CHECKOUT SYSTEM EXECUTABLE CODE MONITORING, AND USER ACCOUNT COMPROMISE DETERMINATION SYSTEM
    1.
    发明申请
    CHECKOUT SYSTEM EXECUTABLE CODE MONITORING, AND USER ACCOUNT COMPROMISE DETERMINATION SYSTEM 审中-公开
    检查系统可执行代码监控和用户帐户压缩确定系统

    公开(公告)号:US20170053115A1

    公开(公告)日:2017-02-23

    申请号:US15235551

    申请日:2016-08-12

    Abstract: Methods, systems, and apparatus, including computer programs encoded on computer storage media, for a checkout system executable code monitoring, and user account compromise determination system. The system monitors executable code initiating and executing on checkout systems, including determining hashes of the executable code. The system determines whether the executable code is malicious based on the hash, and associated information of the executable code. Additionally, the system monitors user access to checkout systems, and determines user accounts associated with being compromised. User interfaces are generated describing checkout systems associated with a risk of being compromised, and are configured for user interaction, which cause generation of updated user interfaces and access to electronic data stores to determine information relevant to the user interaction.

    Abstract translation: 方法,系统和装置,包括在计算机存储介质上编码的计算机程序,用于检验系统可执行代码监视和用户帐户折衷确定系统。 该系统监视在检出系统上启动和执行的可执行代码,包括确定可执行代码的散列。 该系统基于散列来确定可执行代码是否是恶意的,以及可执行代码的相关信息。 此外,系统监视用户对结帐系统的访问,并确定与被入侵相关联的用户帐户。 生成用户界面,描述与被危害的风险相关联的结帐系统,并且被配置用于用户交互,其导致生成更新的用户界面和访问电子数据存储以确定与用户交互相关的信息。

    CHECKOUT SYSTEM EXECUTABLE CODE MONITORING, AND USER ACCOUNT COMPROMISE DETERMINATION SYSTEM

    公开(公告)号:US20190171814A1

    公开(公告)日:2019-06-06

    申请号:US16144720

    申请日:2018-09-27

    Abstract: Methods, systems, and apparatus, including computer programs encoded on computer storage media, for a checkout system executable code monitoring, and user account compromise determination system. The system monitors executable code initiating and executing on checkout systems, including determining hashes of the executable code. The system determines whether the executable code is malicious based on the hash, and associated information of the executable code. Additionally, the system monitors user access to checkout systems, and determines user accounts associated with being compromised. User interfaces are generated describing checkout systems associated with a risk of being compromised, and are configured for user interaction, which cause generation of updated user interfaces and access to electronic data stores to determine information relevant to the user interaction.

    Checkout system executable code monitoring, and user account compromise determination system

    公开(公告)号:US10922404B2

    公开(公告)日:2021-02-16

    申请号:US16144720

    申请日:2018-09-27

    Abstract: Methods, systems, and apparatus, including computer programs encoded on computer storage media, for a checkout system executable code monitoring, and user account compromise determination system. The system monitors executable code initiating and executing on checkout systems, including determining hashes of the executable code. The system determines whether the executable code is malicious based on the hash, and associated information of the executable code. Additionally, the system monitors user access to checkout systems, and determines user accounts associated with being compromised. User interfaces are generated describing checkout systems associated with a risk of being compromised, and are configured for user interaction, which cause generation of updated user interfaces and access to electronic data stores to determine information relevant to the user interaction.

    Checkout system executable code monitoring, and user account compromise determination system

    公开(公告)号:US10102369B2

    公开(公告)日:2018-10-16

    申请号:US15235551

    申请日:2016-08-12

    Abstract: Methods, systems, and apparatus, including computer programs encoded on computer storage media, for a checkout system executable code monitoring, and user account compromise determination system. The system monitors executable code initiating and executing on checkout systems, including determining hashes of the executable code. The system determines whether the executable code is malicious based on the hash, and associated information of the executable code. Additionally, the system monitors user access to checkout systems, and determines user accounts associated with being compromised. User interfaces are generated describing checkout systems associated with a risk of being compromised, and are configured for user interaction, which cause generation of updated user interfaces and access to electronic data stores to determine information relevant to the user interaction.

Patent Agency Ranking