Patents Assigned to Assured Information Security, Inc.
-
Patent number: 10523635Abstract: Obtaining, in association with origination of outbound network traffic to be sent by a system, user account information of a user account on behalf of which the outbound network traffic is generated, and performing filtering of the outbound network traffic based on the obtained user account information of the user account on behalf of which the outbound network traffic is generated, where the filtering is further based on one or more rules, and the filtering includes determining whether to block or allow sending of the outbound network traffic from the system.Type: GrantFiled: June 17, 2016Date of Patent: December 31, 2019Assignee: ASSURED INFORMATION SECURITY, INC.Inventors: Jared Wright, Jacob Torrey
-
Publication number: 20190311260Abstract: Behavioral verification of user identity includes building a deep neural network for keystroke-based behavioral verification of user identity. The building includes receiving recorded keystroke events, each such recorded keystroke event including (i) an indication of whether the recorded keystroke event is a key press or a key release, (ii) a key identifier of the respective key pressed or released, and (iii) a timestamp of the recorded keystroke event. The building further includes performing pre-processing of the recorded keystroke events to provide data structures representing sequential key events for processing by a deep neural network to extract local patterns, and training the deep neural network using the data structures. The method also includes providing the trained deep neural network for keystroke-based behavioral verification of user identity based on determinate vectors output from the trained deep neural network.Type: ApplicationFiled: April 10, 2018Publication date: October 10, 2019Applicant: Assured Information Security, Inc.Inventors: Jacob BALDWIN, Ryan BURNHAM, Robert DORA, Andrew MEYER, Robert WRIGHT
-
Publication number: 20190311098Abstract: A method for keystroke-based behavioral verification of user identity of a subject user of a computer system includes obtaining an enrollment signature corresponding to an identified user and serving as a unique identifier of the identified user, the enrollment signature including an enrollment determinate vector generated based on supplying enrollment keystroke data to a deep neural network for processing. The method further includes obtaining verification determinate vector(s), the verification determinate vector(s) for comparison to the enrollment signature to determine whether the subject user is the identified user.Type: ApplicationFiled: April 10, 2018Publication date: October 10, 2019Applicant: Assured Information Security, Inc.Inventors: Jacob BALDWIN, Ryan BURNHAM, Robert DORA, Andrew MEYER, Robert WRIGHT
-
Publication number: 20190311099Abstract: A method for gait-based behavioral verification of user identity of a subject user of a computer system includes obtaining an enrollment signature corresponding to an identified user and serving as a unique identifier of the identified user, the enrollment signature including an enrollment determinate vector generated based on supplying enrollment gait data to a deep neural network for processing. The method further includes obtaining verification determinate vector(s), the verification determinate vector(s) for comparison to the enrollment signature to determine whether the subject user is the identified user.Type: ApplicationFiled: April 10, 2018Publication date: October 10, 2019Applicant: Assured Information Security, Inc.Inventors: Jacob BALDWIN, Ryan BURNHAM, Robert DORA, Andrew MEYER, Robert WRIGHT
-
Publication number: 20190311261Abstract: Behavioral verification of user identity includes building a deep neural network for gait-based behavioral verification of user identity. The building includes receiving movement data describing movement, in multiple dimensions, of computer system(s) of user(s), the movement data including sensor data acquired from sensor(s) of the computer system(s). The building further includes performing pre-processing of the movement data to provide processed movement data for processing by a deep neural network to extract local patterns, and training the deep neural network using the processed movement data. The method also includes providing the trained deep neural network for gait-based behavioral verification of user identity based on determinate vectors output from the trained deep neural network.Type: ApplicationFiled: April 10, 2018Publication date: October 10, 2019Applicant: Assured Information Security, Inc.Inventors: Jacob BALDWIN, Ryan BURNHAM, Robert DORA, Andrew MEYER, Robert WRIGHT
-
Publication number: 20190173846Abstract: Dedicating hardware devices to virtual machines includes dedicating, by a hypervisor executing on a computer system, a set of hardware devices of the computer system to a first virtual machine of the hypervisor, the first virtual machine executing a guest operating system, and the set of hardware devices for use by the guest operating system in execution of the guest operating system, and dedicating network device hardware of the computer system to a second virtual machine of the hypervisor, the second virtual machine being a different virtual machine than the first virtual machine, wherein network communication between the guest operating system and a network to which the computer system is connected via the network device hardware occurs via the second virtual machine.Type: ApplicationFiled: December 5, 2017Publication date: June 6, 2019Applicant: Assured Information Security, Inc.Inventors: Christopher James PATTERSON, Rian QUINN, Katherine Julia TEMKIN, Harlan Philip WHITE
-
