Patents Assigned to Forcepoint, LLC
  • Patent number: 11411973
    Abstract: A method, system and computer-usable medium are disclosed for identifying security risks to a computer system based on a distribution of categorical features of events. Certain embodiments are directed to a computer-implemented method comprising: receiving a stream of events, the stream of events including a plurality of events; extracting a categorical feature from the plurality of events, where the categorical feature includes a set of categorical feature members, where the set of categorical feature members are generated on the fly from string values included in the extracted categorical feature; constructing a distribution for the categorical feature based on categorical feature members extracted from the plurality of events; and, analyzing the distribution of the categorical feature to identify one or more security risk factors.
    Type: Grant
    Filed: December 11, 2018
    Date of Patent: August 9, 2022
    Assignee: Forcepoint, LLC
    Inventors: Eduardo Luiggi, Christopher Poirel, Ann Irvine
  • Patent number: 11399009
    Abstract: A method, system, and computer-usable medium are disclosed for: (i) communicating, from a client device to a security device via a metadata connection, metadata regarding a data connection to be established by the client device, the metadata comprising a connection identifier uniquely identifying the data connection; and (ii) communicating, from the client device to the security device via the data connection, network traffic comprising a packet that includes the connection identifier, such that the security device may use the connection identifier to index an entry associated with the metadata that the security device has stored in a metadata cache.
    Type: Grant
    Filed: November 18, 2019
    Date of Patent: July 26, 2022
    Assignee: Forcepoint LLC
    Inventor: Jaakko Moller
  • Patent number: 11379608
    Abstract: A system, method, and computer-readable medium are disclosed for enforcing security policies. Enforcing security policies includes monitoring electronically-observable user interactions of an entity, the electronically-observable user interactions comprising corresponding user behavior of the entity; converting the electronically-observable user interactions into electronic information representing the user behavior; and, applying an organization specific security policy based upon the electronic information representing the user behavior, the organization specific security policy comprising an automatically generated organization specific rule.
    Type: Grant
    Filed: December 12, 2018
    Date of Patent: July 5, 2022
    Assignee: Forcepoint, LLC
    Inventor: Brandon L. Swafford
  • Patent number: 11379426
    Abstract: A method, system and computer-usable medium for detecting if a file(s) is/are copied to/from a computing device from/to one or more other devices. The computing device or information handling device is connected to other devices using a transfer protocol such as Media Transfer Protocol. File activity is monitored between the computing device and the other devices. Each file activity is entered into a common queue available to the computing device and the other devices. Comparison is made at to the entries in the queue as to entries that the same size and the file activity happens within a time window. Pairs that meet the size and activity time window are determined to be file copy pairs.
    Type: Grant
    Filed: February 5, 2019
    Date of Patent: July 5, 2022
    Assignee: Forcepoint, LLC
    Inventors: Randall Neumann, John W. Rosenvall
  • Patent number: 11379607
    Abstract: A system, method, and computer-readable medium are disclosed for generating security policies. Generating security policies includes gathering information related to an organization, the information related to the organization comprising electronically-observable information related to the organization; converting the electronically-observable information related to the organization into electronic information related to the organization; using the electronic information related to the organization to automatically generate a plurality of organization specific rules; and, generating an organization specific security policy, the organization specific security policy comprising at least one organization specific rule.
    Type: Grant
    Filed: December 12, 2018
    Date of Patent: July 5, 2022
    Assignee: Forcepoint, LLC
    Inventor: Brandon L. Swafford
  • Publication number: 20220210188
    Abstract: An email phishing detection mechanism is provided that utilizes machine learning algorithms. The machine learning algorithms are trained on phishing and non-phishing features extracted from a variety of data sets. Embodiments extract embedded URL-based and email body text-based feature sets for training and testing the machine learning algorithms. Embodiments determine the presence of a phishing message through a combination of examining an embedded URL and the body text of the message for the learned feature sets.
    Type: Application
    Filed: December 30, 2020
    Publication date: June 30, 2022
    Applicant: Forcepoint, LLC
    Inventors: Dalwinderjeet Kular Grewal, Kurt Natvig
  • Patent number: 11374977
    Abstract: A method, system, and computer-usable medium are disclosed for managing network communication by, responsive to an attempted connection from a client to a server, receiving information regarding the connection from the client, determining if the information regarding the connection matches an entry of a reputation cache, and responsive to determining that the information regarding the connection matches an entry of the reputation cache, undertaking a remedial action in accordance with a security policy.
