AUTOMATIC CREATION AND UPDATING OF EVENT GROUP SUMMARIES

    公开(公告)号:US20240333752A1

    公开(公告)日:2024-10-03

    申请号:US18740314

    申请日:2024-06-11

    申请人: SPLUNK INC.

    IPC分类号: H04L9/40 G06F16/28 G06F21/55

    摘要: A disclosed computer-implemented method includes receiving and indexing the raw data. Indexing includes dividing the raw data into time stamped searchable events that include information relating to computer or network security. Store the indexed data in an indexed data store and extract values from a field in the indexed data using a schema. Search the extracted field values for the security information. Determine a group of security events using the security information. Each security event includes a field value specified by a criteria. Present a graphical interface (GI) including a summary of the group of security events, other summaries of security events, and a remove element (associated with the summary). Receive input corresponding to an interaction of the remove element. Interacting with the remove element causes the summary to be removed from the GI. Update the GI to remove the summary from the Gl.

    Login from an alternate electronic device

    公开(公告)号:US12079320B2

    公开(公告)日:2024-09-03

    申请号:US17683271

    申请日:2022-02-28

    申请人: PayPal, Inc.

    发明人: Jigar Gosalia

    摘要: Systems and techniques for providing login from an alternate electronic device are presented. A system can receive hash data associated with first fingerprint data and a timestamp from a first electronic device in response to a determination that the first electronic device satisfies a defined criterion associated with a terminal computing request. The system can also form a correlation between the first electronic device and a second electronic device within a geographic area associated with the first electronic device based on the timestamp, first location data associated with the first electronic device, and second location data associated with the second electronic device. Furthermore, the system can initiate display of a graphical user interface on the second electronic device in response to a determination that second fingerprint data provided to the second electronic device within a timeframe associated with the timestamp matches the first fingerprint data associated with the hash data.

    Distributed data rights management for peer data pools

    公开(公告)号:US11928233B2

    公开(公告)日:2024-03-12

    申请号:US17389090

    申请日:2021-07-29

    摘要: Techniques are described for transaction-based read and write operations in a distributed system. In an embodiment, an authorization protocol overlaid onto a transaction to control access to each of the data pools. Using the techniques described herein, the DTRS provides authorization mechanism to ensure that the entity, which hosts the data pool, may only access the data set from an originating entity based at least upon the access rules of the originating entity set for the data set. Additionally, the DTRS's read/write transactions keep the data pools of the DTRS in synch with each other, so each data pool stores the same data sets as another data pool of the DTRS. When a data integrity service of an entity generates a new data entry from a user transaction with a client application, a new write request is generated for the DTRS to which the data integrity service belongs. The DTRS receives the data entry and its metadata from the data integrity service and performs steps to update all data pool of the DTRS, in an embodiment.

    USER DATA DEIDENTIFICATION SYSTEM
    8.
    发明公开

    公开(公告)号:US20240061957A1

    公开(公告)日:2024-02-22

    申请号:US17891914

    申请日:2022-08-19

    IPC分类号: G06F21/62 G06F21/60

    摘要: A data deidentification system that extracts insights from user data, and retains both the insights and user data in a form that complies with applicable data privacy and related standards. The system receives user data, which can include personal identifying information and other sensitive data governed by one or more standards, including standards specifying how the data can be used and how long it can be retained. From the data, the system extracts insights characterizing various aspects of the associated users. The system also selectively hashes portions of the data, obscuring the identity of associated users. Neither the insights nor the selectively hashed data identify individual users, and therefore they are not subject to the same standards and can be retained indefinitely. Later, after the standards-protected data has been discarded, the system can provide insight information in response to a request.

    Method for synchronizing frame counters and arrangement

    公开(公告)号:US11797693B2

    公开(公告)日:2023-10-24

    申请号:US17197605

    申请日:2021-03-10

    摘要: A method synchronizes frame counters for protecting data transmissions between a first end-device and a second end-device. The data, in particular data frames, are transferred between the first end-device and the second end-device. The data frames are provided with frame counters to protect the data transfer between the first end-device and the second end-device. The second end-device sends a first data frame to the first end-device. The first data frame contains a marker in its payload data. The first end-device sends back a second data frame as an answer to the second end-device. The second data frame contains a frame counter in the header data, and the second data frame contains the frame counter and the marker in its payload data.