Patents Assigned to Forcepoint, LLC
-
Patent number: 11411973Abstract: A method, system and computer-usable medium are disclosed for identifying security risks to a computer system based on a distribution of categorical features of events. Certain embodiments are directed to a computer-implemented method comprising: receiving a stream of events, the stream of events including a plurality of events; extracting a categorical feature from the plurality of events, where the categorical feature includes a set of categorical feature members, where the set of categorical feature members are generated on the fly from string values included in the extracted categorical feature; constructing a distribution for the categorical feature based on categorical feature members extracted from the plurality of events; and, analyzing the distribution of the categorical feature to identify one or more security risk factors.Type: GrantFiled: December 11, 2018Date of Patent: August 9, 2022Assignee: Forcepoint, LLCInventors: Eduardo Luiggi, Christopher Poirel, Ann Irvine
-
Patent number: 11399009Abstract: A method, system, and computer-usable medium are disclosed for: (i) communicating, from a client device to a security device via a metadata connection, metadata regarding a data connection to be established by the client device, the metadata comprising a connection identifier uniquely identifying the data connection; and (ii) communicating, from the client device to the security device via the data connection, network traffic comprising a packet that includes the connection identifier, such that the security device may use the connection identifier to index an entry associated with the metadata that the security device has stored in a metadata cache.Type: GrantFiled: November 18, 2019Date of Patent: July 26, 2022Assignee: Forcepoint LLCInventor: Jaakko Moller
-
Patent number: 11379608Abstract: A system, method, and computer-readable medium are disclosed for enforcing security policies. Enforcing security policies includes monitoring electronically-observable user interactions of an entity, the electronically-observable user interactions comprising corresponding user behavior of the entity; converting the electronically-observable user interactions into electronic information representing the user behavior; and, applying an organization specific security policy based upon the electronic information representing the user behavior, the organization specific security policy comprising an automatically generated organization specific rule.Type: GrantFiled: December 12, 2018Date of Patent: July 5, 2022Assignee: Forcepoint, LLCInventor: Brandon L. Swafford
-
Patent number: 11379426Abstract: A method, system and computer-usable medium for detecting if a file(s) is/are copied to/from a computing device from/to one or more other devices. The computing device or information handling device is connected to other devices using a transfer protocol such as Media Transfer Protocol. File activity is monitored between the computing device and the other devices. Each file activity is entered into a common queue available to the computing device and the other devices. Comparison is made at to the entries in the queue as to entries that the same size and the file activity happens within a time window. Pairs that meet the size and activity time window are determined to be file copy pairs.Type: GrantFiled: February 5, 2019Date of Patent: July 5, 2022Assignee: Forcepoint, LLCInventors: Randall Neumann, John W. Rosenvall
-
Patent number: 11379607Abstract: A system, method, and computer-readable medium are disclosed for generating security policies. Generating security policies includes gathering information related to an organization, the information related to the organization comprising electronically-observable information related to the organization; converting the electronically-observable information related to the organization into electronic information related to the organization; using the electronic information related to the organization to automatically generate a plurality of organization specific rules; and, generating an organization specific security policy, the organization specific security policy comprising at least one organization specific rule.Type: GrantFiled: December 12, 2018Date of Patent: July 5, 2022Assignee: Forcepoint, LLCInventor: Brandon L. Swafford
-
Publication number: 20220210188Abstract: An email phishing detection mechanism is provided that utilizes machine learning algorithms. The machine learning algorithms are trained on phishing and non-phishing features extracted from a variety of data sets. Embodiments extract embedded URL-based and email body text-based feature sets for training and testing the machine learning algorithms. Embodiments determine the presence of a phishing message through a combination of examining an embedded URL and the body text of the message for the learned feature sets.Type: ApplicationFiled: December 30, 2020Publication date: June 30, 2022Applicant: Forcepoint, LLCInventors: Dalwinderjeet Kular Grewal, Kurt Natvig
-
Patent number: 11374977Abstract: A method, system, and computer-usable medium are disclosed for managing network communication by, responsive to an attempted connection from a client to a server, receiving information regarding the connection from the client, determining if the information regarding the connection matches an entry of a reputation cache, and responsive to determining that the information regarding the connection matches an entry of the reputation cache, undertaking a remedial action in accordance with a security policy.Type: GrantFiled: September 20, 2018Date of Patent: June 28, 2022Assignee: Forcepoint LLCInventors: Valtteri Rahkonen, Jaakko Moller
