Patents Assigned to Chronicle LLC
-
Patent number: 11671445Abstract: In some implementations, a method includes receiving, for each of multiple users, user activity data describing actions taken by the user by use of a user device over a period of time, determining, for each user and based on the actions taken by the user over the period of time and user responsibility data that describe responsibilities of the user, a risk assessment representative of a security risk resulting from the actions taken by the user by use of the user device, and determining, by the data processing apparatus, for each user and based on the risk assessment determined for the user, whether to implement a user-specific remedial action directed to risk mitigation.Type: GrantFiled: January 18, 2022Date of Patent: June 6, 2023Assignee: Chronicle LLCInventors: Carey Stover Nachenberg, Maxime Lamothe-Brassard, Svetla Yankova Yankova
-
Patent number: 11632378Abstract: In some implementations, a method includes receiving, by a malware detection system, a request for a certification user interface element for a file to be served in an Internet resource, wherein the file is a file that has previously been classified as not containing malware by the malware detection system, and wherein the certification user interface element certifies that the file has been classified by the malware detection system as not containing malware, determining, based on the request, that the file is available for download from an Internet resource, and storing data that identifies the Internet resource as a location where a malware-free file is available for download.Type: GrantFiled: July 23, 2020Date of Patent: April 18, 2023Assignee: Chronicle LLCInventor: Emiliano Martinez Contreras
-
Patent number: 11520851Abstract: In some implementations, a method includes logging, by a user device, mapping data that maps domain names of Internet resources presented on the user device to Internet Protocol (IP) addresses of the Internet resources, determining, by the user device, that one or more criteria are satisfied for transmitting the mapping data to a passive Domain Name Service (DNS) system, and in response to determining that the one or more criteria are satisfied, transmitting, by the user device, the mapping data to the passive DNS system.Type: GrantFiled: March 1, 2021Date of Patent: December 6, 2022Assignee: Chronicle LLCInventor: Emiliano Martinez Contreras
-
Patent number: 11367009Abstract: In some implementations, a method includes obtaining an unlabeled computer security data log and processing the unlabeled computer security data log using a machine learning model to generate a probability distribution that includes a respective probability for each of a plurality of possible log types. Each of the plurality of possible log types is associated with a corresponding parser that parses logs of the possible log type to extract structured computer security data. The method further includes selecting the possible log type having the highest probability and parsing the unlabeled computer security data log using the parser corresponding to the selected possible log type.Type: GrantFiled: July 22, 2019Date of Patent: June 21, 2022Assignee: Chronicle LLCInventors: Abu Wawda, Shapor Naghibzadeh
-
Patent number: 11265344Abstract: In some implementations, a method includes receiving, for each of multiple users, user activity data describing actions taken by the user by use of a user device over a period of time, determining, for each user and based on the actions taken by the user over the period of time and user responsibility data that describe responsibilities of the user, a risk assessment representative of a security risk resulting from the actions taken by the user by use of the user device, and determining, by the data processing apparatus, for each user and based on the risk assessment determined for the user, whether to implement a user-specific remedial action directed to risk mitigation.Type: GrantFiled: January 22, 2020Date of Patent: March 1, 2022Assignee: Chronicle LLCInventors: Carey Stover Nachenberg, Maxime Lamothe-Brassard, Svetla Yankova Yankova
-
Patent number: 11159550Abstract: Methods, systems, and apparatus, including computer programs encoded on computer storage media, for correcting timestamps in computer security telemetry data. A method includes: receiving, at a computer network security data analysis system, first log data identifying a plurality of first events occurring on a computer network, the first log data including, for each first event, a respective first timestamp identifying when the first event occurred, the first timestamp including a first hour value, a first minute value, and a first second value; and generating first modified log data, the first modified log data including, for each first event, a first modified timestamp including the first minute value and the first second value from the log data and a first modified hour value that represents an hour value from a current time at which the first log data was received at the computer network security data analysis system.Type: GrantFiled: March 1, 2019Date of Patent: October 26, 2021Assignee: Chronicle LLCInventors: Abu Wawda, Tushar Dhoot, Kai Boon Ee, Charles Stephen Spirakis, Tali Leora Eban