    Type: Grant
    Filed: September 20, 2018
    Date of Patent: June 28, 2022
    Assignee: Forcepoint LLC
    Inventors: Valtteri Rahkonen, Jaakko Moller
  • Patent number: 11349868
    Abstract: A method, system and computer-usable medium for performing a spoofed email detection operation, comprising: maintaining a list of allowed third party domains that are authorized to send an internally-addressed email, the list of allowed third party domains comprising a plurality of domains; receiving an email from a third party sender, the email comprising an email envelope, the email envelope storing a domain of a third party sender address of the third party sender; comparing the domain of the third party sender address stored in the email envelope with the list of allowed third party domains; identifying the domain of the third party sender address stored in the email envelope as an allowed domain when the domain of the third party sender address matches a third party domain stored within the list of allowed third party domains.
    Type: Grant
    Filed: January 18, 2018
    Date of Patent: May 31, 2022
    Assignee: Forcepoint, LLC
    Inventors: Tony G. Naccarato, James R. Gordon
  • Patent number: 11314787
    Abstract: A system, method, and computer-readable medium for resolving an identity of an entity, comprising parsing entity identifier information associated with the entity to provide an entity identifier element, the entity identifier information comprising temporal information; classifying the entity identifier element to provide a classified entity identifier element; normalizing the classified entity identifier element to provide a classified and normalized entity identifier element; and, associating the classified and normalized entity identifier element and the temporal information with the entity to resolve the identity of the entity at a particular point in time.
    Type: Grant
    Filed: April 18, 2018
    Date of Patent: April 26, 2022
    Assignee: Forcepoint, LLC
    Inventors: Christopher Poirel, Russell Snyder, Phillip Bracikowski, William Renner
  • Patent number: 11314896
    Abstract: A method, system and computer-usable medium for adaptively assessing risk associated with an endpoint, comprising: determining a risk level corresponding to an entity associated with an endpoint; selecting a frequency and a duration of an endpoint monitoring interval; collecting user behavior to collect user behavior associated with the entity for the duration of the endpoint monitoring interval via the endpoint; processing the user behavior to generate a current risk score for the entity; comparing the current risk score of the user to historical risk scores to determine whether a risk score of a user has changed; and changing the risk score of the user to the current risk score when the risk score of the user has changed.
    Type: Grant
    Filed: May 21, 2020
    Date of Patent: April 26, 2022
    Assignee: Forcepoint, LLC
    Inventors: Richard A. Ford, Ann Irvine, Adam Reeve, Russell Snyder, Benjamin Shih
  • Patent number: 11314871
    Abstract: A system, method, and computer-readable medium are disclosed for performing a security operation. The security operation includes: monitoring an entity, the monitoring observing at least one electronically-observable data source; deriving an observable based upon the monitoring of the electronically-observable data source; identifying a security related activity of the entity, the security related activity being based upon the observable derived from the electronic data source, the security related activity being of analytic utility; associating the security related activity with a component of a cyber kill chain; and, performing a security operation on the security related activity via a security system, the security operation disrupting performance of the component of the cyber kill chain by affecting performance of the security related activity by the entity.
    Type: Grant
    Filed: February 14, 2020
    Date of Patent: April 26, 2022
    Assignee: Forcepoint, LLC
    Inventors: Alan Ross, Raffael Marty, Margaret Cunningham, Clifford Charles Wright
  • Patent number: 11295023
    Abstract: A system, method, and computer-readable medium are disclosed for performing an entity behavior cataloging operation. The entity behavior cataloging operation includes: identifying a plurality of security related activities, the plurality of security related activities being based upon an observable from an electronic data source; analyzing the plurality of security related activities, the analyzing identifying a plurality of events of analytic utility associated with the plurality of security related activities; generating a set of entity behavior catalog data based upon the event of analytic utility associated with the security related activity, the set of entity behavior catalog data comprising an associated group of behaviors; and, storing the set of entity behavior data and the associated group of behaviors within an entity behavior catalog, the entity behavior catalog providing an inventory of entity behaviors for use when performing a security operation.
    Type: Grant
    Filed: February 14, 2020
    Date of Patent: April 5, 2022
    Assignee: Forcepoint, LLC
    Inventors: Alan Ross, Raffael Marty, Margaret Cunningham, Ruchika Pandey
  • Patent number: 11295026
    Abstract: A method, system and computer-usable medium for detecting an occurrence of visual hacking via a visual hacking detection operation which includes: receiving a surveillance image; processing the surveillance image to generate surveillance image data; and, performing a visual hacking detection operation using the surveillance image data, the visual hacking detection operation determining whether visual hacking has been detected.
