-
公开(公告)号:US11704618B2
公开(公告)日:2023-07-18
申请号:US17465944
申请日:2021-09-03
IPC分类号: G06Q10/067 , H04L47/78 , H04L65/80 , H04L47/762 , H04L47/70 , H04L65/65
CPC分类号: G06Q10/067 , H04L47/762 , H04L47/781 , H04L47/822 , H04L65/65 , H04L65/80
摘要: Aspects of the disclosure relate to application mapping and alerting based on data dependencies in business and technology logic. In some embodiments, a computing platform may receive a request to map enterprise technology resources. Then, the computing platform may generate a business capability model. Next, the computing platform may cause a user computing device to display a graphical user interface comprising selectable graphical representations of applications associated with the enterprise technology resources. Then, the computing platform may receive a user input identifying an occurrence of a technology incident by selecting one of the graphical representations. In response to the selection, the computing platform may trace, using the generated business capability model, upstream or downstream impacts of the technology incident. Then, the computing platform may cause a visual representation of data dependencies indicating upstream or downstream impacts of the technology incident to be displayed on the user computing device.
-
公开(公告)号:US20230125565A1
公开(公告)日:2023-04-27
申请号:US18087872
申请日:2022-12-23
发明人: Adam B. Richman , Brady P. Merkel , Annika Decker , Mary K. Barrett , Elizabeth Swanzy-Parker , Mathew A. Woodyard
IPC分类号: H04L9/40 , G06N20/00 , H04L43/065 , H04L9/06
摘要: Aspects of the disclosure relate to an automated monitoring of proximate devices. A computing platform may cause a reporting device to detect a target device in a local network, retrieve network data associated with the target device, and send, to an intermediate server, the network data. The computing platform may send, to the intermediate server, a query. The intermediate server may send the network data in response to the query. Based on the network data, the computing platform may determine an amount of time that has elapsed since network activity was previously detected for the target device, and based on a determination that the amount of time exceeds a predetermined time threshold, the computing platform may generate an alert notification indicating that the target device may need to be traced. Subsequently, the alert notification may be sent to the reporting device.
-
公开(公告)号:US11588848B2
公开(公告)日:2023-02-21
申请号:US17141307
申请日:2021-01-05
发明人: Adam B. Richman , William Thomas Stranathan , Anusha Ravulapati , Kenneth Aaron Kaye , Nikhil Harish Sanil , Alice Yali Chang , Brady Prentice Merkel
摘要: A system for suspending a computing device suspected of being infected by a malicious code is configured to receive a signal to initiate a suspension procedure of the computing device. The system captures states of instructions that are being executed by a processor of the computing device, where the instructions comprise the malicious code. The system prioritizes the operation of a kill switch button over the instructions being executed by the processor. The system sends notification signals to servers managing a user account associated with a user currently logged in at the computing device, indicating that the computing device is suspected of having been infected by the malicious code. In response to sending the notification signals to the servers, the user account is suspended. The system terminates network connections of the computing device such that the computing device is disconnected from other devices.
-
公开(公告)号:US20220114244A1
公开(公告)日:2022-04-14
申请号:US17070141
申请日:2020-10-14
发明人: Adam B. Richman , David Mortman
摘要: Systems for enhanced security using biometric controls are provided. A user may launch an application on a user device and one or more rules or instructions may be executed activating enhanced security functions for the application. As the user interacts with a touch screen display of the device, user input including biometric data may be captured. The biometric data may be compared to pre-stored biometric data of the user. If the biometric data matches the pre-stored data, the system may capture additional user input and biometric data and analyze that data to verify the user. If the biometric data does not match the pre-stored data, functionality and/or accessibility of the application may be modified. The system may continue to capture user input and/or biometric data and if the registered user's data is again recognized, the functionality and/or accessibility may again be modified to provide access to the registered user.
