Patents Assigned to Code 42 Software, Inc.
  • Patent number: 11822514
    Abstract: A system for forensic file services is configured to receive data indicative of operations executed on a filesystem element stored on a computing resource associated with a first tenant, to and adjust the data according to an indicated database schema. The system is also configured to store the adjusted data in a record of a partition of a database, where the partition configured to store a history of operations executed on filesystem elements of computing resources associated with the first tenant. The system is further configured to receive a search request to search the database and to execute the search request on a second partition of the database to identify one or more matching records. The system is additionally configured to provide the identified records in response to the search request.
    Type: Grant
    Filed: March 21, 2019
    Date of Patent: November 21, 2023
    Assignee: Code42 Software, Inc.
    Inventors: Christopher Michael Montgomery, Peter John Lindquist, Brent Aethon McCullough, Vijay Ramanathan, Daniel Louis Sullivan
  • Patent number: 11799886
    Abstract: Systems and techniques for detecting suspicious file activity are described herein. System for identifying anomalous data events is adapted to monitor a networked file system and receive an indication of a suspicious event associated with a user and a file. The system is further adapted to perform a pattern of behavior analysis for the user, perform an adjacency by time analysis based on a set of events before the suspicious event and a set of events after the suspicious event, and perform an adjacency by location analysis using a set of files located in a location of the file. The system is further adapted to determine whether the suspicious event is an anomalous event based on the pattern of behavior analysis, the adjacency by time analysis, and the adjacency by location analysis and display a report for the user including the anomalous event.
    Type: Grant
    Filed: January 10, 2023
    Date of Patent: October 24, 2023
    Assignee: Code42 Software, Inc.
    Inventor: Peter John Lindquist
  • Patent number: 11720702
    Abstract: Disclosed in some examples are methods, systems, and machine readable mediums for applications that detect indicators of data exfiltration through applications such as browser-based interfaces. The disclosed system monitors file system element events related to one or more target applications (such as browsers) through operating system interfaces. Once an event of interest is detected, the system interfaces with the browser to determine a context for the event of interest that may include a URL of a website that the user was visiting corresponding to the file system element event. If the URL is directed towards a prohibited site, a notification may be generated that may be used as a signal to alert an administrator. As used herein, a file system element may include a file, directory, folder, archive, blob, raw storage, metadata, or the like File system element events may include copying, deleting, modifying, or moving a file system element.
    Type: Grant
    Filed: April 28, 2021
    Date of Patent: August 8, 2023
    Assignee: Code42 Software, Inc.
    Inventors: Rob Juncker, Neil Kulevsky, Andrew Moravec, James Sablatura, Shane Zako
  • Patent number: 11671435
    Abstract: A system for detecting anomalous user interactions with a computing resource a processor and a memory communicatively coupled to the processor and configured with instructions, which cause the processor to perform operations including receiving a request to monitor interactions of a user with the computing resource, obtaining first event data first event data that includes information that is indicative of first interactions of the user with the computing resource prior to receiving the request and obtaining second event data that includes information that is indicative of second interactions of the user with the computing resource after receiving the request. The operations further include determining, based on the first event data and the second event data, whether a deviation between the first interactions and the second interactions satisfies an indicated criteria. The operations additionally include generating a security alert based on the determination.
    Type: Grant
    Filed: January 2, 2020
    Date of Patent: June 6, 2023
    Assignee: Code42 Software, Inc.
    Inventors: Daniel Louis Sullivan, Rob Juncker, Danaca Booth
  • Patent number: 11611571
    Abstract: Systems and techniques for detecting suspicious file activity are described herein. System for identifying anomalous data events is adapted to monitor a networked file system and receive an indication of a suspicious event associated with a user and a file. The system is further adapted to perform a pattern of behavior analysis for the user, perform an adjacency by time analysis based on a set of events before the suspicious event and a set of events after the suspicious event, and perform an adjacency by location analysis using a set of files located in a location of the file. The system is further adapted to determine whether the suspicious event is an anomalous event based on the pattern of behavior analysis, the adjacency by time analysis, and the adjacency by location analysis and display a report for the user including the anomalous event.
    Type: Grant
    Filed: September 3, 2019
    Date of Patent: March 21, 2023
    Assignee: Code42 Software, Inc.