-
Patent number: 11349868Abstract: A method, system and computer-usable medium for performing a spoofed email detection operation, comprising: maintaining a list of allowed third party domains that are authorized to send an internally-addressed email, the list of allowed third party domains comprising a plurality of domains; receiving an email from a third party sender, the email comprising an email envelope, the email envelope storing a domain of a third party sender address of the third party sender; comparing the domain of the third party sender address stored in the email envelope with the list of allowed third party domains; identifying the domain of the third party sender address stored in the email envelope as an allowed domain when the domain of the third party sender address matches a third party domain stored within the list of allowed third party domains.Type: GrantFiled: January 18, 2018Date of Patent: May 31, 2022Assignee: Forcepoint, LLCInventors: Tony G. Naccarato, James R. Gordon
-
Patent number: 11314787Abstract: A system, method, and computer-readable medium for resolving an identity of an entity, comprising parsing entity identifier information associated with the entity to provide an entity identifier element, the entity identifier information comprising temporal information; classifying the entity identifier element to provide a classified entity identifier element; normalizing the classified entity identifier element to provide a classified and normalized entity identifier element; and, associating the classified and normalized entity identifier element and the temporal information with the entity to resolve the identity of the entity at a particular point in time.Type: GrantFiled: April 18, 2018Date of Patent: April 26, 2022Assignee: Forcepoint, LLCInventors: Christopher Poirel, Russell Snyder, Phillip Bracikowski, William Renner
-
Patent number: 11314896Abstract: A method, system and computer-usable medium for adaptively assessing risk associated with an endpoint, comprising: determining a risk level corresponding to an entity associated with an endpoint; selecting a frequency and a duration of an endpoint monitoring interval; collecting user behavior to collect user behavior associated with the entity for the duration of the endpoint monitoring interval via the endpoint; processing the user behavior to generate a current risk score for the entity; comparing the current risk score of the user to historical risk scores to determine whether a risk score of a user has changed; and changing the risk score of the user to the current risk score when the risk score of the user has changed.Type: GrantFiled: May 21, 2020Date of Patent: April 26, 2022Assignee: Forcepoint, LLCInventors: Richard A. Ford, Ann Irvine, Adam Reeve, Russell Snyder, Benjamin Shih
-
Patent number: 11314871Abstract: A system, method, and computer-readable medium are disclosed for performing a security operation. The security operation includes: monitoring an entity, the monitoring observing at least one electronically-observable data source; deriving an observable based upon the monitoring of the electronically-observable data source; identifying a security related activity of the entity, the security related activity being based upon the observable derived from the electronic data source, the security related activity being of analytic utility; associating the security related activity with a component of a cyber kill chain; and, performing a security operation on the security related activity via a security system, the security operation disrupting performance of the component of the cyber kill chain by affecting performance of the security related activity by the entity.Type: GrantFiled: February 14, 2020Date of Patent: April 26, 2022Assignee: Forcepoint, LLCInventors: Alan Ross, Raffael Marty, Margaret Cunningham, Clifford Charles Wright
-
Patent number: 11295023Abstract: A system, method, and computer-readable medium are disclosed for performing an entity behavior cataloging operation. The entity behavior cataloging operation includes: identifying a plurality of security related activities, the plurality of security related activities being based upon an observable from an electronic data source; analyzing the plurality of security related activities, the analyzing identifying a plurality of events of analytic utility associated with the plurality of security related activities; generating a set of entity behavior catalog data based upon the event of analytic utility associated with the security related activity, the set of entity behavior catalog data comprising an associated group of behaviors; and, storing the set of entity behavior data and the associated group of behaviors within an entity behavior catalog, the entity behavior catalog providing an inventory of entity behaviors for use when performing a security operation.Type: GrantFiled: February 14, 2020Date of Patent: April 5, 2022Assignee: Forcepoint, LLCInventors: Alan Ross, Raffael Marty, Margaret Cunningham, Ruchika Pandey
-
Patent number: 11295026Abstract: A method, system and computer-usable medium for detecting an occurrence of visual hacking via a visual hacking detection operation which includes: receiving a surveillance image; processing the surveillance image to generate surveillance image data; and, performing a visual hacking detection operation using the surveillance image data, the visual hacking detection operation determining whether visual hacking has been detected.Type: GrantFiled: November 20, 2018Date of Patent: April 5, 2022Assignee: Forcepoint, LLCInventors: Yacov Schondorf, Michael Elazar, Uri Elias, Gil Vinokoor
