Inteum Company
Links
seedsprint
Visible Legacy
RSS
News & Resources
Inteum Company News
Inteum Library
Subscribe
Search Results - patrick+traynor
5
Results
Sort By:
Published Date
Updated Date
Title
ID
Descending
Ascending
Credit Card-Sized Device That Tests for Skimmers in Card Readers
Quickly and Accurately Detects if Card Payment Readers Are Safe to Use Inserting this device into a card reader before you insert your credit card can alert you to the presence of credit card skimmers so you won’t be scammed. Skimmers (and shimmers) are malicious card readers attached to the interior or exterior of the real payment terminal...
Published: 2/21/2022
|
Inventor(s):
Patrick Traynor
,
Christian Peeters
,
Walter Scaife
Keywords(s):
Category(s):
Technology Classifications > Engineering > Electrical
,
Technology Classifications > Others > Security
Ransomware Protection through Data Transformation Monitoring
Anti-Malware System Indicator Automatically Detects Malware Based on User Data Changes This anti-ransomware system indicator monitors an end user?s data to automatically detect malware based on changes to that data. Data breaches occur when sensitive, protected, or confidential data is copied, transmitted, viewed, stolen, or otherwise used by an unauthorized...
Published: 6/27/2021
|
Inventor(s):
Walter Scaife
,
Patrick Traynor
,
Henry Carter
,
Kevin Butler
Keywords(s):
intrusion detection
,
Malware Blocker
,
Malware Intrusion Detection
Category(s):
Technology Classifications > Software > Others
Mobile Phone Security System
Detects SS7 Network Attacks Through Phone Conversations and Alerts Callers in Real TimeThis mobile phone security system detects Signaling System 7 (SS7) redirection attacks during phone calls. SS7 is a global network that links together mobile phones, but unfortunately, hackers can abuse necessary functions of SS7 to reroute phone calls, track locations...
Published: 3/10/2022
|
Inventor(s):
Patrick Traynor
,
Hadi Abdullah
,
Jasmine Bowers
,
Kevin Butler
,
Christian Peeters
,
Bradley Reaves
,
Walter Scaife
Keywords(s):
Security
,
Security Applications
,
SS7
,
telephony
Category(s):
Technology Classifications > Engineering > Computer Science
Efficient Identification and Content Authentication for Phone Calls
Cryptographically Authenticates Phone Calls for Secure Personal and Professional CommunicationsThis application cryptographically verifies the identity of callers to ensure that phone calls are authentic, assuring users that their information is safe. Financial, medical, or other personal information is commonly communicated through phone calls or other...
Published: 6/27/2021
|
Inventor(s):
Patrick Traynor
,
Bradley Reaves
,
Logan Blue
,
Luis Vargas
,
Hadi Abdullah
,
Thomas Shrimpton
Keywords(s):
authentication
,
Caller ID
,
Phone Fraud
Category(s):
Technology Classifications > Engineering > Computer Science
Convenient Caller ID Verification Protocol for All Telephony Networks
AuthLoop Allows Efficient Cryptographic Authentication via Voice ChannelThis caller ID verification system allows efficient authentication through the voice data channel, improving consumer security on phone calls occurring on any combination of available telephony networks. Sensitive information, including banking and credit card account authorizations,...
Published: 6/23/2022
|
Inventor(s):
Patrick Traynor
,
Logan Blue
,
Bradley Reaves
Keywords(s):
authentication
,
cryptography
,
phone
Category(s):
Technology Classifications > Engineering > Computer Science