-
Patent number: 11093607Abstract: The subject matter of this specification generally relates to computer security. In some implementations, a method includes maintaining a first data structure that stores arrays of identifier tuples. Each identifier tuple corresponds to a respective computer security event and includes one or more identifiers for a computing element associated with the computer security event. Each array of identifier tuples corresponds to a respective identifier and only includes identifier tuples that include the corresponding identifier. A second data structure that stores arrays of computer security data is maintained. Each array of computer security data corresponds to a respective identifier tuple stored in the first data structure and only includes computer security data associated with each identifier in the corresponding identifier tuple. A query that specifies a first identifier for a first computing element is received.Type: GrantFiled: August 2, 2018Date of Patent: August 17, 2021Assignee: Chronicle LLCInventors: Carey Stover Nachenberg, William S. Robinson, Shapor Naghibzadeh, Michael Wiacek, Abu Wawda
-
Patent number: 10958534Abstract: Methods, systems, and apparatus, including computer programs encoded on computer storage media, for surfacing anomalous network activity on a user interface. An example method provides, for presentation on a user device, a user interface for analyzing network traffic from a customer network. The user interface is populated with network traffic data from the customer network for display to the user. An interactive first filter that is configurable for filtering network traffic based on prevalence of the destination domains of the network traffic is displayed to the user. A first user input configuring the first filter to a first prevalence value is received. In response, the network traffic data is filtered in the user interface to only include network traffic data that has a destination domain that is less prevalent than the first prevalence value.Type: GrantFiled: October 24, 2017Date of Patent: March 23, 2021Assignee: Chronicle LLCInventors: Bernardo Malta Leite Telles, Shapor Naghibzadeh, Carey Stover Nachenberg
-
Patent number: 10936696Abstract: In some implementations, a method includes logging, by a user device, mapping data that maps domain names of Internet resources presented on the user device to Internet Protocol (IP) addresses of the Internet resources, determining, by the user device, that one or more criteria are satisfied for transmitting the mapping data to a passive Domain Name Service (DNS) system, and in response to determining that the one or more criteria are satisfied, transmitting, by the user device, the mapping data to the passive DNS system.Type: GrantFiled: June 29, 2018Date of Patent: March 2, 2021Assignee: Chronicle LLCInventor: Emiliano Martinez Contreras
-
Patent number: 10839071Abstract: Methods, systems, and apparatus, including computer programs encoded on computer storage media, for analyzing telemetry to detect anomalous activity. One of the methods includes accessing data describing a telemetry tree that includes a plurality of nodes and edges; querying, for each of the edges in the telemetry tree using at least one value for the edge from a number of values, historical telemetry data that quantifies an anomaly score for each value to determine whether a relationship indicated by the edge in the telemetry tree represents a potentially malicious relationship; and performing an action using a result of the querying of the historical telemetry data that indicates whether one of the anomaly scores indicates that the relationship indicated by the edge in the telemetry tree represents a potentially malicious relationship.Type: GrantFiled: September 18, 2019Date of Patent: November 17, 2020Assignee: Chronicle LLCInventor: Maxime Lamothe-Brassard
-
Patent number: 10757115Abstract: In some implementations, a method includes receiving, by a malware detection system, a request for a certification user interface element for a file to be served in an Internet resource, wherein the file is a file that has previously been classified as not containing malware by the malware detection system, and wherein the certification user interface element certifies that the file has been classified by the malware detection system as not containing malware, determining, based on the request, that the file is available for download from an Internet resource, and storing data that identifies the Internet resource as a location where a malware-free file is available for download.Type: GrantFiled: June 29, 2018Date of Patent: August 25, 2020Assignee: Chronicle LLCInventor: Emiliano Martinez Contreras
-
