2022-04-14

    申请号:US17070141

    申请日:2020-10-14

    IPC分类号: G06F21/32 G06K9/00 G06F3/041

    摘要: Systems for enhanced security using biometric controls are provided. A user may launch an application on a user device and one or more rules or instructions may be executed activating enhanced security functions for the application. As the user interacts with a touch screen display of the device, user input including biometric data may be captured. The biometric data may be compared to pre-stored biometric data of the user. If the biometric data matches the pre-stored data, the system may capture additional user input and biometric data and analyze that data to verify the user. If the biometric data does not match the pre-stored data, functionality and/or accessibility of the application may be modified. The system may continue to capture user input and/or biometric data and if the registered user's data is again recognized, the functionality and/or accessibility may again be modified to provide access to the registered user.

    Dynamic enhanced security based on biometric authentication

    公开(公告)号:US11334654B2

    公开(公告)日:2022-05-17

    申请号:US17070141

    申请日:2020-10-14

    摘要: Systems for enhanced security using biometric controls are provided. A user may launch an application on a user device and one or more rules or instructions may be executed activating enhanced security functions for the application. As the user interacts with a touch screen display of the device, user input including biometric data may be captured. The biometric data may be compared to pre-stored biometric data of the user. If the biometric data matches the pre-stored data, the system may capture additional user input and biometric data and analyze that data to verify the user. If the biometric data does not match the pre-stored data, functionality and/or accessibility of the application may be modified. The system may continue to capture user input and/or biometric data and if the registered user's data is again recognized, the functionality and/or accessibility may again be modified to provide access to the registered user.

    Software development documentation using machine learning

    公开(公告)号:US11314503B2

    公开(公告)日:2022-04-26

    申请号:US16895047

    申请日:2020-06-08

    摘要: A device configured to receive source code for an application and analyze the source code to generate metadata for the source code. The metadata identifies operations performed within the source code. The device is further configured to generate a source code model for the source code based on the metadata for the source code and source code modeling instructions. The source code modeling instructions are configured to map the metadata associated with the source code to fields of the source code model. The device is further configured to convert the source code model into a graphical representation using visualization instructions. The visualization instructions include instructions for converting the source code model into the graphical representation. The device is further configured to output the graphical representation.

    Dynamic Enhanced Security Based on Eye Movement Tracking

    公开(公告)号:US20220107685A1

    公开(公告)日:2022-04-07

    申请号:US17062993

    申请日:2020-10-05

    摘要: Systems for enhanced protection or security using eye movement tracking are provided. In some examples, a user may launch an application on a user device. If enhanced protections apply to the application, an image of a user eye may be captured and compared to pre-stored data to ensure the user is a registered user. Additional eye movement data may be captured and analyzed. Analyzing the eye movement data may include detecting a look-away by a user. If a look-away is detected, the application may be closed, data within the application may be obscured, or the like. Eye movement data may also be analyzed to identify portions of an application the user viewed for more than a threshold time period, less than a threshold time period, and the like. This data may be analyzed (e.g., using machine learning) to generate one or more heat maps.

    Dynamic enhanced security based on eye movement tracking

    公开(公告)号:US11294459B1

    公开(公告)日:2022-04-05

    申请号:US17062993

    申请日:2020-10-05

    摘要: Systems for enhanced protection or security using eye movement tracking are provided. In some examples, a user may launch an application on a user device. If enhanced protections apply to the application, an image of a user eye may be captured and compared to pre-stored data to ensure the user is a registered user. Additional eye movement data may be captured and analyzed. Analyzing the eye movement data may include detecting a look-away by a user. If a look-away is detected, the application may be closed, data within the application may be obscured, or the like. Eye movement data may also be analyzed to identify portions of an application the user viewed for more than a threshold time period, less than a threshold time period, and the like. This data may be analyzed (e.g., using machine learning) to generate one or more heat maps.

    ENHANCED NETWORK SECURITY BASED ON INTER-APPLICATION DATA FLOW DIAGRAMS

    公开(公告)号:US20220086183A1

    公开(公告)日:2022-03-17

    申请号:US17021262

    申请日:2020-09-15

    摘要: Aspects of the disclosure relate to enhanced network security based on inter-application data flows. A computing platform may monitor, via application programming interfaces, data transmissions between applications. Subsequently, the computing platform may retrieve one or more of a time of the data transmission, a source of the data transmission, and a destination of the data transmission. Then, the computing platform may generate a structured database where a pair of components of the database are dynamically linked to one another when the pair of components corresponds to a source and a destination for a data transmission. Subsequently, the computing platform may train a machine learning model to detect structural patterns within the structured database. Then, the computing platform may generate clusters indicative of similar application profiles. Then, the computing platform may predict an impact of a change in an application profile of an application of the plurality of applications.