-
公开(公告)号:US11895147B2
公开(公告)日:2024-02-06
申请号:US18059882
申请日:2022-11-29
发明人: Adam B. Richman , William Thomas Stranathan , Anusha Ravulapati , Kenneth Aaron Kaye , Nikhil Harish Sanil , Alice Yali Chang , Brady Prentice Merkel
CPC分类号: H04L63/145 , G06F21/52 , G06F21/56 , G06F2221/033 , G06F2221/2143
摘要: A system for suspending a computing device suspected of being infected by a malicious code is configured to receive a signal to initiate a suspension procedure of the computing device. The system captures states of instructions that are being executed by a processor of the computing device, where the instructions comprise the malicious code. The system prioritizes the operation of a kill switch button over the instructions being executed by the processor. The system sends notification signals to servers managing a user account associated with a user currently logged in at the computing device, indicating that the computing device is suspected of having been infected by the malicious code. In response to sending the notification signals to the servers, the user account is suspended. The system terminates network connections of the computing device such that the computing device is disconnected from other devices.
-
公开(公告)号:US11334654B2
公开(公告)日:2022-05-17
申请号:US17070141
申请日:2020-10-14
发明人: Adam B. Richman , David Mortman
摘要: Systems for enhanced security using biometric controls are provided. A user may launch an application on a user device and one or more rules or instructions may be executed activating enhanced security functions for the application. As the user interacts with a touch screen display of the device, user input including biometric data may be captured. The biometric data may be compared to pre-stored biometric data of the user. If the biometric data matches the pre-stored data, the system may capture additional user input and biometric data and analyze that data to verify the user. If the biometric data does not match the pre-stored data, functionality and/or accessibility of the application may be modified. The system may continue to capture user input and/or biometric data and if the registered user's data is again recognized, the functionality and/or accessibility may again be modified to provide access to the registered user.
-
公开(公告)号:US11314503B2
公开(公告)日:2022-04-26
申请号:US16895047
申请日:2020-06-08
摘要: A device configured to receive source code for an application and analyze the source code to generate metadata for the source code. The metadata identifies operations performed within the source code. The device is further configured to generate a source code model for the source code based on the metadata for the source code and source code modeling instructions. The source code modeling instructions are configured to map the metadata associated with the source code to fields of the source code model. The device is further configured to convert the source code model into a graphical representation using visualization instructions. The visualization instructions include instructions for converting the source code model into the graphical representation. The device is further configured to output the graphical representation.
-
公开(公告)号:US20220107685A1
公开(公告)日:2022-04-07
申请号:US17062993
申请日:2020-10-05
摘要: Systems for enhanced protection or security using eye movement tracking are provided. In some examples, a user may launch an application on a user device. If enhanced protections apply to the application, an image of a user eye may be captured and compared to pre-stored data to ensure the user is a registered user. Additional eye movement data may be captured and analyzed. Analyzing the eye movement data may include detecting a look-away by a user. If a look-away is detected, the application may be closed, data within the application may be obscured, or the like. Eye movement data may also be analyzed to identify portions of an application the user viewed for more than a threshold time period, less than a threshold time period, and the like. This data may be analyzed (e.g., using machine learning) to generate one or more heat maps.
-
公开(公告)号:US11294459B1
公开(公告)日:2022-04-05
申请号:US17062993
申请日:2020-10-05
摘要: Systems for enhanced protection or security using eye movement tracking are provided. In some examples, a user may launch an application on a user device. If enhanced protections apply to the application, an image of a user eye may be captured and compared to pre-stored data to ensure the user is a registered user. Additional eye movement data may be captured and analyzed. Analyzing the eye movement data may include detecting a look-away by a user. If a look-away is detected, the application may be closed, data within the application may be obscured, or the like. Eye movement data may also be analyzed to identify portions of an application the user viewed for more than a threshold time period, less than a threshold time period, and the like. This data may be analyzed (e.g., using machine learning) to generate one or more heat maps.
-
公开(公告)号:US20220086183A1
公开(公告)日:2022-03-17
申请号:US17021262
申请日:2020-09-15
发明人: Jack Bishop, III , Adam B. Richman , David Mortman
摘要: Aspects of the disclosure relate to enhanced network security based on inter-application data flows. A computing platform may monitor, via application programming interfaces, data transmissions between applications. Subsequently, the computing platform may retrieve one or more of a time of the data transmission, a source of the data transmission, and a destination of the data transmission. Then, the computing platform may generate a structured database where a pair of components of the database are dynamically linked to one another when the pair of components corresponds to a source and a destination for a data transmission. Subsequently, the computing platform may train a machine learning model to detect structural patterns within the structured database. Then, the computing platform may generate clusters indicative of similar application profiles. Then, the computing platform may predict an impact of a change in an application profile of an application of the plurality of applications.
-
-
-
-
-
-
-
-
-