METHOD AND SYSTEM FOR PROVIDING SECURITY AWARE APPLICATIONS
Granted: October 8, 2015
Application Number:
20150288708
Instructions for monitoring and detecting one or more trigger events in assets used to implement an application are generated. Instructions for implementing at least one responsive action associated with each of the one or more trigger events is generated. At least part of instructions for monitoring and detecting the one or more trigger events is provided to an asset used to implement the application. The at least part of the instructions for monitoring and detecting the one or more…
METHOD AND SYSTEM FOR TESTING CLOUD BASED APPLICATIONS AND SERVICES IN A PRODUCTION ENVIRONMENT USING SEGREGATED BACKEND SYSTEMS
Granted: October 1, 2015
Application Number:
20150278523
An application is implemented in the production environment in which the application will be used. Two or more backend systems are provided. Actual user data is received. The actual user data is routed and processed in the production environment using a first backend system of the two or more backend systems. Fabricated user data is generated, routed, and also processed in the production environment but using a second backend system of the two or more backend systems. Results data from…
METHOD AND SYSTEM FOR COMPARING DIFFERENT VERSIONS OF A CLOUD BASED APPLICATION IN A PRODUCTION ENVIRONMENT USING SEGREGATED BACKEND SYSTEMS
Granted: October 1, 2015
Application Number:
20150278517
An application is implemented in the production environment in which the application will be used. Two or more backend systems are used to implement different versions of the application using the production environment in which the application will actually be used and accessed. Actual user data is received. A first portion of the actual user data is routed and processed in the production environment using a first version of the application and a first backend system of the two or more…
METHOD AND SYSTEM FOR PROVIDING TEMPORARY SECURE ACCESS ENABLED VIRTUAL ASSETS
Granted: September 24, 2015
Application Number:
20150271195
Temporary secure access enabled virtual assets are provided that include a temporary secure access communications door. Upon receipt of temporary access authentication data from a source outside the temporary secure access enabled virtual asset, the temporary secure access communications door temporarily allows operational instruction code to be transferred into the temporary secure access enabled virtual asset from a source outside temporary secure access enabled virtual asset.
METHOD AND SYSTEM FOR TESTING CLOUD BASED APPLICATIONS IN A PRODUCTION ENVIRONMENT USING FABRICATED USER DATA
Granted: September 24, 2015
Application Number:
20150269064
An application is implemented in the production environment in which the application will be used. Fabricated user data associated with the application implemented in the production environment is then generated and provided to the application as implemented in the production environment. The fabricated user data is then processed by the application in the production environment to transform the fabricated user data into fabricated user results data. In one embodiment, the fabricated…
METHOD AND SYSTEM FOR ACCOMMODATING COMMUNICATIONS CHANNELS USING DIFFERENT SECURE COMMUNICATIONS PROTOCOLS
Granted: September 17, 2015
Application Number:
20150263859
A communications protocol is selected to be used to transfer message data between a source computing entity and a destination computing entity. Encryption code data identifying the selected communications protocol is generated and associated with the message data. One or more communications endpoint proxy systems are provided that include an encryption code identification module and a communications protocol processing module for obtaining communications protocol processing data…
EXTRACTING DATA FROM COMMUNICATIONS RELATED TO DOCUMENTS
Granted: September 17, 2015
Application Number:
20150261836
The disclosed embodiments provide a system that processes data. During operation, the system obtains a communication associated with a document and extracts data associated with the document from the communication. Next, the system uses the extracted data from the communication and document data from the document to build a context associated with the document. The system then uses the context to facilitate use of the document by a user associated with the communication.
PERFORMING COMMERCE QUERIES USING A COMMERCE GRAPH
Granted: September 10, 2015
Application Number:
20150254750
During a search technique, results for a commerce query associated with a desired financial transaction are determined using information in a data structure that specifies a commerce graph. This commerce graph may include nodes and branches indicating financial interrelationships among a set of entities (such as individuals or businesses), and the financial interrelationships may include: inputs to the set of entities, outputs from the set of entities, and previous financial transactions…
METHOD AND SYSTEM FOR PROVIDING A ROBUST AND EFFICIENT VIRTUAL ASSET VULNERABILITY MANAGEMENT AND VERIFICATION SERVICE
Granted: August 27, 2015
Application Number:
20150242631
A virtual asset testing environment is provided that is distinct from a production computing environment. A virtual asset creation template associated with a class of virtual assets to be verified is identified, each virtual asset of the class of virtual assets being created using the virtual asset creation template. A designated test virtual asset is generated using the virtual asset creation template that is deployed in the virtual asset testing environment. The designated test virtual…
METHOD AND SYSTEM FOR PROVIDING AN EFFICIENT VULNERABILITY MANAGEMENT AND VERIFICATION SERVICE
Granted: August 27, 2015
Application Number:
20150242634
A virtual asset creation template associated with a class of virtual assets is identified and analyzed to identify any vulnerabilities in the virtual asset creation template. If one or more vulnerabilities are identified in the virtual asset creation template, an appropriate remedy for each identified vulnerability identified in the virtual asset creation template is applied. If no vulnerability is identified in the virtual asset creation template, or once each vulnerability identified…
METHOD AND SYSTEM FOR EXTRUSION AND INTRUSION DETECTION IN A CLOUD COMPUTING ENVIRONMENT
Granted: August 6, 2015
Application Number:
20150222653
A traffic router proxy including an analysis trigger monitoring system is provided. One or more analysis trigger parameters are defined and analysis trigger data representing the analysis trigger parameters is generated. The analysis trigger data is then provided to the analysis trigger monitoring system and at least a portion of the message traffic sent to, or sent from, virtual assets in the cloud computing environment and relayed by the traffic router proxy through a first…
METHOD AND SYSTEM FOR VIRTUAL ASSET ASSISTED EXTRUSION AND INTRUSION DETECTION IN A CLOUD COMPUTING ENVIRONMENT
Granted: August 6, 2015
Application Number:
20150222647
An analysis trigger monitoring system is provided in one or more virtual assets. One or more analysis trigger parameters are defined and analysis trigger data is generated. The analysis trigger monitoring systems are used to monitor at least a portion of the message traffic sent to, or sent from, the one or more virtual assets to detect any message including one or more of the one or more analysis trigger parameters. A copy of at least a portion of any detected message including one or…
METHOD AND SYSTEM FOR PROVIDING GLOBAL READY FINANCIAL APPLICATIONS
Granted: August 6, 2015
Application Number:
20150221043
Global ready financial applications are provided that are dynamically composed using application independent global ready financial assets so that a single global ready financial application, once created, can be operationally and functionally optimized for multiple supported regions to be used by any party, in any, or all, of the multiple supported regions.
