Patents Assigned to DIGITAL GUARDIAN, INC.
  • Publication number: 20210200888
    Abstract: Provided herein are systems and methods of tracing data. A tracing engine may receive, via the user interface, a selection of a target file or an event involving the target file. The tracing engine may generate, responsive to receiving the selection, a trace of first data in the target file to a plurality of file instances in a network each having at least one version of the first data. Each of the plurality of file instances may be related to at least the target file or another of the plurality of file instances via at least one file operation or data operation. The tracing engine may render, via a user interface, the generated trace.
    Type: Application
    Filed: December 31, 2019
    Publication date: July 1, 2021
    Applicant: Digital Guardian, Inc.
    Inventors: Jaimen Dee Hoopes, Christian J. Weibell
  • Patent number: 10929537
    Abstract: The present disclosure pertains to methods and systems for protecting data or other resources from malware. A driver executing in kernel mode of an operating system on a computing device may monitor one or more processes allowed to execute on the computing device. The one or more processes may include a first executing process. The driver may detect an attempt by a first thread of execution of the first executing process to access a protected file. The driver, responsive to the detection may identify a file type of the protected file. The driver, responsive to the identification of the file type, may determine whether the process is in a list of processes allowed for the file type. The drive may, responsive to determination, determine whether to deny or allow the first thread to access the protected file while allowing another thread of the executing process to execute on the computing device.
    Type: Grant
    Filed: July 29, 2016
    Date of Patent: February 23, 2021
    Assignee: Digital Guardian, Inc.
    Inventor: Dwayne A. Carson
  • Publication number: 20210026992
    Abstract: Provided herein are systems and methods for defining and securely sharing objects for use in preventing data breach or exfiltration. Memory may be configured to store a plurality of objects for use in preventing data breach or exfiltration. A validation engine can validate the objects, incorporate into each object an object identifier and a signature, and generate a subset of the objects for use by a first user. The validation engine can store, in the memory, the plurality of objects as a superset of objects corresponding to the generated subset. An evaluation engine may, responsive to identifying that one or more object identifiers and signatures in a received set of objects belong to the subset corresponding to the stored superset, verify whether any object in the received set has been tampered with.
    Type: Application
    Filed: October 12, 2020
    Publication date: January 28, 2021
    Applicant: Digital Guardian, Inc.
    Inventors: Shreemathi Atreya, Niranjan Koduri, Wai Tung Yim, Emanoel Daryoush
  • Publication number: 20200382543
    Abstract: Provided herein are systems and methods for risk tracking. A tracker engine executable on servers may provide, in a user interface, a plurality of categories of locations for files in a networked environment. The tracker engine may identify in the user interface risk categories of the files in each of the categories of the locations. The tracker engine may provide, in the user interface, types of egress points for the files. The tracker engine may generate links between the categories of the locations of the files, the risk categories of the files and the types of egress points for the files. Details about each of the files may be navigable from the user interface via a corresponding category of a location of the file, a corresponding risk category of the file or a corresponding type of egress point for the file.
    Type: Application
    Filed: May 28, 2019
    Publication date: December 3, 2020
    Applicant: Digital Guardian, Inc.
    Inventors: Jaimen Dee Hoopes, Christian J Weibel, Christian Paul Larsen
  • Publication number: 20200379823
    Abstract: Provided herein are systems and methods for multi-event correlation. Receiving a stream of events, each leaf rule engine may detect a plurality of events from the stream that matches a characteristic for the leaf rule engine. Each leaf rule engine may identify, from the plurality of events and within a time window, a group of events that satisfies a condition for the respective leaf rule engine. A root conditions engine may receive a stream of leaf events corresponding to the group of events identified by each leaf rule engine. The root conditions engine may identify, from the received stream of leaf events and within a root time window, a collection of events that satisfies a condition for the root conditions engine. A trigger may execute an action according to the collection of events identified within the root time window.
    Type: Application
    Filed: May 31, 2019
    Publication date: December 3, 2020
    Applicant: Digital Guardian, Inc.
    Inventor: John H. Lehmann
  • Publication number: 20200250300
    Abstract: Provided herein are systems and methods for protecting data from injected malware. In some embodiments, a virtual memory validator may execute in user mode memory space on a computing device. The virtual memory validator may monitor an execution stack of an executing thread of a process. The virtual memory validator may identify a memory address referenced in the execution stack, responsive to the process attempting to access a protected resource. The virtual memory validator may determine that the memory address refers to a memory region that is designated as executable. The virtual memory validator may determine that the memory address is outside memory regions identified in a memory range map. The virtual memory validator may, responsive to the determination, identify the process as a potential malware process.