-
Patent number: 11297099Abstract: A method, system and computer-usable medium for redisplaying data at a remote access client system from a secure computing environment. The redisplaying data includes receiving a request form the remote access client system for data, inspecting the request for potential unauthorized or malicious retransmission. Modifying the data, by filtering audio data or transforming graphical data prior to sending the requested data is performed to prevent the unauthorized or malicious retransmission.Type: GrantFiled: November 29, 2018Date of Patent: April 5, 2022Assignee: Forcepoint, LLCInventor: Anthony Tong
-
Patent number: 11295022Abstract: A system, method, and computer-readable medium are disclosed for performing an entity behavior cataloging operation. The entity behavior cataloging operation includes: identifying a security related activity, the security related activity being based upon an observable from an electronic data source; analyzing the security related activity, the analyzing identifying an event of analytic utility associated with the security related activity; generating entity behavior catalog data based upon the event of analytic utility associated with the security related activity; and, storing the entity behavior catalog data within an entity behavior catalog, the entity behavior catalog providing an inventory of entity behaviors for use when performing a security operation.Type: GrantFiled: February 14, 2020Date of Patent: April 5, 2022Assignee: Forcepoint, LLCInventors: Raffael Marty, Alan Ross, Nicolas Christian Fischbach, Matthew P. Moynahan, Chad Anson
-
Publication number: 20220103526Abstract: A system for processing data that includes a first processor configured to operate one or more algorithms to provide a proxy for each of a plurality of external network communications segments and internal network communications segments associated with a specific use, the first processor configured to operate one or more algorithms to provide a firewall agent that performs firewall processing for each of the plurality of external network communications segments and the internal network communications segments and wherein the explicit proxy is installed using a proxy auto configuration file that is associated with the firewall agent.Type: ApplicationFiled: March 3, 2021Publication date: March 31, 2022Applicant: Forcepoint LLCInventors: Olli-Pekka Niemi, Ville K. Mattila
-
Publication number: 20220103527Abstract: A system for processing data is disclosed that includes a first processor configured to operate one or more algorithms to identify a user identity as a function of user metadata and to provide access to a predetermined network resource using a cloud-based explicit proxy as a function of the user identity and one or more service requests, the first processor configured to operate one or more algorithms to detect a change in the one or more service requests and wherein access to the predetermined network resources using the cloud-based explicit proxy is modified as a function of the detected change in the one or more service requests.Type: ApplicationFiled: March 12, 2021Publication date: March 31, 2022Applicant: Forcepoint LLCInventors: Olli-Pekka Niemi, Ville Mattila
-
Publication number: 20220103647Abstract: A system for processing data, comprising a first processor configured to operate one or more algorithms to provide an explicit proxy that directs network communications over a public network to a proxy server. The first processor configured to operate one or more algorithms to provide a firewall agent that verifies the presence of a firewall key prior to allowing data communications over the public network using the explicit proxy. Wherein the explicit proxy is installed using a proxy auto configuration file that is associated with the firewall agent.Type: ApplicationFiled: September 25, 2020Publication date: March 31, 2022Applicant: Forcepoint LLCInventor: Lawrence B. Huston, III
-
Patent number: 11283648Abstract: A system for controlling data services, comprising a plurality of host computers configured to communicate over the network and to request a data tunnel. A plurality of server computers configured to provide data tunnel services to the plurality of host computers. An address allocator operating on one or more processors and configured to implement one or more algorithms that cause a range of addresses to be assigned to each of the server computers, wherein each of the host computers receives one of the addresses for use as part of a data tunnel service request from the host computer to the server computer.Type: GrantFiled: August 15, 2019Date of Patent: March 22, 2022Assignee: FORCEPOINT LLCInventor: Lawrence B. Huston, III
-
Publication number: 20220086182Abstract: A method, system, and computer-usable medium are disclosed for: (i) receiving, from a client device, a request for an Internet Protocol (IP) address associated with a domain name; (ii) determining a risk score associated with the client device; and (iii) responding to the request, wherein the response is based on the risk score, and wherein the response is selected from the group consisting of: transmitting the IP address associated with the domain name, and not transmitting the IP address associated with the domain name.Type: ApplicationFiled: September 14, 2020Publication date: March 17, 2022Applicant: Forcepoint LLCInventor: Mattia MAGGIOLI