    Inventor: Peter John Lindquist
  • Patent number: 11611574
    Abstract: Disclosed in some examples are systems, methods, and machine readable mediums for identifying insider threats by determining file system element activity models that correlate to undesirable behavior and then utilizing the determined model to detect insider threats. Events involving file system elements of a client computing device (e.g., a network endpoint) may be monitored by a file system element monitoring application on the client computing device. The values of these signals are aggregated across all events of the same type that have occurred within a predetermined time window (e.g., an hour) for a particular client computing device. Each time an aggregated signal has a value over the threshold, an anomaly is recorded. Anomaly counts for each signal are then calculated as the aggregate number of anomalies for a particular signal over a second time period, the span of which is determined by the generation of first anomaly to the close of an alert by the network monitor.
    Type: Grant
    Filed: August 2, 2017
    Date of Patent: March 21, 2023
    Assignee: Code42 Software, Inc.
    Inventors: Ajaykumar Rajasekharan, Matthew Mills Parker, Daniel L. Sullivan
  • Patent number: 11604698
    Abstract: A system for processing a file stored on a computing system includes causing a processor of the system to obtain file usage data that is indicative of a number of times the file is loaded into a memory of the system and to obtain file-size data that is indicative of a size the file. The system further includes causing the processor to obtain metadata indicative of contents the file and to determine a file value based on the file usage data and at least one of the file-size data, the metadata, or a file-identifier value that is derived from an identifier of the file, where the file value comprising a quantitative or qualitative indicator of a value of the file. The system additionally includes causing the processor to adjust processing of the file relative to processing of other files associated with the computing system based on the file value.
    Type: Grant
    Filed: December 2, 2020
    Date of Patent: March 14, 2023
    Assignee: Code42 Software, Inc.
    Inventors: Robert Juncker, Thomas Anthony Lindquist, Michael Woodfill, Adam Nave
  • Patent number: 11526506
    Abstract: A system a module that is configured to cause a processor to obtain a set of file references that are configured to access files associated with a first computing system, where the set of file references include a references to the target file and one or more source files. The module is further configured to cause the processor to retrieve the target file and the one or more source files and to partition the target file and the one or more source files into respective first set of tokens and second set of tokens. The module is further configured to cause the processor to identify, based on the first set of tokens and the second set of tokens, at least one source file of the one or more source files that contain a threshold quantity of tokens of the target file.
    Type: Grant
    Filed: May 14, 2020
    Date of Patent: December 13, 2022
    Assignee: Code42 Software, Inc.
    Inventor: Boris Sandler
  • Patent number: 11436279
    Abstract: System and techniques for dynamically building a file graph are described herein. Meta data is received for a first and a second file. An intersection of the first metadata set and the second metadata set is computed. An edge in a file graph is created based on the intersection. Then, after receiving a query about the first file, the second file is provided as a result to the query based on the edge in the file graph.
    Type: Grant
    Filed: November 9, 2018
    Date of Patent: September 6, 2022
    Assignee: Code42 Software, Inc.
    Inventor: Andrew Moravec
  • Patent number: 11372989
    Abstract: Systems and techniques for an automatic graph-based detection of unlikely file possession are described herein. In an example, a system for detecting unauthorized file possession is adapted to generate a networked computing environment graph for files and the devices which store the files. The detection system may be further adapted to identify a file in question and a device in question that is in possession of the file in question. The detection system may be further adapted to generate a set of connection paths from the device in question to the file in question based upon the edges of the graph. The detection system may be further adapted to determine the device in question should not have possession of the file in question based on a set of metrics derived from the connection paths. The detection system may be further adapted to generate an alert based on the determination.
    Type: Grant
    Filed: October 29, 2020
    Date of Patent: June 28, 2022
    Assignee: Code 42 Software, Inc.
    Inventor: Matthew Mills Parker
  • Patent number: 11270022
    Abstract: Systems and techniques for sensitive data movement detection are described herein. An attempt to relocate a file that is a member of a monitored data set may be identified. A user account associated with the attempt to relocate the file may be determined. A safe user group may be identified for the user account associated with the attempt to relocate the file. A destination may be obtained for the attempt to relocate the file. A safe zone may be determined for the monitored data set using the user account and the identification of the monitored data set. A notification may be provided based on the destination for the attempt to relocate the file and the safe user group and the safe zone.
