SYSTEM AND METHOD FOR PERFORMING VULNERABILITY ASSESSMENT OF A COMPUTER NETWORK

    公开(公告)号:MY191638A

    公开(公告)日:2022-07-05

    申请号:MYPI2018001552

    申请日:2018-09-13

    Applicant: MIMOS BERHAD

    Abstract: The invention provides a system and method for performing vulnerability assessment of a distributed computing network. The system and method may involve extracting vulnerability data from scan results generated by each computer accessible via the network, and then using the extracted vulnerability data to determine if each vulnerability is previously detected. If a vulnerability is previously detected, historical data relating to such vulnerability are retrieved from a database (209), in which the historical data are used to identify whether the vulnerability is detected in a repeated scanning task. The vulnerability data is also analysed if the vulnerability detected in the repeated scanning task still remains unresolved. A penalty will be assigned to the vulnerability that remains unresolved in the repeated scanning task. On the contrary, a time for resolving the vulnerability is computed if it is not previously detected or if it is not detected in the repeated scanning task. (Figure 1)

    A SYSTEM AND METHOD FOR SECURE TRANSACTION LOG FOR SERVER LOGGING

    公开(公告)号:MY175074A

    公开(公告)日:2020-06-04

    申请号:MYPI2013004236

    申请日:2013-11-25

    Applicant: MIMOS BERHAD

    Abstract: Secure transaction log is used as an audit trail mechanism as said secure logging system is a centralized system that logs all application transactions from different servers wherein it provides an authentication method for client to login to the logging system and an authorization method to verify that only registered servers are able to record and view data to or from the storage. The system comprising at least one client platform (102); at least one application platform (104) and at least one storage device (106) having capacity for storing information. The at least one client platform (102) further comprising at least one user token (102a) for identifying user credentials; and at least one physical machine (102c) for processing client transaction while the at least one application platform (104) further comprising log information which at least comprises a set of data containing user credentials, server identity, IP address, server distinguish name and timestamp; and at least one secure transaction web service (104a, 104b) for validating client transaction and processing log data. To enable secure transaction log for server logging, the general methodology of the present invention comprising steps of obtaining user credentials to authenticate client for server logging (202); logging into server for transaction log (204); and enabling viewing of logging information of authorized users to record and view information to or from at least one storage. Further, storage information is protected and secured by using hash function (716) wherein hash function is used for authorization of user (718) to ensure that only validated user is able to log in or retrieve log information to and from said storage.

    A METHOD AND A SYSTEM TO ENSURE A SECURED ONLINE TRANSACTION FOR A DEBIT CARD

    公开(公告)号:MY165285A

    公开(公告)日:2018-03-21

    申请号:MYPI2010005590

    申请日:2010-11-26

    Applicant: MIMOS BERHAD

    Abstract: A METHOD AND A SYSTEM COMPRISING THREE ENTITIES (110,120,130) AND A DEBIT CARD INCORPORATED WITH PKI INFRASTRUCTURE ARE DISCLOSED. THE SYSTEM TO CARRY OUT THE METHOD OF ENSURING A SECURED ONLINE TRANSACTION COMPRISES A FIRST ENTITY (110), A SECOND ENTITY (120) AND A THIRD ENTITY (130). PREFERABLY, THE ENTITIES (110,120,130) REPRESENT A USER OF THE DEBIT CARD, A MERCHANT AND A FINANCIAL INSTITUTION. THE USER MAKES AN ONLINE TRANSACTION (ONLINE PURCHASE) FROM A MERCHANT USING THE DEBIT CARD PROVIDED BY THE FINANCIAL INSTITUTION. BASED ON THE INFORMATION OF THE USER AND THE INFORMATION OF THE MERCHANT RECEIVED BY THE FINANCIAL INSTITUTION, THE USER’S ACCOUNT WILL BE DEDUCTED WITH THE PURCHASE AMOUNT WHILE THE MERCHANT’S ACCOUNT IS CREDITED. THE INFORMATION EXCHANGED BETWEEN THE ENTITIES (110,120,130) IS DIGITALLY SIGNED AND ENCRYPTED TO ENSURE CONFIDENTIALITY. A CONFIRMATION IS SENT TO THE MERCHANT WHO DIRECTS IT TO THE USER TO INFORM THE USER ON THE STATUS OF THE TRANSACTION. THE MOST ILLUSTRATIVE DRAWING:

Patent Agency Ranking