AUTHENTICITY ASSESSMENT OF A REQUESTOR BASED ON A COMMUNICATION REQUEST

    公开(公告)号:US20220182414A1

    公开(公告)日:2022-06-09

    申请号:US17110554

    申请日:2020-12-03

    Abstract: A method for dynamically establishing a communication path for a requestor by assessing an authenticity of the requestor and a communication request is provided. The method may include, in response to receiving the communication request, dynamically determining whether to establish a communication path for the requestor to a destination though a communication network by assessing the requestor based on one or more authentication rules, wherein the one or more authentication rules are based on first information associated the communication network, second information about the requestor, and third information from the requestor. The method may further include, in response to determining that the requestor satisfies the one or more authentication rules, dynamically establishing the communication path for the requestor on the communication network according to one or more communication attributes associated with the requestor.

    Tuning of Data Loss Prevention Signature Effectiveness
    3.
    发明申请
    Tuning of Data Loss Prevention Signature Effectiveness 有权
    调整数据丢失预防签名有效性

    公开(公告)号:US20140173727A1

    公开(公告)日:2014-06-19

    申请号:US13734670

    申请日:2013-01-04

    CPC classification number: G06F21/60 G06F21/552

    Abstract: In at least one embodiment, a method and a system include capability to fine-tune a data loss prevention system. An example system includes a computer readable storage medium for storing at least one alert database and at least one associated signature set to each alert database; an analytics module in communication to the computer readable storage medium, the analytics module analyzes at least one alert database present on the computer storage medium to determine whether any signatures from the signature set associated with the alert database being analyzed are ineffective based at least on a ratio of valid alerts to false positive alerts for individual signatures selected from a group including a plurality of signatures present in the signature set; and an adjustment module in communication to the computer readable storage medium and the analytics module, the adjustment module removes at least one ineffective signature from the signature set.

    Abstract translation: 在至少一个实施例中,方法和系统包括微调数据丢失预防系统的能力。 示例性系统包括用于将至少一个警报数据库和至少一个相关联的签名集存储到每个警报数据库的计算机可读存储介质; 与所述计算机可读存储介质通信的分析模块,所述分析模块分析存在于所述计算机存储介质上的至少一个警报数据库,以确定来自所分析的所述警报数据库的与所述签名集相关联的任何签名是否至少基于 从包括签名集中存在的多个签名的组中选择的各个签名的有效警报与假阳性警报的比率; 以及与所述计算机可读存储介质和所述分析模块通信的调整模块,所述调整模块从所述签名集中移除至少一个无效签名。

    CLOSED CAPTION CONTENT GENERATION

    公开(公告)号:US20230103102A1

    公开(公告)日:2023-03-30

    申请号:US17487597

    申请日:2021-09-28

    Abstract: A system may include a memory and a processor in communication therewith configured to perform operations. The operations may include receiving an audio file and a text file related to the audio file, analyzing the audio file to produce an analysis, and determining a portion of the audio file is similar to a segment of the text file. The operations may include identifying a first terminal signal and corresponding the first terminal signal to a first terminal tag in the text file such that the first terminal tag is aligned with the first terminal signal; the first terminal signal identifies a first portion terminal end of the portion and the first terminal tag identifies a first segment terminal end of the segment. The operations may include generating a converted text from the analysis and inserting the segment into the converted text.

    DATA LOSS PREVENTION TO REMOVE FALSE POSITIVES
    5.
    发明申请
    DATA LOSS PREVENTION TO REMOVE FALSE POSITIVES 有权
    数据丢失防止去除错误的位置

    公开(公告)号:US20150356445A1

    公开(公告)日:2015-12-10

    申请号:US14297035

    申请日:2014-06-05

    CPC classification number: G06N5/025 H04L41/0604

    Abstract: A method includes a computing device receiving data traffic flow and initializing a subroutine to assess alerts for the received data traffic flow; the computer device determining a collection of rules which produce more than a threshold of false positive alerts and more than a threshold of true positive alerts for the assessed alerts; the computer device determining a logical condition and an atomic rule element to add to the collection of rules; and the computer device implementing the added logical condition and atomic rule element if the number of assessed alerts are decreased below a value.

