Patents Assigned to TrustWave Holdings, Inc.
  • Patent number: 10785253
    Abstract: Methods, systems, and apparatus for use in a distributed client-side user monitoring and attack system are disclosed herein. An example method includes providing a first set of instructions from a security application server to a target application server, the first set of instructions to, when executed, cause a client device to transmit a request for an image to the security application server. In response to the request for the image, a connection is opened between the client device and the security application server. Via the connection opened in response to the request for the image, a second set of instructions is provided to cause the client device to perform a vulnerability test on the target application server and communicate a result of the vulnerability test via the connection.
    Type: Grant
    Filed: February 4, 2019
    Date of Patent: September 22, 2020
    Assignee: Trustwave Holdings Inc
    Inventors: Tyler Rorabaugh, Quoc Quach, Matthew Batema, Jim Hong, Scott Parcel
  • Patent number: 10498722
    Abstract: Methods, apparatus, systems and articles of manufacture to issue digital certificates are disclosed. An example apparatus includes a certificate issuer to communicate, from a first entity, a digital certificate to be signed with a request for identifiers, and a value receiver to receive, at the first entity, a first value uniquely identifying a second value from a second entity and, after a period for accepting identifiers has ended, receiving, at the first entity, the second value from the second entity, the certificate issuer to combine, at the first entity, the second value and a third value to generate a certificate identifier for the digital certificate and to issue the digital certificate with the certificate identifier.
    Type: Grant
    Filed: February 27, 2017
    Date of Patent: December 3, 2019
    Assignee: Trustwave Holdings Inc.
    Inventor: Timothy John Hollebeek
  • Patent number: 10200398
    Abstract: Methods, systems, and apparatus for use in a distributed client-side user monitoring and attack system are disclosed herein. An example method includes providing a first set of instructions from a security application server to a target application server, the first set of instructions to, when executed, cause a client device to transmit a request for an image to the security application server. In response to the request for the image, a connection is opened between the client device and the security application server. Via the connection opened in response to the request for the image, a second set of instructions is provided to cause the client device to perform a vulnerability test on the target application server and communicate a result of the vulnerability test via the connection.
    Type: Grant
    Filed: September 22, 2017
    Date of Patent: February 5, 2019
    Assignee: Trustwave Holdings, Inc.
    Inventors: Tyler Rorabaugh, Quoc Quach, Matthew Batema, Jim Hong, Scott Parcel
  • Patent number: 10121005
    Abstract: Virus detection by executing electronic message code in a virtual machine is disclosed. An example method includes detecting that an electronic message includes executable code, the electronic message designating a destination recipient. Two or more destination computing systems are identified for the electronic message corresponding to the destination recipient specified in the electronic message prior to delivery of the electronic message to the two or more destination computing systems, the two or more destination computing systems including a first destination computing system and a second destination computing system different from the first destination computing system. Two or more simulation environments corresponding to the two or more destination computing systems are identified. The executable code is executed in the two or more simulation environments. The two or more simulation environments are monitored for a malicious action.
    Type: Grant
    Filed: May 15, 2017
    Date of Patent: November 6, 2018
    Assignee: TRUSTWAVE HOLDINGS, INC
    Inventors: Walter L. Marsden, David L. Green
  • Patent number: 9992014
    Abstract: Methods for cryptographic delegation and enforcement of dynamic access to stored data are disclosed. An example method includes generating for a first modified data block, a new per-block hash value using as a hash function input data contained in the first modified data block or a new per-block hash message authentication code (HMAC) using as hash function inputs a new per-block hash key and data contained in the first modified data block, writing the new per-block hash value or the new per-block HMAC to data block metadata associated with the modified data block in the protected data object, and writing the first modified data block to one of the data blocks of the protected data object.
    Type: Grant
    Filed: January 30, 2017
    Date of Patent: June 5, 2018
    Assignee: TRUSTWAVE HOLDINGS, INC.
    Inventors: John Patrick McGregor, Jr., Matthew N. White
  • Patent number: 9774617
    Abstract: An embodiment invention provides a new way of creating a distributed client side user monitoring and attack system for use within the security market. In one embodiment of the invention, a distributed client side user monitoring and attack system, includes: a security application server; a target application server; a target application; and a first code in the target application to permit backchannel communications with the security application server.
    Type: Grant
    Filed: October 15, 2013
    Date of Patent: September 26, 2017
    Assignee: Trustwave Holdings, Inc.
    Inventors: Tyler Rorabaugh, Quoc Quach, Matthew Batema, Jim Hong, Scott Parcel
  • Patent number: 9667589
    Abstract: A system and method for managing logical and physical address state lifecycles. A state of unknown can be assigned to an address when the state has not been assigned. The state of the address is changed when communication is targeted to the address. The state can be changed to unfulfilled when the communication includes an address resolution protocol request sent to a device having the address when a time limit for a response to the address resolution protocol request has not expired. The state can be changed to virtual when the communication is received at the address when the state of the address is unfulfilled, and a time limit for responding to the communication expires before a response is sent. The state can be changed to unknown when the state of the address is not unknown, and the address does not participate in the communication within a time limit.
