The Western Union Company
Iterative approaches to data authorization
Last updated:
Abstract:
Embodiments described herein relate generally to network-based threat detection mechanisms. Specifically, embodiments described herein describe a communication mechanism that filters (e.g., allows or blocks) received communications according to an iterative security list.
Status:
Grant
Type:
Utility
Filling date:
9 Mar 2020
Issue date:
7 Jun 2022