Patents Assigned to Security, Inc.
-
Publication number: 20190243951Abstract: A computer-implemented method for coordinating content transformation includes receiving, at a computer server subsystem and from a web server system, computer code to be served in response to a request from a computing client over the internet; modifying the computer code to obscure operation of the web server system that could be determined from the computer code; generating transformation information that is needed in order to reverse the modifications of the computer code to obscure the operation of the web server system; and serving to the computing client the modified code and the reverse transformation information.Type: ApplicationFiled: December 27, 2018Publication date: August 8, 2019Applicant: Shape Security, Inc.Inventors: Marc R. Hansen, Sumit Agarwal, Subramanian Varadarajan, Justin D. Call
-
Publication number: 20190245833Abstract: A computer implemented method for improving security of a server computer that is configured to deliver computer program instructions to a remote client computer, and comprising, using an intermediary computer that is topologically interposed between the server computer and the remote client computer is provided. The intermediary computer is configured to intercept a first set of source code instructions from the server computer. The intermediary computer identifies first party operations that include operations on objects and the objects themselves. The intermediary computer identifies a first set of operations within the first party operations that are configured to define values for one or more objects based on one or more constants. The intermediary computer then generates a second set of operations, where the second set of operations are configured to define same values for the one or more objects, when executed by a web browser on the client computer.Type: ApplicationFiled: December 30, 2018Publication date: August 8, 2019Applicant: Shape Security, Inc.Inventors: JARROD OVERSON, SIYING YANG
-
Publication number: 20190243971Abstract: Techniques are provided for using instrumentation code to detect bots or malware. Data corresponding to requests from a plurality of client devices for a web resource comprising web code is obtained. The web resource is hosted by a first web server system. For a first client device of the plurality of client devices, instrumentation code is served. The instrumentation code is configured to execute on the first client device to monitor execution of the web code of the web resource at the first client device. One or more responses generated by the instrumentation code at the first client device are received from the first client device. The one or more responses are based one or more interactions with the web code at the first client device.Type: ApplicationFiled: December 27, 2018Publication date: August 8, 2019Applicant: Shape Security, Inc.Inventors: Justin D. Call, Xiaohan Huang, Xiaoming Zhou, Subramanian Varadarajan, Marc R. Hansen
-
Publication number: 20190245858Abstract: A computer-implemented method for securing a content server system is disclosed. The method includes identifying that a request has been made by a client computing device for serving of content from the content server system; serving, to the client computing device and for execution on the client computing device, reconnaissance code that is programmed to determine whether the client computing device is human-controlled or bot-controlled; receiving, from the reconnaissance code, data that indicates whether the client computing device is human-controlled or bot-controlled; and serving follow-up content to the client computing device, wherein the make-up of the follow-up content is selected based on a determination of whether the client computing device is human-controlled or bot-controlled.Type: ApplicationFiled: December 30, 2018Publication date: August 8, 2019Applicant: Shape Security, Inc.Inventors: Nwokedi Idika, Justin D. Call
-
Patent number: 10375248Abstract: The invention may verify calls to a telephone device by activating call forwarding to redirect calls for the telephone device to a prescribed destination; receiving a message from a server verifying the call; deactivating call forwarding to receive the call; and reactivating call forwarding when the call is concluded. In another embodiment, the invention may, in response to a telephone device initiating a call to a second telephone device installed with a particular application or software, transmit a message to a server causing it to instruct the second telephone device to deactivate call forwarding. In yet another embodiment, the invention may cause a server to receive a message from a prescribed location indicating that a call was received via call forwarding, and in response to the message, transmit an instruction to the intended recipient to deactivate the call forwarding if the call is verified as legitimate.Type: GrantFiled: July 3, 2018Date of Patent: August 6, 2019Assignee: Pindrop Security, Inc.Inventors: Payas Gupta, David Dewey
-
Patent number: 10372733Abstract: Systems and methods are provided for securely storing information of a user in a user profile to prevent access to the information and minimize the amount of information disclosed during a security breach. Information pertaining to a user is obtained from one or more sources and organized into a user profile and securely stored in a database. The user profile may be stored remotely in a cloud-based system at a remote encrypted server, with portions of the profile stored in separate locations with separate encryption to minimize the risk of unauthorized access to one portion of the information. The fields of data in the user profile may also be separately encrypted with separate encryption keys and separately stored in separate databases to minimize the amount of information which could be disclosed by the unauthorized access to a single encryption key or a single database.Type: GrantFiled: May 25, 2017Date of Patent: August 6, 2019Assignee: Ubiq Security, Inc.Inventors: Linda Eigner, William Eigner, Eric Tobias, Charles Kahle, Anthony F. Iasi