METHOD AND SYSTEM FOR EXTRUSION AND INTRUSION DETECTION IN A CLOUD COMPUTING ENVIRONMENT USING NETWORK COMMUNICATIONS DEVICES
Granted: July 30, 2015
Application Number:
20150215327
An analysis trigger monitoring system is provided in a network communications device associated with a cloud computing environment. One or more analysis trigger parameters are defined and analysis trigger data representing the analysis trigger parameters is generated. The analysis trigger data is then provided to the analysis trigger monitoring system and the analysis trigger monitoring system is used to monitor at least a portion of the message traffic sent to, or sent from, virtual…
METHOD AND SYSTEM FOR INTRUSION AND EXTRUSION DETECTION
Granted: July 2, 2015
Application Number:
20150186641
A hypervisor includes an analysis trigger monitoring system. One or more analysis trigger parameters are defined and analysis trigger data representing the analysis trigger parameters is generated. The analysis trigger data is then provided to the analysis trigger monitoring system and the analysis trigger monitoring system is used to monitor at least a portion of the message traffic sent to, and/or sent from, a virtual asset controlled by the hypervisor to detect any message including…
METHOD AND SYSTEM FOR DYNAMICALLY AND AUTOMATICALLY MANAGING RESOURCE ACCESS PERMISSIONS
Granted: May 14, 2015
Application Number:
20150135305
Employment role data, trust data, and special permissions data, associated with a party is automatically obtained and/or monitored. The employment role data associated with the party, the trust data associated with the party, and the special permissions data associated with the party, is then analyzed to determine a set of allowed access permissions data to be associated with the party, the set of allowed access permissions data providing the party access to one or more resources. It is…
METHOD AND SYSTEM FOR DOCUMENT DATA EXTRACTION TEMPLATE MANAGEMENT
Granted: May 7, 2015
Application Number:
20150127659
User acceptance of a given data extraction template and the number of data fields that the data extraction template can extract accurately is used to calculate data extraction template ranking, or a ranking score, to be associated with the data extraction template. Then the data extraction template having the highest data extraction template ranking score is used in a first attempt to extract data from a source documents of the source document type associated with the data extraction…
METHOD AND SYSTEM FOR AUTOMATICALLY MANAGING SECURE COMMUNICATIONS IN MULTIPLE COMMUNICATIONS JURISDICTION ZONES
Granted: May 7, 2015
Application Number:
20150128204
Communications and data security policy data for two or more communications jurisdiction zones is obtained that includes data indicating allowed protocols for the respective communications jurisdiction zones. Data indicating a desired exchange of data between a first resource in a first communications jurisdiction zone and a second resource in a second communications jurisdiction zone is received/obtained. The first communications jurisdiction zone communications and data security policy…
METHOD AND SYSTEM FOR PROVIDING AND DYNAMICALLY DEPLOYING HARDENED TASK SPECIFIC VIRTUAL HOSTS
Granted: May 7, 2015
Application Number:
20150128130
Virtual host creation data used to instantiate a hardened task specific virtual host in a first computing environment is generated including hardening logic for providing enhanced security and trust for the hardened task specific virtual host and internal task specific logic for directing and/or allowing the hardened task specific virtual host to perform a specific function assigned to the hardened task specific virtual host. When task data is received indicating a task to be performed…
REMOTE CONTROL OF A DESKTOP APPLICATION VIA A MOBILE DEVICE
Granted: May 7, 2015
Application Number:
20150128061
One embodiment of the present invention provides a system for using a mobile device to remotely control a desktop application that was configured for use with a pointing device. During operation, the system receives at a mobile device, from a user, a connection request to connect to a desktop application executing on a remote device. In response to the connection request, the system establishes a remote control session between the mobile device and the remote device. Next, the system…