Patent number: 10581896Abstract: In some implementations, a method includes receiving, for each of multiple users, user activity data describing actions taken by the user by use of a user device over a period of time, determining, for each user and based on the actions taken by the user over the period of time and user responsibility data that describe responsibilities of the user, a risk assessment representative of a security risk resulting from the actions taken by the user by use of the user device, and determining, by the data processing apparatus, for each user and based on the risk assessment determined for the user, whether to implement a user-specific remedial action directed to risk mitigation.Type: GrantFiled: March 8, 2017Date of Patent: March 3, 2020Assignee: Chronicle LLCInventors: Carey Stover Nachenberg, Maxime Lamothe-Brassard, Svetla Yankova Yankova
-
Patent number: 10503896Abstract: The subject matter of this specification generally relates to data security. In some implementations, a method includes receiving, from data owners, a first cryptographically secure representation of data to be monitored for data breaches. Each first cryptographically secure representation can include a cryptographically secure data structure that represents a plurality of first data records maintained by the data owner. One or more second cryptographically secure representations of second data records are received from a user. A number of the second cryptographically secure representations that match a corresponding portion of the first cryptographically secure representation received from a data owner is determined. A determination is made that a data breach occurred for the data owner based on the number of the second cryptographically secure representations that match the corresponding portion of the first cryptographically secure representation received from the data owner.Type: GrantFiled: March 17, 2017Date of Patent: December 10, 2019Assignee: Chronicle LLCInventors: Carey Stover Nachenberg, Stephen Gillett
-
Patent number: 10469509Abstract: The subject matter of this specification generally relates to computer security. In some implementations, a method includes receiving indicators of compromise from multiple security data providers. Each indicator of compromise can include data specifying one or more characteristics of one or more computer security threats. Each indicator of compromise can be configured to, when processed by a computer, cause the computer to detect the presence of the specified one or more characteristics of the one or more computer security threats. Telemetry data for computing systems of users can be received. The telemetry data can include data describing at least one event detected at the computing system. A determination is made that the telemetry data for a given user includes the one or more characteristics specified by a given indicator of compromise.Type: GrantFiled: December 29, 2016Date of Patent: November 5, 2019Assignee: Chronicle LLCInventors: Carey Stover Nachenberg, Maxime Lamothe-Brassard, Shapor Naghibzadeh
-
Patent number: 10430581Abstract: Methods, systems, and apparatus, including computer programs encoded on computer storage media, for analyzing telemetry to detect anomalous activity. One of the methods includes accessing data describing a telemetry tree that includes a plurality of nodes and edges; querying, for each of the edges in the telemetry tree using at least one value for the edge from a number of values, historical telemetry data that quantifies an anomaly score for each value to determine whether a relationship indicated by the edge in the telemetry tree represents a potentially malicious relationship; and performing an action using a result of the querying of the historical telemetry data that indicates whether one of the anomaly scores indicates that the relationship indicated by the edge in the telemetry tree represents a potentially malicious relationship.Type: GrantFiled: December 22, 2016Date of Patent: October 1, 2019Assignee: Chronicle LLCInventor: Maxime Lamothe-Brassard
-
Patent number: 10284535Abstract: Methods, systems, and apparatus, including a system that includes a secure hardware unit; and a database system including one or more processors; and a computer-readable medium having stored instructions that, when executed by the one or more processors, cause the one or more processors to perform operations including: receiving a client request to perform a database operation using first encrypted data as an encrypted value of a field to be operated on by the database operation, where the first encrypted data has been encrypted by a database client using a first encryption key; providing, to the secure hardware unit, a system request for performing one or more data processing operations, the system request including (i) the first encrypted data and (ii) data identifying the first encryption key; and receiving, from the secure hardware unit, output data representing an output of the one or more data processing operations.Type: GrantFiled: December 13, 2016Date of Patent: May 7, 2019Assignee: Chronicle LLCInventor: Carey Stover Nachenberg