-
Patent number: 10375026Abstract: Systems, methods, and other techniques for improving the operation of computing systems are described. Some implementations include a computer-implemented method. The method can include intercepting, at an intermediary computing system, messages communicated between a web server system and one or more client computing devices. A subset of the intercepted messages can be selected that are determined to commonly relate to a particular web transaction. The method can identify an expression pattern that occurs in the subset of the intercepted messages, and can determine that the identified expression pattern matches a first pre-defined expression pattern from among a plurality of different pre-defined expression patterns. A status of the particular web transaction can be determined based on the first pre-defined expression pattern that matches the identified expression pattern occurring in the subset of the intercepted messages.Type: GrantFiled: October 28, 2015Date of Patent: August 6, 2019Assignee: Shape Security, Inc.Inventors: Siying Yang, Justin D. Call
-
Publication number: 20190236869Abstract: Disclosed are systems and methods for performing entry access over two or more networks. The two or more networks are leveraged to accelerate the entry access and provide redundancy. Performance over each of the two or more networks is tracked in order to allow a mobile device to exchange entry access messaging over the particular network providing fastest start-to-unlock time. The mobile device can alternatively exchange the entry access messaging simultaneously over the two or more networks to create a race condition whereby the fastest start-to-unlock time is obtained without monitoring network performance. Performing the entry access messaging exchange over the two or more networks also ensures reliability in the event a particular network is down or congested, an authorization device on a particular network is down or overloaded, a radio of a mobile device communicating over a particular network is disabled or slow performing.Type: ApplicationFiled: April 10, 2019Publication date: August 1, 2019Applicant: OpenPath Security Inc.Inventors: Alexander A. Kazerani, Amir Reza Khakpour, Samy Kamkar, Robert J. Peters
-
Patent number: 10367903Abstract: Computer systems and methods in various embodiments are configured for improving the security and efficiency of server computers interacting through an intermediary computer with client computers that may be executing malicious and/or autonomous headless browsers or “bots”.Type: GrantFiled: May 1, 2018Date of Patent: July 30, 2019Assignee: Shape Security, Inc.Inventor: Zhiwei Li
-
Patent number: 10362050Abstract: A security auditing computer system efficiently evaluates and reports security exposures in a target Web site hosted on a remote Web server system. The auditing system includes a crawler subsystem that constructs a first list of Web page identifiers representing the target Web site. An auditing subsystem selectively retrieves and audits Web pages based on a second list, based on the first. Retrieval is sub-selected dependent on a determined uniqueness of Web page identifiers relative to the second list. Auditing is further sub-selected dependent on a determined uniqueness of structural identifiers computed for each retrieved Web page, including structural identifiers of Web page components contained within a Web page. The computed structural identifiers are stored in correspondence with Web page identifiers and Web page component identifiers in the second list. A reporting system produces reports of security exposures identified through the auditing of Web pages and Web page components.Type: GrantFiled: May 23, 2017Date of Patent: July 23, 2019Assignee: Tinfoil Security, Inc.Inventors: Michael Borohovski, Ainsley K Braun, Benjamin Sedat, Angel Irizarry
-
Patent number: 10362172Abstract: Systems and methods for call detail record (CDR) analysis to determine a risk score for a call and identify fraudulent activity and for fraud detection in Interactive Voice Response (IVR) systems. An example method may store information extracted from received calls. Queries of the stored information may be performed to select data using keys, wherein each key relates to one of the received calls, and wherein the queries are parallelized. The selected data may be transformed into feature vectors, wherein each feature vector relates to one of the received calls and includes a velocity feature and at least one of a behavior feature or a reputation feature. A risk score for the call may be generated during the call based on the feature vectors.Type: GrantFiled: January 25, 2018Date of Patent: July 23, 2019Assignee: Pindrop Security, Inc.Inventors: Scott Strong, Kailash Patil, David Dewey, Raj Bandyopadhyay, Telvis Calhoun, Vijay Balasubramaniyan
-
Patent number: 10362062Abstract: System and method to evaluate a plurality of security entities in a network environment is disclosed. Communication between a user computer and a destination computer is monitored by a security appliance. Selective information from the communication is extracted by the security appliance. The selective information is indicative of a value for one or more attributes of the plurality of security entities. A first value indicative of occurrence of each of the values for each of the attributes is generated. A second value indicative of occurrence of each of the values for each of the attributes for each of the security entity is generated. A third value is calculated based on the first value and the second value for each of the attribute value for each of the security entity, wherein the third value is indicative of significance of the value of the attribute for the security entity.Type: GrantFiled: April 22, 2016Date of Patent: July 23, 2019Assignee: Awake Security, Inc.Inventors: Debabrata Dash, Chunsheng Victor Fang, Gary Golomb
