System and method for providing data security using software library containers

    公开(公告)号:US12093377B2

    公开(公告)日:2024-09-17

    申请号:US17730744

    申请日:2022-04-27

    IPC分类号: G06F21/55 G06F21/57

    摘要: Various systems, methods, and computer program products for providing data security using software library containers are provided. The method includes identifying a software library used by a first application with a potential vulnerability. The method also includes determining a software library permission for the software library used by the first application based on the potential vulnerability. The software library permission for the software library defines a level of functionality of at least a portion of the software library. The method further includes identifying one or more additional applications that use the software library. The method still further includes causing the software library permission to be applied to the software library installed on the first application and at least one of the one or more additional applications.

    SYSTEM AND METHOD FOR PROVIDING DATA SECURITY USING SOFTWARE LIBRARY CONTAINERS

    公开(公告)号:US20230351012A1

    公开(公告)日:2023-11-02

    申请号:US17730744

    申请日:2022-04-27

    IPC分类号: G06F21/55 G06F21/57

    摘要: Various systems, methods, and computer program products for providing data security using software library containers are provided. The method includes identifying a software library used by a first application with a potential vulnerability. The method also includes determining a software library permission for the software library used by the first application based on the potential vulnerability. The software library permission for the software library defines a level of functionality of at least a portion of the software library. The method further includes identifying one or more additional applications that use the software library. The method still further includes causing the software library permission to be applied to the software library installed on the first application and at least one of the one or more additional applications.

    System for deployable software vulnerability testing platform

    公开(公告)号:US12086269B2

    公开(公告)日:2024-09-10

    申请号:US17699443

    申请日:2022-03-21

    IPC分类号: G06F21/57 G06F8/60 G06F8/65

    摘要: Systems, computer program products, and methods are described herein for deployable software vulnerability testing platform. The present invention is configured to receive, from a user input device, an initial request from a user to generate a deployable software vulnerability testing (SVT) engine; prompt an SVT dashboard for display on the user input device to receive one or more input parameters associated with the first vulnerability in response to receiving the initial request; receive, via the SVT dashboard, the one or more input parameters; generate the SVT engine based on at least the one or more input parameters; receive, from the user input device, one or more deployment parameters associated with a deployment of the SVT engine; and deploy the SVT engine within the distributed technology infrastructure to identify the one or more instances of the first vulnerability based on at least the one or more deployment parameters.

    SYSTEM FOR DEPLOYABLE SOFTWARE VULNERABILITY TESTING PLATFORM

    公开(公告)号:US20230297689A1

    公开(公告)日:2023-09-21

    申请号:US17699443

    申请日:2022-03-21

    IPC分类号: G06F21/57 G06F8/60

    摘要: Systems, computer program products, and methods are described herein for deployable software vulnerability testing platform. The present invention is configured to receive, from a user input device, an initial request from a user to generate a deployable software vulnerability testing (SVT) engine; prompt an SVT dashboard for display on the user input device to receive one or more input parameters associated with the first vulnerability in response to receiving the initial request; receive, via the SVT dashboard, the one or more input parameters; generate the SVT engine based on at least the one or more input parameters; receive, from the user input device, one or more deployment parameters associated with a deployment of the SVT engine; and deploy the SVT engine within the distributed technology infrastructure to identify the one or more instances of the first vulnerability based on at least the one or more deployment parameters.

    Detecting Cloned Payment Cards
    9.
    发明公开

    公开(公告)号:US20230177511A1

    公开(公告)日:2023-06-08

    申请号:US17543114

    申请日:2021-12-06

    摘要: Aspects of the disclosure relate to a payment device to detect real-time suspicious payment cards. Prior to a transaction, a payment device detects suspicious payment cards based on captured images of the payment card. An alert may be generated upon detection of any suspicious or fraudulent payment card. In some arrangements, the payment device may utilize machine learning models or machine learning capabilities to detect suspicious payment cards. A characterization score may be generated and used to determine if a payment card is suspicious. The characterization scores may be updated based on different card issuer criteria and transaction use of each payment card.

    SYSTEM FOR DEPLOYABLE SOFTWARE VULNERABILITY TESTING PLATFORM

    公开(公告)号:US20240362341A1

    公开(公告)日:2024-10-31

    申请号:US18756947

    申请日:2024-06-27

    IPC分类号: G06F21/57 G06F8/60 G06F8/65

    摘要: Systems, computer program products, and methods are described herein for deployable software vulnerability testing platform. The present invention is configured to receive, from a user input device, an initial request from a user to generate a deployable software vulnerability testing (SVT) engine; prompt an SVT dashboard for display on the user input device to receive one or more input parameters associated with the first vulnerability in response to receiving the initial request; receive, via the SVT dashboard, the one or more input parameters; generate the SVT engine based on at least the one or more input parameters; receive, from the user input device, one or more deployment parameters associated with a deployment of the SVT engine; and deploy the SVT engine within the distributed technology infrastructure to identify the one or more instances of the first vulnerability based on at least the one or more deployment parameters.