Publication number: 20190163907Abstract: A method includes monitoring system call invocations made to an operating system of a computer system by an application as the application renders a digital file. The method automatically featurizes the system call invocations into a set of features corresponding to the digital file, and compares each feature set against benign features of a set of known benign features. The comparing includes, for each feature of the set of features, applying entity resolution between the feature and benign feature(s) of the set of known benign features to find a correlation between the feature and a benign feature representing a common semantic interaction between the application and the operating system. The method identifies a number of features that do not correlate to the benign features, and determines maliciousness of the digital file based on the identified number of features that do not correlate to the benign features.Type: ApplicationFiled: November 30, 2017Publication date: May 30, 2019Applicant: Assured Information Security, Inc.Inventors: Daniel SCOFIELD, Craig MILES
-
Patent number: 9996374Abstract: An update is deployed to a guest virtual machine of a hypervisor during runtime of the guest virtual machine. An executing thread of the guest virtual machine is identified and execution of the thread is redirected to a function to open a handle to a file, of the guest virtual machine, to which data of the update is to be written. The data is provided to a component of the guest virtual machine, and then execution of the thread is redirected to a function to write the data provided to the component to the file.Type: GrantFiled: June 16, 2015Date of Patent: June 12, 2018Assignee: ASSURED INFORMATION SECURITY, INC.Inventors: Michael Joseph Sieffert, Jonathan Einstoss, Stephen Raymond Pape, Adam T. Meily
-
Patent number: 9871787Abstract: Authentication processing for a plurality of self-encrypting storage devices, e.g. SEDs) of a computer system is provided. The authentication processing for the SEDs includes obtaining authentication information for one SED of the plurality of SEDs, performing authentication processing for the one SED based on the obtained authentication information for the one SED; and based on the authentication processing for the one SED, performing authentication processing for each additional SED of one or more additional SEDs of the plurality of SEDs. A pre-boot configuration environment (PBA) to facilitate the authentication processing, and methods for installing the PBA are provided.Type: GrantFiled: February 23, 2016Date of Patent: January 16, 2018Assignee: ASSURED INFORMATION SECURITY, INC.Inventor: Maurice Gale
-
Publication number: 20170366505Abstract: Obtaining, in association with origination of outbound network traffic to be sent by a system, user account information of a user account on behalf of which the outbound network traffic is generated, and performing filtering of the outbound network traffic based on the obtained user account information of the user account on behalf of which the outbound network traffic is generated, where the filtering is further based on one or more rules, and the filtering includes determining whether to block or allow sending of the outbound network traffic from the system.Type: ApplicationFiled: June 17, 2016Publication date: December 21, 2017Applicant: Assured Information Security, Inc.Inventors: Jared Wright, Jacob Torrey
-
Publication number: 20170244698Abstract: Authentication processing for a plurality of self-encrypting storage devices, e.g. SEDs) of a computer system is provided. The authentication processing for the SEDs includes obtaining authentication information for one SED of the plurality of SEDs, performing authentication processing for the one SED based on the obtained authentication information for the one SED; and based on the authentication processing for the one SED, performing authentication processing for each additional SED of one or more additional SEDs of the plurality of SEDs. A pre-boot configuration environment (PBA) to facilitate the authentication processing, and methods for installing the PBA are provided.Type: ApplicationFiled: February 23, 2016Publication date: August 24, 2017Applicant: Assured Information Security, Inc.Inventor: Maurice Gale
-
Patent number: 9654498Abstract: A determination is made as to whether an attempt to send a data packet from a computer system has deviated from an established protocol for sending data packets from the computer system is made. The determination includes obtaining a data structure describing the data packet, and, based on invocation of a function to deliver the data packet to a module of a stack of the computer system, the module interfacing network hardware for sending the data packet, checking for presence of a tag placed in the data structure by a component of the stack and indicative of whether the attempt to send the data packet has deviated from the established protocol. Processing is then performed based on the determination of whether the attempt has deviated from the established protocol.Type: GrantFiled: May 12, 2015Date of Patent: May 16, 2017Assignee: ASSURED INFORMATION SECURITY, INC.Inventors: Robert Durham, Kyle Patton, Levi Arthur
-
Patent number: 9639671Abstract: Provided are facilities for secure execution of an encrypted executable comprising an encrypted instruction. The secure execution includes obtaining the encrypted instruction, decrypting the encrypted instruction using a decryption key being maintained in a secure location within a processor, and storing the decrypted instruction to a secure storage for execution, where the decryption key remains in the secure location during the decrypting and the storing to facilitate maintaining security of the decryption key.Type: GrantFiled: May 27, 2014Date of Patent: May 2, 2017Assignee: ASSURED INFORMATION SECURITY, INC.Inventor: Jacob Torrey
-