    Type: Grant
    Filed: September 4, 2012
    Date of Patent: May 30, 2017
    Assignee: TRUSTWAVE HOLDINGS, INC.
    Inventors: Mark L. Wilkinson, Ronald J. Miller, Michael J. McDaniels
  • Patent number: 9652613
    Abstract: An intermediary isolation server receives electronic messages and isolates any viral behavior from harming its intended destination. After the intermediary receives an electronic message, it determines that the electronic message has associated executable code, and then identifies the environment in which the electronic message code would be executed if delivered. The intermediary then executes the code by emulating how it would be executed in its ultimate environment. If a viral-like behavior is detected, appropriate action is taken to prevent the execution of the code at its intended destination. The attachment is executed in a contained environment that allows for the contained environment to be easily restarted in a clean state.
    Type: Grant
    Filed: April 30, 2008
    Date of Patent: May 16, 2017
    Assignee: Trustwave Holdings, Inc.
    Inventors: Walter L. Marsden, David E. Green
  • Patent number: 9619651
    Abstract: A method of testing a target in a network by fault injection, includes: defining a transaction baseline; modifying at least one of an order and a structure of the transaction baseline to obtain a modified transaction with malformed grammar; and transmitting the modified transaction to a target. The method may further include, receiving a feedback from the target to determine fault occurrence. An apparatus for testing a target in a network by fault injection, includes: a driver configured to generate patterns, where a pattern can generate a plurality of packets for transmission to the target, the pattern being represented by an expression with a literal string and a wild character class; and a network interface coupled to the driver and configured to transmit and receive network traffic.
    Type: Grant
    Filed: November 4, 2009
    Date of Patent: April 11, 2017
    Assignee: TRUSTWAVE HOLDINGS, INC.
    Inventors: Penny C. Leavy, Michael Gregory Hoglund, Jonathan Walter Gary, Riley Dennis Eller
  • Patent number: 9559837
    Abstract: Efficient methods for assigning, revoking, and realizing access to stored data involve a cryptographic key hierarchy and a set of operations performed on cryptographic keys and performed on the data objects to be protected. In addition to providing confidentiality and integrity for data objects, the methods allow access to selected data objects to be permanently revoked for all entities without requiring all instances of the data objects to be destroyed or overwritten. The methods also support access right modifications for a data object without requiring the re-encryption of the entire data object; instead, certain keys are selectively re-encrypted and re-authenticated to implement access control changes. The key hierarchy is parameterized to enable flexible performance tuning, and to provide efficient random access, keying and other security operations are performed for individual blocks within a data object rather than only for the entire data object.
    Type: Grant
    Filed: September 5, 2014
    Date of Patent: January 31, 2017
    Assignee: TRUSTWAVE HOLDINGS, INC.
    Inventors: John Patrick McGregor, Matthew N. White
  • Patent number: 9544324
    Abstract: In an embodiment of the invention, a system for assessing vulnerabilities includes: a security management system; a network device in a system under test (SUT), wherein the network device is privy to traffic in the SUT; and wherein the SMS is privy to traffic that is known by the network device and/or to one or more traffic observations that is known by the network device.
    Type: Grant
    Filed: March 5, 2013
    Date of Patent: January 10, 2017
    Assignee: TRUSTWAVE HOLDINGS, INC.
    Inventor: Scott Parcel
  • Patent number: 9489515
    Abstract: Blocking transmission of tainted data using dynamic data tainting is described. For example, sensitive information is stored on a client device as tainted data. The client device generates a data request for retrieving data from a non-trusted entity via a network. A gateway is communicatively coupled to the client device and the network. The gateway receives computer code from the non-trusted entity via the network. The gateway executes the computer code. The gateway tracks the execution of the computer code to determine whether the computer code attempts to access tainted data and transmit the tainted data to an outside entity. The gateway blocks the transmission of the tainted data to the outside entity responsive to determining that the computer code has attempted to access tainted data and transmit the tainted data to an outside entity.
    Type: Grant
    Filed: June 9, 2011
    Date of Patent: November 8, 2016
    Assignee: TRUSTWAVE HOLDINGS, INC.
    Inventors: Alexander Yermakov, Mark Kaplan
  • Patent number: 9177142
    Abstract: The present invention provides a method for determining the likelihood that an electronic document contains embedded malware. After parsing or sequencing an electronic document, the metadata structures that make up the document are analyzed. A number of pre-established rules are then applied with respect to certain metadata structures that are indicative of embedded malware. The application of these rules results in the generation of a score for the electronic document being tested for embedded malware. The score is then compared to a threshold value, where the threshold value was previously generated based on a statistical model relating to electronic documents having the same format as the document being tested. The result of the comparison can then be used to determine whether the document being tested is or is not likely to contain embedded malware.