    Type: Grant
    Filed: November 16, 2018
    Date of Patent: March 8, 2022
    Assignee: Code 42 Software, Inc.
    Inventor: Scott Straw
  • Patent number: 11074228
    Abstract: Systems and techniques for three-dimensional file event representation are described herein. File event data may be obtained for a file for a time segment. The file event data may include a file system hierarchy for the file. A spatial file operation map may be generated for the file system hierarchy including a file operation map for the file for the time segment. The file operation map for the file may include a plurality of layers with each layer of the plurality of layers representing a file operation class available for the file. It may be determined that a file operation was performed on the file during the time segment based on the file event data. An indication may be generated on a layer of the plurality layers of the file operation map that the file operation was performed. The layer corresponds to a file operation class of the file operation.
    Type: Grant
    Filed: March 22, 2019
    Date of Patent: July 27, 2021
    Assignee: Code 42 Software, Inc.
    Inventors: Thomas Florin, Thomas Anthony Lindquist, David Gibbens
  • Patent number: 10824749
    Abstract: Systems and techniques for an automatic graph-based detection of unlikely file possession are described herein. In an example, a system for detecting unauthorized file possession is adapted to generate a networked computing environment graph for files and the devices which store the files. The detection system may be further adapted to identify a file in question and a device in question that is in possession of the file in question. The detection system may be further adapted to generate a set of connection paths from the device in question to the file in question based upon the edges of the graph. The detection system may be further adapted to determine the device in question should not have possession of the file in question based on a set of metrics derived from the connection paths. The detection system may be further adapted to generate an alert based on the determination.
    Type: Grant
    Filed: September 28, 2018
    Date of Patent: November 3, 2020
    Assignee: Code 42 Software, Inc.
    Inventor: Matthew Mills Parker
  • Patent number: 10496610
    Abstract: Disclosed in some examples are methods, systems, and machine readable mediums which provide for encrypted file system element containers which secure sensitive file system elements. The encrypted file system element containers are sent from a network based file storage system upon selection of file system elements for a network based file download and stored in a user's computing device in an encrypted state while the data is at rest. An application on the user's computing device may provide access to the file system elements (e.g., files, directories, and the like) inside the encrypted file system element containers according to a set of one or more access rules. Example access rules include a time-to-live (TTL) rule that deletes or causes the encrypted file system element containers to be inaccessible after a predetermined amount of time.
    Type: Grant
    Filed: March 7, 2017
    Date of Patent: December 3, 2019
    Assignee: Code 42 Software, Inc.
    Inventors: Rick Scott Orloff, Thomas Anthony Lindquist
  • Patent number: 10437791
    Abstract: Disclosed in some examples are methods, systems, and machine readable mediums which monitor, archive, and version file system elements stored in one or more different network based file storage systems for one or more different users. Any changes to file system elements stored in the network based file storage systems are recorded and versioned. The system may allow users to revert to a previous version of a file system element, recover a deleted file system element, and the system allows for audits to determine which users placed a file system element in which network based file storage systems and determine which users had access to the file system element in the network based file storage systems. As a result, the disclosed system improves the end-user experience by providing versioning and auditing capabilities as well as allowing organizations to monitor and control their digital property in network based file storage systems.
    Type: Grant
    Filed: February 9, 2016
    Date of Patent: October 8, 2019
    Assignee: Code 42 Software, Inc.
    Inventors: Bradley Bebchuk, Peter Clark, Jeffrey Howie, Marc Everett Johnson, Samuel Lindsay-Levine, Erik Mainz, Peter Lindquist, Mitch Coopet
  • Patent number: 10423496
    Abstract: In connection with a data distribution architecture, client-side “deduplication” techniques may be utilized for data transfers occurring among various file system nodes. In some examples, these deduplication techniques involve fingerprinting file system elements that are being shared and transferred, and dividing each file into separate units referred to as “blocks” or “chunks.” These separate units may be used for independently rebuilding a file from local and remote collections, storage locations, or sources. The deduplication techniques may be applied to data transfers to prevent unnecessary data transfers, and to reduce the amount of bandwidth, processing power, and memory used to synchronize and transfer data among the file system nodes. The described deduplication concepts may also be applied for purposes of efficient file replication, data transfers, and file system events occurring within and among networks and file system nodes.