    Type: Application
    Filed: April 3, 2020
    Publication date: August 6, 2020
    Applicant: Digital Guardian, Inc.
    Inventor: Dwayne A. Carson
  • Patent number: 10614210
    Abstract: Provided herein are systems and methods for protecting data from injected malware. In some embodiments, a virtual memory validator may execute in user mode memory space on a computing device. The virtual memory validator may monitor an execution stack of an executing thread of a process. The virtual memory validator may identify a memory address referenced in the execution stack, responsive to the process attempting to access a protected resource. The virtual memory validator may determine that the memory address refers to a memory region that is designated as executable. The virtual memory validator may determine that the memory address is outside memory regions identified in a memory range map. The virtual memory validator may, responsive to the determination, identify the process as a potential malware process.
    Type: Grant
    Filed: July 29, 2016
    Date of Patent: April 7, 2020
    Assignee: Digital Guardian, Inc.
    Inventor: Dwayne A. Carson
  • Patent number: 10528723
    Abstract: Provided herein are systems and methods for generating policies for a new application using a virtualized environment. Prior to allowing a new application to operate on a host system, the new application may be installed in a virtual environment. A first program execution restrictor of the virtualized environment may determine a set of policies for the new application. The set of policies may allow the new application to add specific program elements during installation and execution in the virtualized environment. The first program execution restrictor may verify an absence of malicious behavior from the new application while the new application executes in the virtualized environment. The new application may be executed on the host system responsive to the verification. The host system may have a second program execution restrictor that applies the set of policies when the new application is allowed to execute on the host system.
    Type: Grant
    Filed: May 18, 2018
    Date of Patent: January 7, 2020
    Assignee: Digital Guardians, Inc.
    Inventor: John C. Fox
  • Publication number: 20180268133
    Abstract: Provided herein are systems and methods for generating policies for a new application using a virtualized environment. Prior to allowing a new application to operate on a host system, the new application may be installed in a virtual environment. A first program execution restrictor of the virtualized environment may determine a set of policies for the new application. The set of policies may allow the new application to add specific program elements during installation and execution in the virtualized environment. The first program execution restrictor may verify an absence of malicious behavior from the new application while the new application executes in the virtualized environment. The new application may be executed on the host system responsive to the verification. The host system may have a second program execution restrictor that applies the set of policies when the new application is allowed to execute on the host system.
    Type: Application
    Filed: May 18, 2018
    Publication date: September 20, 2018
    Applicant: Digital Guardian, Inc.
    Inventor: John C. Fox
  • Patent number: 9977896
    Abstract: Provided herein are systems and methods for generating policies for a new application using a virtualized environment. Prior to allowing a new application to operate on a host system, the new application may be installed in a virtual environment. A first program execution restrictor of the virtualized environment may determine a set of policies for the new application. The set of policies may allow the new application to add specific program elements during installation and execution in the virtualized environment. The first program execution restrictor may verify an absence of malicious behavior from the new application while the new application executes in the virtualized environment. The new application may be executed on the host system responsive to the verification. The host system may have a second program execution restrictor that applies the set of policies when the new application is allowed to execute on the host system.
    Type: Grant
    Filed: October 8, 2015
    Date of Patent: May 22, 2018
    Assignee: DIGITAL GUARDIAN, INC.
    Inventor: John C. Fox
  • Publication number: 20170093925
    Abstract: Systems and methods for enhanced DOM and event mirroring and security in web applications provides an intermediate Master Browser between web content and client devices to improve security and other enhancements.
    Type: Application
    Filed: November 4, 2016
    Publication date: March 30, 2017
    Applicant: Digital Guardian, Inc.
    Inventors: Andrei SHERETOV, Naveen RAMAIAH, Praveen BANOTH, Sunil AGRAWAL
  • Patent number: 9489356
    Abstract: Systems and methods for enhanced DOM and event mirroring and security in web applications provides an intermediate Master Browser between web content and client devices to improve security and other enhancements.
    Type: Grant
    Filed: May 7, 2013
    Date of Patent: November 8, 2016
    Assignee: DIGITAL GUARDIAN, INC.
    Inventors: Andrei Sheretov, Naveen Ramaiah, Praveen Banoth, Sunil Agrawal