    Type: Grant
    Filed: November 20, 2018
    Date of Patent: April 5, 2022
    Assignee: Forcepoint, LLC
    Inventors: Yacov Schondorf, Michael Elazar, Uri Elias, Gil Vinokoor
  • Patent number: 11297099
    Abstract: A method, system and computer-usable medium for redisplaying data at a remote access client system from a secure computing environment. The redisplaying data includes receiving a request form the remote access client system for data, inspecting the request for potential unauthorized or malicious retransmission. Modifying the data, by filtering audio data or transforming graphical data prior to sending the requested data is performed to prevent the unauthorized or malicious retransmission.
    Type: Grant
    Filed: November 29, 2018
    Date of Patent: April 5, 2022
    Assignee: Forcepoint, LLC
    Inventor: Anthony Tong
  • Patent number: 11295022
    Abstract: A system, method, and computer-readable medium are disclosed for performing an entity behavior cataloging operation. The entity behavior cataloging operation includes: identifying a security related activity, the security related activity being based upon an observable from an electronic data source; analyzing the security related activity, the analyzing identifying an event of analytic utility associated with the security related activity; generating entity behavior catalog data based upon the event of analytic utility associated with the security related activity; and, storing the entity behavior catalog data within an entity behavior catalog, the entity behavior catalog providing an inventory of entity behaviors for use when performing a security operation.
    Type: Grant
    Filed: February 14, 2020
    Date of Patent: April 5, 2022
    Assignee: Forcepoint, LLC
    Inventors: Raffael Marty, Alan Ross, Nicolas Christian Fischbach, Matthew P. Moynahan, Chad Anson
  • Publication number: 20220103526
    Abstract: A system for processing data that includes a first processor configured to operate one or more algorithms to provide a proxy for each of a plurality of external network communications segments and internal network communications segments associated with a specific use, the first processor configured to operate one or more algorithms to provide a firewall agent that performs firewall processing for each of the plurality of external network communications segments and the internal network communications segments and wherein the explicit proxy is installed using a proxy auto configuration file that is associated with the firewall agent.
    Type: Application
    Filed: March 3, 2021
    Publication date: March 31, 2022
    Applicant: Forcepoint LLC
    Inventors: Olli-Pekka Niemi, Ville K. Mattila
  • Publication number: 20220103527
    Abstract: A system for processing data is disclosed that includes a first processor configured to operate one or more algorithms to identify a user identity as a function of user metadata and to provide access to a predetermined network resource using a cloud-based explicit proxy as a function of the user identity and one or more service requests, the first processor configured to operate one or more algorithms to detect a change in the one or more service requests and wherein access to the predetermined network resources using the cloud-based explicit proxy is modified as a function of the detected change in the one or more service requests.
    Type: Application
    Filed: March 12, 2021
    Publication date: March 31, 2022
    Applicant: Forcepoint LLC
    Inventors: Olli-Pekka Niemi, Ville Mattila
  • Publication number: 20220103647
    Abstract: A system for processing data, comprising a first processor configured to operate one or more algorithms to provide an explicit proxy that directs network communications over a public network to a proxy server. The first processor configured to operate one or more algorithms to provide a firewall agent that verifies the presence of a firewall key prior to allowing data communications over the public network using the explicit proxy. Wherein the explicit proxy is installed using a proxy auto configuration file that is associated with the firewall agent.
    Type: Application
    Filed: September 25, 2020
    Publication date: March 31, 2022
    Applicant: Forcepoint LLC
    Inventor: Lawrence B. Huston, III
  • Patent number: 11283648
    Abstract: A system for controlling data services, comprising a plurality of host computers configured to communicate over the network and to request a data tunnel. A plurality of server computers configured to provide data tunnel services to the plurality of host computers. An address allocator operating on one or more processors and configured to implement one or more algorithms that cause a range of addresses to be assigned to each of the server computers, wherein each of the host computers receives one of the addresses for use as part of a data tunnel service request from the host computer to the server computer.
    Type: Grant
    Filed: August 15, 2019
    Date of Patent: March 22, 2022
    Assignee: FORCEPOINT LLC
    Inventor: Lawrence B. Huston, III
  • Publication number: 20220086182
    Abstract: A method, system, and computer-usable medium are disclosed for: (i) receiving, from a client device, a request for an Internet Protocol (IP) address associated with a domain name; (ii) determining a risk score associated with the client device; and (iii) responding to the request, wherein the response is based on the risk score, and wherein the response is selected from the group consisting of: transmitting the IP address associated with the domain name, and not transmitting the IP address associated with the domain name.
    Type: Application
    Filed: September 14, 2020
    Publication date: March 17, 2022
    Applicant: Forcepoint LLC
    Inventor: Mattia MAGGIOLI