    Type: Grant
    Filed: February 1, 2018
    Date of Patent: September 24, 2019
    Assignee: Code 42 Software, Inc.
    Inventors: Matthew Dornquast, Brian Bispala, Damon Allison, Brad Armstrong, Marshall Scorcio, Rory Lonergan, Peter Lindquist, Christopher Parker
  • Patent number: 9916206
    Abstract: In connection with a data distribution architecture, client-side “deduplication” techniques may be utilized for data transfers occurring among various file system nodes. In some examples, these deduplication techniques involve fingerprinting file system elements that are being shared and transferred, and dividing each file into separate units referred to as “blocks” or “chunks.” These separate units may be used for independently rebuilding a file from local and remote collections, storage locations, or sources. The deduplication techniques may be applied to data transfers to prevent unnecessary data transfers, and to reduce the amount of bandwidth, processing power, and memory used to synchronize and transfer data among the file system nodes. The described deduplication concepts may also be applied for purposes of efficient file replication, data transfers, and file system events occurring within and among networks and file system nodes.
    Type: Grant
    Filed: December 31, 2014
    Date of Patent: March 13, 2018
    Assignee: Code 42 Software, Inc.
    Inventors: Matthew Dornquast, Brian Bispala, Damon Allison, Brad Armstrong, Marshall Scorcio, Rory Lonergan, Peter Lindquist, Christopher Parker
  • Patent number: 9904604
    Abstract: Systems and techniques for a distributed file system element collection are described herein. A node may identify a state of a file system element, which is identified in a file system element definition, from a local data store. The state corresponds to a distribution action. The file system element definition is one of a plurality of file system element definitions in a collection schema of a collection to which the node is a member. The node may, in response to identifying the state of the file system element, issue a communication to some members of the collection in furtherance of completion of the distribution action. A response may be received by the node from a participant node in the list of participant nodes. The node may complete the distribution action using content from the response.
    Type: Grant
    Filed: December 31, 2014
    Date of Patent: February 27, 2018
    Assignee: Code 42 Software, Inc.
    Inventors: Matthew Dornquast, Brian Bispala, Marshall Scorcio, Brad Armstrong, Peter Lindquist, Christopher Parker
  • Patent number: 9727423
    Abstract: Disclosed in some examples are predictive storage techniques for use in a distributed data system. The predictive storage techniques may be used to manage locally stored elements of a shared data collection, such as the storage of files on nodes of the distributed data system that are limited in local storage space. The predictive storage techniques may achieve a balance between consumption of local resources and timely access of important elements in the shared data collection. For example, the predictive storage techniques may be used for keeping or pre-caching certain items of a collection that are determined as likely to be used in local storage for convenient access, and allowing access the remaining items on request over a network.
    Type: Grant
    Filed: December 31, 2014
    Date of Patent: August 8, 2017
    Assignee: Code 42 Software, Inc.
    Inventors: Matthew Dornquast, Brian Bispala, Samuel Schroeder, Christopher Gwinn, Justin Grammens, Thomas (Tony) Lindquist, Peter Lindquist
  • Publication number: 20160092312
    Abstract: In connection with a data distribution architecture, client-side “deduplication” techniques may be utilized for data transfers occurring among various file system nodes. In some examples, these deduplication techniques involve fingerprinting file system elements that are being shared and transferred, and dividing each file into separate units referred to as “blocks” or “chunks.” These separate units may be used for independently rebuilding a file from local and remote collections, storage locations, or sources. The deduplication techniques may be applied to data transfers to prevent unnecessary data transfers, and to reduce the amount of bandwidth, processing power, and memory used to synchronize and transfer data among the file system nodes. The described deduplication concepts may also be applied for purposes of efficient file replication, data transfers, and file system events occurring within and among networks and file system nodes.
    Type: Application
    Filed: December 31, 2014
    Publication date: March 31, 2016
    Applicant: Code 42 Software, Inc.
    Inventors: Matthew Dornquast, Brian Bispala, Damon Allison, Brad Armstrong, Marshall Scorcio, Rory Lonergan, Peter Lindquist, Christopher Parker