    Abstract translation: 一种方法包括接收数据业务流的计算设备和初始化子程序以评估所接收的数据业务流的警报; 所述计算机设备确定产生超过阈值的假阳性警报并且超过所述评估警报的真正警报阈值的规则的集合; 计算机设备确定逻辑条件和原子规则元素以添加到规则集合中; 以及如果所评估的警报的数量降低到一个值以下,则该计算机设备实现添加的逻辑条件和原子规则元素。

    Selectively Using Degree Confidence for Image Validation to Authorize Transactions
    6.
    发明申请
    Selectively Using Degree Confidence for Image Validation to Authorize Transactions 审中-公开
    选择性地使用图像验证的度数置信来授权交易

    公开(公告)号:US20150073985A1

    公开(公告)日:2015-03-12

    申请号:US14020554

    申请日:2013-09-06

    CPC classification number: G06Q20/40145

    Abstract: An embodiment of the invention provides a method for selectively using degree confidence for image validation to authorize transactions, wherein a request to authorize a transaction is received, the request including a user's name, a photo of the user, and a transaction value. A database is queried with the user's name to identify one or more reference photos of the user; and, the received photo of the user is compared to the reference photo of the user with an analysis engine to generate a confidence value. An authorization threshold is determined with a processor based on the transaction value. The transaction is authorized when the confidence value is equal to and/or greater than the authorization threshold.

    Abstract translation: 本发明的实施例提供了一种用于选择性地使用图像验证的度数置信来授权交易的方法,其中接收到授权交易的请求,所述请求包括用户的姓名,用户的照片和交易值。 使用用户名来查询数据库,以识别用户的一个或多个参考照片; 并且利用分析引擎将接收到的用户照片与用户的参考照片进行比较以产生置信度值。 基于事务值的处理器确定授权阈值。 当置信度值等于和/或大于授权阈值时,交易被授权。

    CREATING AND MANAGING READ ORDER INSTRUCTION FILES
    9.
    发明申请
    CREATING AND MANAGING READ ORDER INSTRUCTION FILES 审中-公开
    创建和管理读订单指令文件

    公开(公告)号:US20150244768A1

    公开(公告)日:2015-08-27

    申请号:US14188242

    申请日:2014-02-24

    CPC classification number: H04L67/06 G06F16/958 H04L67/10

    Abstract: A method includes a computing device receiving read source content from at least one content provider; the computing device creating a read order file for the received read source content in accordance with at least one selected criteria; the computing device packaging the read order file into a computer readable schema file; and delivering the computer readable schema file to at least one user device.

    Abstract translation: 一种方法包括:计算设备从至少一个内容提供器接收读取源内容; 所述计算设备根据至少一个选择的标准创建所述接收到的读取源内容的读取订单文件; 计算设备将读取的订单文件打包成计算机可读模式文件; 以及将所述计算机可读模式文件递送到至少一个用户设备。

    Quantifying risk based on relationships and applying protections based on business rules
    10.
    发明授权
    Quantifying risk based on relationships and applying protections based on business rules 有权
    基于关系量化风险,并根据业务规则应用保护

    公开(公告)号:US08875229B2

    公开(公告)日:2014-10-28

    申请号:US13725225

    申请日:2012-12-21

    Abstract: An embodiment of the invention provides a method for controlling access to a system, wherein a request to access the system and metadata of the request are received from a user, the request including a user identification. The metadata includes: information obtained from a history of prior accesses to an application access system, information obtained from a history of prior accesses to a wireless authentication system, and/or confirmation of the user identification by an entity physically proximate to the user. A database is queried with the user identification and the metadata to identify relationship data. The relationship data indicates the relationship between the individual assigned the user identification and an entity owning the system, an entity leasing the system, and/or an entity operating the system. The relationship data is input into a rules engine; and, security measure(s) are selected with the rules engine based on the relationship data.

    Abstract translation: 本发明的实施例提供了一种用于控制对系统的访问的方法,其中从用户接收访问系统的请求和请求的元数据,该请求包括用户标识。 元数据包括:从对应用访问系统的先前访问的历史获得的信息,从对无线认证系统的先前访问的历史获得的信息和/或物理上靠近用户的实体的用户标识的确认。 使用用户标识和元数据查询数据库以识别关系数据。 关系数据表示分配了用户标识的个人与拥有该系统的实体之间的关系,租赁系统的实体和/或操作系统的实体之间的关系。 将关系数据输入到规则引擎中; 并且基于关系数据与规则引擎一起选择安全措施。

Patent Agency Ranking