METHOD AND SYSTEM FOR CORRELATING SELF-REPORTING VIRTUAL ASSET DATA WITH EXTERNAL EVENTS TO GENERATE AN EXTERNAL EVENT IDENTIFICATION DATABASE
Granted: February 4, 2016
Application Number:
20160036835
A method and system for correlating patterns of operating virtual assets with external events includes receiving an identification of one of the external events, from one or more electronic sources, and receiving first patterns from one or more first virtual assets, according to one embodiment. The method and system include populating a database with the first patterns and the identification of the one of the external events to map the one of the external events to the first patterns,…
METHOD AND SYSTEM FOR PROVIDING A VIRTUAL ASSET PERIMETER
Granted: February 4, 2016
Application Number:
20160036795
A system and method provides a virtual perimeter by maintaining a data structure for identifying a first plurality of assets, according to one embodiment. The system and method provides services to a second of the first plurality of assets, at least partially based on identifiers for the first plurality of assets and at least partially based on a first role assigned to a first of the first plurality of assets, according to one embodiment. The system and method include admitting one of a…
SYSTEM AND METHOD FOR PROVIDING CONTEXTUAL ANALYTICS DATA
Granted: January 14, 2016
Application Number:
20160012074
A system and method for providing contextual analytics data receives display entity data into a first virtual container, the display entity data including one or more instructions of the first virtual container. Instructions performing process operations are present within a second virtual container isolated from the first virtual container. The display entity data is analyzed to identify a webpage, for example, associated with the display entity data. If necessary, executable code is…
METHOD AND SYSTEM FOR SECURE DELIVERY OF INFORMATION TO COMPUTING ENVIRONMENTS
Granted: December 31, 2015
Application Number:
20150381651
A method and system for protecting and repairing a current virtual asset from damage by potential security threats, according to one embodiment. The method and system include monitoring a current a current virtual asset for potential security threats, with a virtual asset agent, according to one embodiment. The method and system include determining a severity of the potential security threats that are identified by the virtual asset agent, according to one embodiment. The method and…
METHOD AND SYSTEM FOR EFFICIENT MANAGEMENT OF SECURITY THREATS IN A DISTRIBUTED COMPUTING ENVIRONMENT
Granted: December 31, 2015
Application Number:
20150381641
A method and system for distributing security threat management of an instance of an application that is hosted from multiple geographic locations, according to one embodiment. The method and system include monitoring first operational characteristics of the instance of the application, and establishing an average for the first operational characteristics based at least partially on the first operational characteristics, according to one embodiment. The method and system include…
USING LIMITED LIFE TOKENS TO ENSURE PCI COMPLIANCE
Granted: December 31, 2015
Application Number:
20150379505
A method comprises receiving, by a payment service from a point of sale (POS) system, a payment request having sale data and a card data token, generating a detokenize and erase request including the card data token, sending the detokenize and erase request to a token service, receiving, by the payment service, card data from the token service in response to the sending the detokenize and erase request, generating a payment process request comprising the sale data and the card data,…
SYSTEMS METHODS AND COMPUTER PROGRAM PRODUCTS FOR ENCODING AND DECODING TAX RETURN DATA
Granted: December 17, 2015
Application Number:
20150363892
Tax data, e.g., Form W2 data, is encoded as a two-dimensional machine readable representation, such as a QR CODE. Certain tax data is encoded as segments of a QR CODE, and a tax form generated by an employer or payroll processing service and provided to an employee or user includes the QR CODE representing certain W-2 or other tax data. An image of the QR CODE is acquired using a camera of a mobile communication device or computer or other image capture device. When using a Smartphone, a…
METHOD AND APPARATUS FOR A SCORING SERVICE FOR SECURITY THREAT MANAGEMENT
Granted: December 3, 2015
Application Number:
20150347750
A method and system for providing a security threat scoring service to identify and prioritize potential security threats to an online service. The method and system include determining security threat patterns, comparing traffic to the online system with the security threat patterns, and identifying portions of the traffic as a potential security threat. The method and system include assigning a threat score to the potential security threat, and providing the threat score to the online…
METHOD AND SYSTEM FOR IMPLEMENTING DATA SECURITY POLICIES USING DATABASE CLASSIFICATION
Granted: December 3, 2015
Application Number:
20150347773
Access to a database is obtained, the database containing data that is potentially of one or more data types and/or data security classifications. The data in the database is scanned to determine the types and/or data security classifications of the data in the database. Then based, at least in part, on the determined types and/or data security classifications of the data in the database a database security classification is associated with the entire database and used to select one or…
METHOD AND APPARATUS FOR AUTOMATING THE BUILDING OF THREAT MODELS FOR THE PUBLIC CLOUD
Granted: December 3, 2015
Application Number:
20150347759
A method and system for automating threat model generation for an application includes identifying components of an application, receiving security information that identifies whether security measures were implemented within the application to secure the application against security threats, determining whether the security measures sufficiently address security risks associated with the security threats, and providing a threat model that includes a report that identifies components of…
