发明名称 CHECKOUT SYSTEM EXECUTABLE CODE MONITORING, AND USER ACCOUNT COMPROMISE DETERMINATION SYSTEM
摘要 Methods, systems, and apparatus, including computer programs encoded on computer storage media, for a checkout system executable code monitoring, and user account compromise determination system. The system monitors executable code initiating and executing on checkout systems, including determining hashes of the executable code. The system determines whether the executable code is malicious based on the hash, and associated information of the executable code. Additionally, the system monitors user access to checkout systems, and determines user accounts associated with being compromised. User interfaces are generated describing checkout systems associated with a risk of being compromised, and are configured for user interaction, which cause generation of updated user interfaces and access to electronic data stores to determine information relevant to the user interaction.
申请公布号 US2017053115(A1) 申请公布日期 2017.02.23
申请号 US201615235551 申请日期 2016.08.12
申请人 PALANTIR TECHNOLOGIES INC. 发明人 Healy Adam;Jackson Benjamin;Pham Khoa;Paul Sanjay;Liu Zhi Qiang
分类号 G06F21/55;G06Q20/18;G06Q20/20;H04L9/32 主分类号 G06F21/55
代理机构 代理人
主权项 1. A computerized method performed by one or more computer systems, wherein the computer systems are configured to access one or more electronic data sources in response to requests received from an interactive user interface, the method comprising: obtaining checkout system data associated with a plurality of checkout systems associated with a business, wherein the checkout system data identifies processes executing in memory of each checkout system, and user account access information indicating user account access attempts; determining that the checkout system data identifies a first process, executing in memory of one or more checkout systems, that is not known to be valid; determining, using the user account access information, anomalous user behavior of a first user account; generate user interface data describing the first process and the determined anomalous user behavior of the first user account; and provide at least a portion of the generated user interface data for presentation on a user device.
地址 Palo Alto CA US