    Type: Grant
    Filed: October 14, 2011
    Date of Patent: November 3, 2015
    Assignee: TRUSTWAVE HOLDINGS, INC.
    Inventor: Rodrigo Ribeiro Montoro
  • Patent number: 9172675
    Abstract: Methods and apparatus for network communication are disclosed. An example method includes sending an initial packet to a network device, receiving a response packet that is a response to the initial packet and includes a parameter that does not match the initial packet, determining that the response packet is a response to the initial packet, and in response to determining that the response packet is a response, determining that the network device is responsive to network requests.
    Type: Grant
    Filed: May 29, 2012
    Date of Patent: October 27, 2015
    Assignee: TRUSTWAVE HOLDINGS, INC.
    Inventor: Jonathan Claudius
  • Patent number: 9135439
    Abstract: Methods, apparatus, systems and articles of manufacture to detect risks using application protocol headers are disclosed. An example method includes extracting characteristics from a header of a received hypertext transport protocol (HTTP) request, determining a first score corresponding to a first characteristic of the characteristics, determining a second score corresponding to a second characteristic of the characteristics, adding the first score and the second score to determine a combined score, and indicating that the received HTTP request is malware when the combined score meets a threshold.
    Type: Grant
    Filed: March 15, 2013
    Date of Patent: September 15, 2015
    Assignee: Trustwave Holdings, Inc.
    Inventor: Rodrigo Ribeiro Montoro
  • Patent number: 9081961
    Abstract: Analyzing computer code using a tree is described. For example, a client device generates a data request for retrieving data from a non-trusted entity via a network. A gateway is communicatively coupled to the client device and to the network. The gateway is configured to receive computer code from the non-trusted entity via the network. The gateway builds a tree representing the computer code. The tree has one or more nodes. A node of the tree represents a statement from the computer code. The gateway analyzes the statement to identify symbol data. The symbol data describes a name of the variable and the value of the variable. The gateway stores the symbol data in a symbol table.
    Type: Grant
    Filed: June 9, 2011
    Date of Patent: July 14, 2015
    Assignee: Trustwave Holdings, Inc.
    Inventors: Alexander Yermakov, Mark Kaplan
  • Patent number: 8914879
    Abstract: A system and method for improving code coverage for web code that is analyzed for security purposes by dynamic code execution are described. A controller receives information, routes the information to the appropriate engine, analyzer or module and provides the functionality for improving code coverage for code analyzed for security purposes. A code rewrite engine rewrites code in such a way that all branches and stray functions will be executed. A dynamic analyzer performs dynamic analysis on web content to detect malicious code. Additionally, a static analyzer performs static analysis on web content. The static analyzer scans web content and detects a style of coding, a style of obfuscation of the code or patterns in the code.
    Type: Grant
    Filed: June 7, 2011
    Date of Patent: December 16, 2014
    Assignee: Trustwave Holdings, Inc.
    Inventors: Artem Melnik, Mark Kaplan
  • Patent number: 8893278
    Abstract: Rules describing attributes of malicious data requests, commonly generated by malware, are determined and stored. For example, a behavior server executes different types of malware and analyzes the data requests produced by the malware to identify attributes common to different malicious data requests. The rules describing malicious data request attributes are stored and subsequent data requests are compared to the stored rules to identify malicious data requests. If a data request has one or more attributes in common with attributes of malicious data requests, the data request is blocked. This allows attributes of a data request to be used to prevent malware executing on a client device from communicating with a malicious server.
    Type: Grant
    Filed: July 12, 2011
    Date of Patent: November 18, 2014
    Assignee: Trustwave Holdings, Inc.
    Inventor: Daniel Chechik
  • Patent number: 8881278
    Abstract: A system and method for detecting malicious code in web content is described. A controller receives information, routes the information to the appropriate module and determines whether a user receives the web content or a report of a detection of malicious code. A vulnerability definition generator generates vulnerability definitions. A parser parses web content into static language constructions. A translation engine translates the static language constructions into trap rules, translates the web content into application programming interface (API) calls and determines whether the API calls trigger any of the trap rules. A sandbox engine generates an environment that mimics a browser and executes dynamic parts of the web content and determines whether a dynamic part triggers a trap rule.
    Type: Grant
    Filed: June 10, 2011
    Date of Patent: November 4, 2014
    Assignee: Trustwave Holdings, Inc.
    Inventors: Mark Kaplan, Alexander Friger, Peter Novikov
  • Patent number: 8832466
    Abstract: Efficient methods for implementing security and manageability for stored data objects involve logical object reorganization, computation and injection of metadata, and specialized data access operations. Methods for utilization and incorporation of cryptographic key hierarchies and security functions for data objects are disclosed. Cryptographic keying and other data management operations may be performed for individual blocks within a data object rather than only for the entire data object in order to achieve performance objectives.
    Type: Grant
    Filed: January 29, 2007
    Date of Patent: September 9, 2014
    Assignee: Trustwave Holdings, Inc.
    Inventors: John Patrick McGregor, Jr., Matthew N. White