Patent number: 9619346Abstract: Run-time, event-driven virtual machine introspection of the target guest virtual machine is facilitated as described herein. A component can specify events that are of interest to the component for introspection of a target guest virtual machine of a hypervisor. The hypervisor detects an introspection event generated by a target guest virtual machine and determines whether the introspection event is of interest for handling by a component coupled to the hypervisor. If so, the hypervisor alerts the component about the introspection event and provides information associated with the introspection event to the component. The component thereby receives notification of occurrence of the introspection event from the hypervisor and may obtain information associated with the introspection event.Type: GrantFiled: October 28, 2014Date of Patent: April 11, 2017Assignee: ASSURED INFORMATION SECURITY, INC.Inventor: Stephen Raymond Pape
-
Publication number: 20160371105Abstract: An update is deployed to a guest virtual machine of a hypervisor during runtime of the guest virtual machine. An executing thread of the guest virtual machine is identified and execution of the thread is redirected to a function to open a handle to a file, of the guest virtual machine, to which data of the update is to be written. The data is provided to a component of the guest virtual machine, and then execution of the thread is redirected to a function to write the data provided to the component to the file.Type: ApplicationFiled: June 16, 2015Publication date: December 22, 2016Applicant: ASSURED INFORMATION SECURITY, INC.Inventors: Michael Joseph Sieffert, Jonathan Einstoss, Stephen Raymond Pape, Adam T. MEILY
-
Publication number: 20160337383Abstract: A determination is made as to whether an attempt to send a data packet from a computer system has deviated from an established protocol for sending data packets from the computer system is made. The determination includes obtaining a data structure describing the data packet, and, based on invocation of a function to deliver the data packet to a module of a stack of the computer system, the module interfacing network hardware for sending the data packet, checking for presence of a tag placed in the data structure by a component of the stack and indicative of whether the attempt to send the data packet has deviated from the established protocol. Processing is then performed based on the determination of whether the attempt has deviated from the established protocol.Type: ApplicationFiled: May 12, 2015Publication date: November 17, 2016Applicant: ASSURED INFORMATION SECURITY, INC.Inventors: Robert Durham, Kyle Patton, Levi Arthur
-
Patent number: 9335886Abstract: User interaction with multiple domains is facilitated while preventing cross-domain transfer of data from those domains. A compositioning domain facilitates this interaction in a secure manner in which cross-domain transfer of data is prevented. This includes obtaining pixel information from the domains via one or more read-only communication paths, providing a user interface to the user, which includes providing a display buffer including at least some of the pixel information obtained from each domain of the domains for display to the user, and maintaining an in-focus domain state. The in-focus domain state indicates which domain of the domains is currently in-focus. User input from the user based on the user interface is provided by a user input handler directly to the currently in-focus domain indicated by the in-focus domain state absent transfer of the user input to the compositioning domain.Type: GrantFiled: March 13, 2013Date of Patent: May 10, 2016Assignee: ASSURED INFORMATION SECURITY, INC.Inventors: Rian Patrick Quinn, Brendan Timothy Kerrigan
-
Publication number: 20150347724Abstract: Provided are facilities for secure execution of an encrypted executable comprising an encrypted instruction. The secure execution includes obtaining the encrypted instruction, decrypting the encrypted instruction using a decryption key being maintained in a secure location within a processor, and storing the decrypted instruction to a secure storage for execution, where the decryption key remains in the secure location during the decrypting and the storing to facilitate maintaining security of the decryption key.Type: ApplicationFiled: May 27, 2014Publication date: December 3, 2015Applicant: Assured Information Security, Inc.Inventor: Jacob TORREY
-
Publication number: 20150121135Abstract: Run-time, event-driven virtual machine introspection of the target guest virtual machine is facilitated as described herein. A component can specify events that are of interest to the component for introspection of a target guest virtual machine of a hypervisor. The hypervisor detects an introspection event generated by a target guest virtual machine and determines whether the introspection event is of interest for handling by a component coupled to the hypervisor. If so, the hypervisor alerts the component about the introspection event and provides information associated with the introspection event to the component. The component thereby receives notification of occurrence of the introspection event from the hypervisor and may obtain information associated with the introspection event.Type: ApplicationFiled: October 28, 2014Publication date: April 30, 2015Applicant: ASSURED INFORMATION SECURITY, INC.Inventor: Stephen Raymond PAPE
-
Patent number: 8966642Abstract: Verification of trustworthiness of a computing platform is provided. The trustworthiness of the computing platform is dynamically assessed to determine whether a root of trust exists on the computing platform. Responsive to determining existence of the root of trust, data is unsealed from a sealed storage facility. The sealed storage facility is unsealed responsive to a root of trust being determined to exist on the computing platform. The data can be used to attest to the trustworthiness of the computing platform to other device on a network.Type: GrantFiled: March 30, 2012Date of Patent: February 24, 2015Assignee: Assured Information Security, Inc.Inventors: Rian Quinn, Jacob Torrey