Abstract:
A method for dynamically establishing a communication path for a requestor by assessing an authenticity of the requestor and a communication request is provided. The method may include, in response to receiving the communication request, dynamically determining whether to establish a communication path for the requestor to a destination though a communication network by assessing the requestor based on one or more authentication rules, wherein the one or more authentication rules are based on first information associated the communication network, second information about the requestor, and third information from the requestor. The method may further include, in response to determining that the requestor satisfies the one or more authentication rules, dynamically establishing the communication path for the requestor on the communication network according to one or more communication attributes associated with the requestor.
Abstract:
An embodiment of the invention provides a method for selectively using degree confidence for image validation to authorize transactions, wherein a request to authorize a transaction is received, the request including a user's name, a photo of the user, and a transaction value. A database is queried with the user's name to identify one or more reference photos of the user; and, the received photo of the user is compared to the reference photo of the user with an analysis engine to generate a confidence value. An authorization threshold is determined with a processor based on the transaction value. The transaction is authorized when the confidence value is equal to and/or greater than the authorization threshold.
Abstract:
In at least one embodiment, a method and a system include capability to fine-tune a data loss prevention system. An example system includes a computer readable storage medium for storing at least one alert database and at least one associated signature set to each alert database; an analytics module in communication to the computer readable storage medium, the analytics module analyzes at least one alert database present on the computer storage medium to determine whether any signatures from the signature set associated with the alert database being analyzed are ineffective based at least on a ratio of valid alerts to false positive alerts for individual signatures selected from a group including a plurality of signatures present in the signature set; and an adjustment module in communication to the computer readable storage medium and the analytics module, the adjustment module removes at least one ineffective signature from the signature set.
Abstract:
A system may include a memory and a processor in communication therewith configured to perform operations. The operations may include receiving an audio file and a text file related to the audio file, analyzing the audio file to produce an analysis, and determining a portion of the audio file is similar to a segment of the text file. The operations may include identifying a first terminal signal and corresponding the first terminal signal to a first terminal tag in the text file such that the first terminal tag is aligned with the first terminal signal; the first terminal signal identifies a first portion terminal end of the portion and the first terminal tag identifies a first segment terminal end of the segment. The operations may include generating a converted text from the analysis and inserting the segment into the converted text.
Abstract:
A method includes a computing device receiving data traffic flow and initializing a subroutine to assess alerts for the received data traffic flow; the computer device determining a collection of rules which produce more than a threshold of false positive alerts and more than a threshold of true positive alerts for the assessed alerts; the computer device determining a logical condition and an atomic rule element to add to the collection of rules; and the computer device implementing the added logical condition and atomic rule element if the number of assessed alerts are decreased below a value.
Abstract:
An embodiment of the invention provides a method for selectively using degree confidence for image validation to authorize transactions, wherein a request to authorize a transaction is received, the request including a user's name, a photo of the user, and a transaction value. A database is queried with the user's name to identify one or more reference photos of the user; and, the received photo of the user is compared to the reference photo of the user with an analysis engine to generate a confidence value. An authorization threshold is determined with a processor based on the transaction value. The transaction is authorized when the confidence value is equal to and/or greater than the authorization threshold.
Abstract:
In response to determining that a computer is undergoing a cyber attack, a newly assigned IP address is received for the computer. A currently assigned IP address of the computer is changed to the newly assigned IP address.
Abstract:
Embodiments for selecting a remote service for a core program are provided. A request for a remote service is received. Information associated with each of a plurality of remote services is received from at least one information source. A score for each of the plurality of remote services is calculated based on the information associated with each of the plurality of remote services and at least one remote service evaluation criteria.
Abstract:
A method includes a computing device receiving read source content from at least one content provider; the computing device creating a read order file for the received read source content in accordance with at least one selected criteria; the computing device packaging the read order file into a computer readable schema file; and delivering the computer readable schema file to at least one user device.
Abstract:
An embodiment of the invention provides a method for controlling access to a system, wherein a request to access the system and metadata of the request are received from a user, the request including a user identification. The metadata includes: information obtained from a history of prior accesses to an application access system, information obtained from a history of prior accesses to a wireless authentication system, and/or confirmation of the user identification by an entity physically proximate to the user. A database is queried with the user identification and the metadata to identify relationship data. The relationship data indicates the relationship between the individual assigned the user identification and an entity owning the system, an entity leasing the system, and/or an entity operating the system. The relationship data is input into a rules engine; and, security measure(s) are selected with the rules engine based on the relationship data.