Abstract: Systems, methods, and media for applying remote data using a biometric signature sample are provided. In some embodiments, systems for applying remote data using a biometric signature sample are provided, the systems comprising: a storage device for storing remote data; at least one hardware processor in communication with the storage device that is configure to: receiving a biometric signature sample; validating the biometric signature sample; receiving the remote data associated with the biometric signature sample from the storage device; applying the remote data; and logging the application of the remote data.
Abstract: Methods, systems, and media for authenticating users using blockchains are provided. In some embodiments, the method comprises: receiving, at a user device of a user, user credentials for authentication to an application associated with the user device; determining whether the user credentials are valid for the application using a local blockchain stored on the user device; in response to determining that the user credentials are valid, generating a new block to be added to the local blockchain; adding the new block to the local blockchain; and granting access to the application based on the validated user credentials.
Abstract: Methods, systems, and media for authenticating users using biometric signatures are provided. In some embodiments, the method comprises: receiving, from a user device, an indication that the user device is to be connected to a communication network; in response to receiving the indication, causing a user interface to be presented on the user device that receives a username corresponding to a user of the user device; receiving, from the user device, a biometric sample corresponding to the user of the user device; determining whether the biometric sample matches a stored biometric sample associated with the username; and in response to determining that the biometric sample matches the stored biometric sample associated with the user name, causing the user device to be connected to the communication network.
Abstract: Methods, systems, and media for transmitting encrypted messages are provided. In some arrangements, the method comprises: generating, using a hardware processor by a first application, a first public key and a first private key corresponding to a first application; transmitting the first public key to a second application; receiving, from the second application, a second public key; encrypting a first message using the second public key corresponding to the second application; generating, by the first application, a third public key and a second private key; transmitting the encrypted message and third public key to the second application; receiving, from the second application, a second message and a fourth public key corresponding to the second application; and decrypting the second message using the second private key.
Abstract: Receiving a first username of a first user account (FAU) and a biometric signature (BS) of a user; in response to determining that BS matches a stored signature of FAU, presenting indications of a group of available services (GAS); receiving a selection of a service of GAS; transmitting an identifier of the selected service (SS); receiving an encrypted username (EU) and an encrypted password (EP) of a second user account (SAU) of SS; decrypting EU and EP; opening a first page that corresponds to a login page (LP) of SS; launching a script that identifies a username entry field (UEF) and a password entry field (PEF) on LP; entering the decrypted username (DU) in UEF and the decrypted password (DP) in PEF; and selecting a submit button (SB) within LP, wherein selecting SB to be selected causes SAU to be authenticated using DU and DP.
Abstract: Methods, systems, and media for detecting alteration of a web page are provided. In some embodiments, a method for detecting alteration of a web page is provided, the method comprising: analyzing a web page; generating a forensic footprint associated with the web page based on the analyzing; determining whether the forensic footprint matches reference information associated with the web page; and in response to determining that the forensic footprint does not match the reference information, blocking at least a portion of the web page from being presented.
Abstract: Methods, systems, and media for modifying firewall rules based on dynamic Internet Protocol (IP) addresses are provided. In some embodiments, the method comprises: receiving, from a database server, a request to modify a firewall rule of a firewall protecting a remote computer, wherein the request includes an IP address of a user device initiating a connection to the remote computer, and wherein the firewall rule indicates IP addresses of devices allowed to establish connections to the remote computer; determining whether the IP address of the user device is to be added to the firewall rule; and in response to determining that the IP address of the user device is to be added to the firewall rule, adding the current IP address to the firewall rule.
Abstract: Systems, methods, and media for determining access privileges are provided. More particularly, in some embodiments, systems for determining access privileges of a user to access a secure node are provided, the systems comprising: a memory; and a hardware processor configured to: receive a username of the user, a secure node identifier of the secure node, a secure node key of the secure node, and a biometric signature sample of the user; validate the secure node identifier and the secure node key; validate the biometric signature sample; and cause the user to gain access to the secure node in response validating the secure node identifier and secure node key and validating the biometric signature sample.
Type:
Grant
Filed:
November 22, 2017
Date of Patent:
February 2, 2021
Assignees:
Synergex Group (corp.), Pham Holdings, Inc. (corp.)
Abstract: Methods, systems, and media for adding IP addresses to firewalls are provided. In some embodiments, the method comprises: receiving a network packet that includes an external IP address associated with an external device, wherein the external device is a device not protected by a firewall; determining whether the external IP address is included in a group of IP addresses maintained by the firewall; determining whether to add the external IP address to the group of IP addresses; identifying an Internet Service Provider (ISP) associated with the external IP address; determining whether the ISP is included in a group of ISPs maintained by the firewall; and in response to determining that the ISP is not included in the group of ISPs maintained by the firewall, adding the external IP address to the group of IP addresses and adding the ISP to the group of ISPs.
Type:
Grant
Filed:
September 12, 2017
Date of Patent:
November 10, 2020
Assignees:
Synergex Group, Pham Holdings, Inc., Wayne Taylor
Abstract: Methods, systems, and media for pairing devices for completing tasks are provided. In some embodiments, the method comprises: identifying, at a first user device, an indication of a task to be completed; transmitting, by the first user device to a server, information indicating the task to be completed and identifying information corresponding to the first user device; determining whether a predetermined duration of time has elapsed; in response to determining that the predetermined duration of time has elapsed, transmitting, from the first user device to the server, a request to determine whether the task has been completed by a second user device; and in response to receiving, from the server, an indication that the task has been completed by the second user device, retrieving data corresponding to the task from the server.
Abstract: Methods, systems, and media for transmitting encrypted messages are provided. In some arrangements, the method comprises: generating, using a hardware processor by a first application, a first public key and a first private key corresponding to a first application; transmitting the first public key to a second application; receiving, from the second application, a second public key; encrypting a first message using the second public key corresponding to the second application; generating, by the first application, a third public key and a second private key; transmitting the encrypted message and third public key to the second application; receiving, from the second application, a second message and a fourth public key corresponding to the second application; and decrypting the second message using the second private key.
Abstract: Systems, methods, and media for applying remote data using a biometric signature sample are provided. In some embodiments, systems for applying remote data using a biometric signature sample are provided, the systems comprising: a storage device for storing remote data; at least one hardware processor in communication with the storage device that is configure to: receiving a biometric signature sample; validating the biometric signature sample; receiving the remote data associated with the biometric signature sample from the storage device; applying the remote data; and logging the application of the remote data.
Abstract: System and method for creating an electronic signature containing a captured signature, date and time, physical location address, and unique identifier.