-
公开(公告)号:MY191638A
公开(公告)日:2022-07-05
申请号:MYPI2018001552
申请日:2018-09-13
Applicant: MIMOS BERHAD
Inventor: NOR IZYANI BINTI DAUD , GALOH RASHIDAH BINTI HARON , DR KHAIRUL AZMI BIN ABU BAKAR , DHARMADHARSHNI A/P MANIAM
IPC: G06F21/57
Abstract: The invention provides a system and method for performing vulnerability assessment of a distributed computing network. The system and method may involve extracting vulnerability data from scan results generated by each computer accessible via the network, and then using the extracted vulnerability data to determine if each vulnerability is previously detected. If a vulnerability is previously detected, historical data relating to such vulnerability are retrieved from a database (209), in which the historical data are used to identify whether the vulnerability is detected in a repeated scanning task. The vulnerability data is also analysed if the vulnerability detected in the repeated scanning task still remains unresolved. A penalty will be assigned to the vulnerability that remains unresolved in the repeated scanning task. On the contrary, a time for resolving the vulnerability is computed if it is not previously detected or if it is not detected in the repeated scanning task. (Figure 1)
-
2.
公开(公告)号:MY179915A
公开(公告)日:2020-11-19
申请号:MYPI2014003563
申请日:2014-12-23
Applicant: MIMOS BERHAD
Inventor: GALOH RASHIDAH BINTI HARON , DR KHAIRUL AZMI BIN ABU BAKAR , WONG HON LOON , LATIFAH BINTI MAT NEN , SEA CHONG SEAK
IPC: G06K9/00
Abstract: A method and system that employs physical objects as context aware in assisting face authentication thereby elevating trust level of face authentication and obviating need for additional hardware devices and computing resources that are typically associated with multimodal authentication systems. A camera (102) simultaneously captures an enrolled user's (20) face and at least one physical object pre-determined by the user (20) from his background as information binding user identity for authentication. An authentication result is computed as a combination of scores generated from face recognition and physical object(s) detection.
-
公开(公告)号:MY175074A
公开(公告)日:2020-06-04
申请号:MYPI2013004236
申请日:2013-11-25
Applicant: MIMOS BERHAD
Inventor: SEA CHONG SEAK , NOR IZYANI DAUD , GALOH RASHIDAH BINTI HARON , NG KANG SIONG , DHARMADHARSHNI MANIAM , WONG HON LOON
Abstract: Secure transaction log is used as an audit trail mechanism as said secure logging system is a centralized system that logs all application transactions from different servers wherein it provides an authentication method for client to login to the logging system and an authorization method to verify that only registered servers are able to record and view data to or from the storage. The system comprising at least one client platform (102); at least one application platform (104) and at least one storage device (106) having capacity for storing information. The at least one client platform (102) further comprising at least one user token (102a) for identifying user credentials; and at least one physical machine (102c) for processing client transaction while the at least one application platform (104) further comprising log information which at least comprises a set of data containing user credentials, server identity, IP address, server distinguish name and timestamp; and at least one secure transaction web service (104a, 104b) for validating client transaction and processing log data. To enable secure transaction log for server logging, the general methodology of the present invention comprising steps of obtaining user credentials to authenticate client for server logging (202); logging into server for transaction log (204); and enabling viewing of logging information of authorized users to record and view information to or from at least one storage. Further, storage information is protected and secured by using hash function (716) wherein hash function is used for authorization of user (718) to ensure that only validated user is able to log in or retrieve log information to and from said storage.
-
公开(公告)号:MY165285A
公开(公告)日:2018-03-21
申请号:MYPI2010005590
申请日:2010-11-26
Applicant: MIMOS BERHAD
Inventor: TAN FUI BEE , SEE CHONG SEAK , NG KANG SIONG , GALOH RASHIDAH BINTI HARON
Abstract: A METHOD AND A SYSTEM COMPRISING THREE ENTITIES (110,120,130) AND A DEBIT CARD INCORPORATED WITH PKI INFRASTRUCTURE ARE DISCLOSED. THE SYSTEM TO CARRY OUT THE METHOD OF ENSURING A SECURED ONLINE TRANSACTION COMPRISES A FIRST ENTITY (110), A SECOND ENTITY (120) AND A THIRD ENTITY (130). PREFERABLY, THE ENTITIES (110,120,130) REPRESENT A USER OF THE DEBIT CARD, A MERCHANT AND A FINANCIAL INSTITUTION. THE USER MAKES AN ONLINE TRANSACTION (ONLINE PURCHASE) FROM A MERCHANT USING THE DEBIT CARD PROVIDED BY THE FINANCIAL INSTITUTION. BASED ON THE INFORMATION OF THE USER AND THE INFORMATION OF THE MERCHANT RECEIVED BY THE FINANCIAL INSTITUTION, THE USER’S ACCOUNT WILL BE DEDUCTED WITH THE PURCHASE AMOUNT WHILE THE MERCHANT’S ACCOUNT IS CREDITED. THE INFORMATION EXCHANGED BETWEEN THE ENTITIES (110,120,130) IS DIGITALLY SIGNED AND ENCRYPTED TO ENSURE CONFIDENTIALITY. A CONFIRMATION IS SENT TO THE MERCHANT WHO DIRECTS IT TO THE USER TO INFORM THE USER ON THE STATUS OF THE TRANSACTION. THE MOST ILLUSTRATIVE DRAWING:
-
-
-