ENHANCED KERNEL SECURITY IN CLOUD ENVIRONMENT

    公开(公告)号:US20230247002A1

    公开(公告)日:2023-08-03

    申请号:US17588455

    申请日:2022-01-31

    Inventor: Elvis Nyamwange

    CPC classification number: H04L63/0263 H04L63/205 H04L9/3247 G06F9/545

    Abstract: Apparatus and methods for enhanced kernel security in a cloud environment is provided. The apparatus may include a system architecture including a firewall intercepting all incoming data packets routed to the kernel. The firewall may accept or reject a packet based on a rules-based determination comprising extracting a packet header from the packet, identifying a rule stored in a rules database associated with the packet header, the rule defining an allowable executable command for being included in the packet. The system architecture may include a validator configured to extract a signature from the packet, the signature comprising cryptography hash values, and query a signature vault to identify a stored signature identical to the extracted signature. The system architecture may further include an approver for routing the packet to the kernel and the kernel for running one or more containers in the cloud environment.

    Abstraction Layer for Efficient Transliteration of Machine Interpretable Languages

    公开(公告)号:US20230130019A1

    公开(公告)日:2023-04-27

    申请号:US17557418

    申请日:2021-12-21

    Abstract: Aspects of the disclosure relate to transliteration of machine interpretable languages. A computing platform may receive a request to perform a data migration from a first database configured in a first format to a second database configured in a second format. The computing platform may receive, from the client application and at an abstraction layer, a query. Based on identifying that the query is formatted for execution at the second database, the computing platform may route the query to the second database for execution. Based on identifying that the query is not formatted for execution at the second database, the computing platform may: 1) translate the query from the first format to the second format by using pre-verified query keys to convert the query from the first format into the second format, and 2) route the translated query to the second database for execution.

    "> AUTOMATED TELLER MACHINE (

    公开(公告)号:US20220222677A1

    公开(公告)日:2022-07-14

    申请号:US17148651

    申请日:2021-01-14

    Inventor: Elvis Nyamwange

    Abstract: An ATM equipped with forensic card reader identification validation is provided. The ATM may include a real ID card slot. The real ID card slot may accept real ID cards. The ATM may include a call communications module. The call communications module may communicate with a third-party network. Upon insertion of a real ID card at the ATM, the ATM may retrieve security details from the real ID card. The ATM may transmit the security details to the third-party network via the call communications module. The third-party network may verify the security details with one or more databases which are accessible by the third-party network. Upon failure to verify the security details, the third-party network may transmit a failed verification response to the ATM.

    SYSTEM AND METHOD FOR DETERMINING DATA TRANSFER FREEZES

    公开(公告)号:US20250086634A1

    公开(公告)日:2025-03-13

    申请号:US18243430

    申请日:2023-09-07

    Abstract: Systems, computer program products, and methods for determining data transfer freezes are provided. The method includes receiving a freeze request from an end-point device associated with a user. The freeze request is associated with one or more connected data transfer entities and with a first account associated with the user. The freeze request is a request for a freeze of data transfers between the first account and any of the one or more connected data transfer entities. The method also includes cause a transmission of a decoy account information to a first connected data transfer entity. The decoy account information is different than an account information for the first account. The method further includes receiving a first data transfer request including the decoy account information. The method still further includes causing a rejection of the first data transfer request due to the decoy account information.

Patent Agency Ranking