METHOD AND SYSTEM FOR ACCESS CONTROL MANAGEMENT USING REPUTATION SCORES
Granted: November 26, 2015
Application Number:
20150341357
Security reputation data associated with a party is obtained and/or monitored. The security reputation data associated with the party is then analyzed to assign a security reputation score to the party. The security reputation score assigned to the party is then used to determine access permissions to be provided to the party. It is then either recommended that the determined access permissions be provided to the party, or the determined access permissions are automatically provided to…
RANKING AUTOCOMPLETE RESULTS BASED ON A BUSINESS COHORT
Granted: November 19, 2015
Application Number:
20150331878
During this autocomplete technique, autocomplete results for data-entry information from a user are ranked based on financial-transaction histories of a group of entities and the user, where the group of entities and the user belong to a common business cohort. In particular, the business cohort may include entities that: are located proximate to the user, have a similar size as a business associated with the user (such as a similar number of employees and/or similar revenue), and/or…
METHOD AND APPARATUS FOR MULTI-TENANCY SECRETS MANAGEMENT
Granted: November 5, 2015
Application Number:
20150319192
A service provider computing environment includes a service provider secrets policy. A service provider computing device receives tenant secrets policies from tenants. The tenants are tenants of multi-tenant assets of a service provider. The service provider computing environment determines of the tenant secrets policies satisfy the requirements of the service provider secrets policy. If the tenant secrets policies satisfy the requirements of the service provider secrets policy, the…
METHOD AND SYSTEM FOR DETECTING IRREGULARITIES AND VULNERABILITIES IN DEDICATED HOSTING ENVIRONMENTS
Granted: November 5, 2015
Application Number:
20150319186
A dedicated hosting environment is provided and a requirement is imposed that each virtual asset deployed in the dedicated hosting environment include one or more required virtual asset characteristics. Each virtual asset deployed in the dedicated hosting environment is then provided virtual asset characteristic certification data indicating that the virtual asset includes the one or more required virtual asset characteristics. A virtual asset monitoring system then monitors each virtual…
METHOD AND SYSTEM FOR PROVIDING REFERENCE ARCHITECTURE PATTERN-BASED PERMISSIONS MANAGEMENT
Granted: November 5, 2015
Application Number:
20150319177
Reference architecture pattern role data representing reference architecture pattern roles to be associated with entities taking part in the development, and/or deployment, and/or operation of an application is generated. Reference architecture pattern tier data representing reference architecture pattern tiers used to create, and/or deploy, and/or operate an application using the reference architecture pattern is generated. For each reference architecture pattern role at least one…
SECURE PROXIMITY EXCHANGE OF PAYMENT INFORMATION BETWEEN MOBILE WALLET AND POINT-OF-SALE
Granted: November 5, 2015
Application Number:
20150317626
A method for processing payment is disclosed. The method includes obtaining, by a point-of-sale (POS) device from a certification authority, a certificate data item that identifies the POS device for completing a purchase by a consumer, generating a payment request containing the certificate data item, broadcasting the payment request via a wireless signal within a pre-determined range of the POS device for receiving by a mobile device of the consumer, where the mobile device stores…
METHOD AND SYSTEM FOR ENSURING AN APPLICATION CONFORMS WITH SECURITY AND REGULATORY CONTROLS PRIOR TO DEPLOYMENT
Granted: October 29, 2015
Application Number:
20150312274
Asset security compliance data ensuring defined asset security policies are applied to the creation and/or operation of assets to be used to implement an application and application deployment security compliance data for ensuring compliance with one or more application deployment security policies associated with the deployment of assets used to implement the application is generated. The asset security compliance data is then used to ensure each asset used to implement the application…
METHOD AND APPARATUS TO ROTATE DATA ENCRYPTION KEYS IN DATABASES WITH NO DOWN TIME
Granted: October 29, 2015
Application Number:
20150310221
A database includes a first instance and a second instance. The first and second instances of the database are encrypted with a first encryption key and have content that is synchronized. Database queries from a user computing device are directed to the first instance of the database. A third instance of the database is created from one of the existing two instances of the database. The third instance is decrypted from the first encryption key and is encrypted with a second encryption…
METHOD AND SYSTEM FOR PROVIDING SELF-MONITORING, SELF-REPORTING, AND SELF-REPAIRING VIRTUAL ASSETS IN A CLOUD COMPUTING ENVIRONMENT
Granted: October 22, 2015
Application Number:
20150304343
Self-monitoring, self-reporting, and self-repairing virtual assets are provided that include virtual asset self-monitoring logic for detecting one or more trigger events within the self-monitoring, self-reporting, and self-repairing virtual assets, virtual asset self-reporting logic representing instructions for generating trigger event reporting data from the self-monitoring, self-reporting, and self-repairing virtual assets, and virtual asset self-reporting communications channel…
IMAGE ACQUISITION USING A LEVEL-INDICATION ICON
Granted: October 15, 2015
Application Number:
20150294447
During an information-extraction technique, visual suitability indicators may be displayed to a user of the electronic device to assist the user in acquiring an image of a document that is suitable for subsequent extraction of textual information. For example, an imaging application executed by the electronic device may display, in a window associated with the imaging application, a visual suitability indicator of a tilt orientation of the electronic device relative to a plane of the…