The Western Union Company
ITERATIVE APPROACHES TO DATA AUTHORIZATION

Last updated:

Abstract:

Embodiments described herein relate generally to network-based threat detection mechanisms. Specifically, embodiments described herein describe a communication mechanism that filters (e.g., allows or blocks) received communications according to an iterative security list.

Status:
Application
Type:

Utility

Filling date:

9 Mar 2020

Issue date:

9 Sep 2021