Mangalore, India
Mangalore, India

Time filter

Source Type

Patent
Corporation Bank | Date: 2017-01-25

Systems and methods are provided for provisioning access rights to physical computing resources using an IAM system implementing an IAM data model. The IAM data model may identify logical and physical computing resources. An access request handler may receive an access request and identify a set of logical permissions based on the access request. The access request handler may derive a set of logical entitlements based on the set of logical permissions. An entitlement translator may translate the set of logical entitlements to a physical entitlement specification based on a set of physical permission specifications associated with the set of logical permissions. A physical permission specification may be obtained by mapping a logical permission to one or more physical permissions. An access control manager may then provision access rights to at least one physical computing resource indicated in the physical entitlement specification.


Patent
Corporation Bank | Date: 2017-01-06

Systems and methods for ensuring the quality of identity and access management information at a computing system are described. Access right information that respectively corresponds to one or more access rights may be stored at a data store. The access right information may be stored in accordance with a data model that defines respective relationships between the access rights and both the users having access to the computing system and the computing resources of the computing system. At least a portion of the access right information may be retrieved, and quality assurance tasks may be performed using the portion of the access right information retrieved.


Patent
Corporation Bank | Date: 2017-02-01

Systems and methods for detecting potential steganography use to hide content in computer files transmitted via electronic communications are provided. An electronic communication associated with a computer file may be identified. The communication and the computer file may be analyzed to determine whether the computer file potentially includes hidden content. To determine whether the computer file potentially includes hidden content, a set of steganographic criteria may be analyzed. If at least a portion of the steganographic criteria are satisfied, then it may be determined that the computer file potentially includes hidden content. If at least a portion of the steganographic criteria are not satisfied, then it may be determined that the computer file does not potentially include hidden content. If the computer file is determined to potentially include hidden content, an individual may be notified of the communication associated with the computer file.


Patent
Corporation Bank | Date: 2017-02-01

Systems and methods for detecting potential steganography use to hide content in computer files transmitted via electronic communications are provided. An electronic communication associated with a computer file may be identified. The communication and the computer file may be analyzed to determine whether the computer file potentially includes hidden content. To determine whether the computer file potentially includes hidden content, a set of steganographic criteria may be analyzed. If at least a portion of the steganographic criteria are satisfied, then it may be determined that the computer file potentially includes hidden content. If at least a portion of the steganographic criteria are not satisfied, then it may be determined that the computer file does not potentially include hidden content. If the computer file is determined to potentially include hidden content, an individual may be notified of the communication associated with the computer file.


Patent
Corporation Bank | Date: 2016-05-12

An apparatus for detection, remediation and inference rule development for multi-layer information technology IT structures is provided. Certain embodiments of the apparatus may include an event generator. The event generator may monitor for, retrieve, and pool error events and performance events from alerting sources. The alerting sources may provide event information from one more of multiple layers. The apparatus may also include an event parser that provides a system status. The apparatus may include an analytics engine that detects patterns and relationships in the retrieved error events, performance events and system status, and models event hierarchies based on the detected patterns and relationships. The analytics engine may invoke auto-remediation processes in response to pre-determined error events. In some embodiments, the engine may detect a pre-determined number of resource-related events. Based on the detecting, the analytics engine may attribute the resource-related events to infrastructure resources.


Patent
Corporation Bank | Date: 2017-02-03

A source data file can be loaded into a database by extracting data from the source data file at a computing device, validating the data from the source data file at the computing device, transforming the data from the source data file at the computing device, requesting the data to be transferred to a first database at a first message processor module, delivering the data to the first database, and responding that the data has been transferred to the first database at the first message processor module to acknowledge receipt of the data in the database at the computing device.


Patent
Corporation Bank | Date: 2017-03-01

Computer-implemented methods for identifying or assessing any type of risk and/or opportunity that may arise can include either, alone or in combination, band pass filtering, principal component analysis, random matrix theory analysis, synchronization analysis, and early-warning detection. Each technique can also be viewed as a process that takes a set of inputs and converts it to a set of outputs. These outputs can be used as inputs for a subsequent process or the outputs may be directly actionable for formulating certain economic predictions to make certain decisions.


Patent
Corporation Bank | Date: 2017-03-01

Computer-implemented methods for identifying or assessing any type of risk and/or opportunity that may arise can include either, alone or in combination, band pass filtering, principal component analysis, random matrix theory analysis, synchronization analysis, and early-warning detection. Each technique can also be viewed as a process that takes a set of inputs and converts it to a set of outputs. These outputs can be used as inputs for a subsequent process or the outputs may be directly actionable for formulating certain economic predictions to make certain decisions.


Patent
Corporation Bank | Date: 2017-02-20

Embodiments for tracking multi-layer secured transactions include systems for providing a dedicated secure transaction channel to a user and sending pre-authorization code to the user via the transaction channel. The systems allow the user to encrypt transaction data and receive the encrypted transaction data from the user via the transaction channel. The systems further unlock the encrypted data and match the sent pre-authorization code to the received pre-authorization code. The systems send a post verification notification to the user comprising the one or more transactions via the transaction channel and receive a post verification confirmation from user in response to the post verification notification.


Embodiments of the invention are directed to a system, method, or computer program product for a passive based security escalation to shut off of applications on a mobile device based on rules. As such, the system may identify, via extraction of data, time periods correlating to events that the user may be offline or inactive with respect to his/her mobile device. Once the time periods are identified, rules are created for the level of security escalation required based on the event. Subsequently, a trigger is identified at a time leading up to the event, where the system integrates with the mobile device and requires additional authentication to access one or more applications. Once the offline event starts, the system initiates a shutdown of the functions of one or more applications on the users mobile device. The system then reinstates the application functionality after the offline event has ended.

Loading Corporation Bank collaborators
Loading Corporation Bank collaborators