-
Patent number: 10362051Abstract: In auditing a target Web site for security exposures, site specific remediation reports are generated to provide instructional data tailored to components of the Web server solution stack as determined by the auditing computer system. Stack and component identification is performed in a site independent manner based on an analysis of Web page data retrieved by the auditing computer system. Informational aspects of the received data are recognized individually and by various patterns evident in the received data, enabling further identification of component implementation aspects, such as revision levels. Based on the informational and implementation aspects, site, solution stack, and component specific security audit tests are executed against the target Web site. Audit identified security exposures are recorded in correspondence with site, solution stack, and component implementation specific remediation instruction data. This audit data is then available for reporting.Type: GrantFiled: August 21, 2017Date of Patent: July 23, 2019Assignee: Tinfoil Security, Inc.Inventors: Michael Borohovski, Ainsley K. Braun, Angel Irizarry, Benjamin D. Sedat
-
Publication number: 20190215304Abstract: Techniques are provided for a security policy for browser extensions. Second detection code, when executed at a second client computing device, gathers and transmits information relating to browser extensions operating on the second client computing device. second browser extension data generated by the second detection code is received. It is determined, based the second browser extension data, that a second browser extension operating on the second client computing device is associated with a second request from the second client computing device to the first web server system. It is determined that the second browser extension is not whitelisted with respect to the first web server system. In response to determining that the second browser extension is not whitelisted with respect to the first web server system, performing a second automated response that causes the first web server system to not process the second request.Type: ApplicationFiled: December 30, 2018Publication date: July 11, 2019Applicant: Shape Security, Inc.Inventors: Siying Yang, Sergey Shekyan
-
Patent number: 10347256Abstract: A system for generating channel-compensated features of a speech signal includes a channel noise simulator that degrades the speech signal, a feed forward convolutional neural network (CNN) that generates channel-compensated features of the degraded speech signal, and a loss function that computes a difference between the channel-compensated features and handcrafted features for the same raw speech signal. Each loss result may be used to update connection weights of the CNN until a predetermined threshold loss is satisfied, and the CNN may be used as a front-end for a deep neural network (DNN) for speaker recognition/verification. The DNN may include convolutional layers, a bottleneck features layer, multiple fully-connected layers and an output layer. The bottleneck features may be used to update connection weights of the convolutional layers, and dropout may be applied to the convolutional layers.Type: GrantFiled: September 19, 2017Date of Patent: July 9, 2019Assignee: Pindrop Security, Inc.Inventors: Elie Khoury, Matthew Garland
-
Patent number: 10348756Abstract: A system and method for assessing vulnerability of a mobile device including at a remote analysis cloud service, receiving at least one vulnerability assessment request that includes an object identifier for an operative object of a mobile computing device, wherein the vulnerability assessment request originates from the mobile computing device; identifying a vulnerability assessment associated with the identifier of the operative object; and communicating the identified vulnerability assessment to the mobile computing device.Type: GrantFiled: September 8, 2016Date of Patent: July 9, 2019Assignee: Duo Security, Inc.Inventors: Jon Oberheide, Dug Song, Adam Goodman
-
Patent number: 10341367Abstract: Methods, systems, and devices are provided for inquiring and storing Indicator of Compromise (IoC) information. In one example, a method of inquiring and storing IoC information can include determining a target IoC information to be identified when an event occurs, requesting an encryption socket communication module of a first user terminal to request the target IoC information from an IoC information providing server, requesting a P2P socket communication module of the first user terminal to request the target IoC information from a P2P socket communication module of at least one other user terminal, and storing the target IoC information that is received first from either the IoC information providing server or the P2P socket communication module of the at least one other user terminal.Type: GrantFiled: December 14, 2017Date of Patent: July 2, 2019Assignee: Saint Security Inc.Inventor: Kihong Kim
-
Patent number: 10341364Abstract: In a system for detecting and optionally blocking packets from an attacker, an improved multi-hash process, in which rate information for one or more packet signatures is computed by individual modules, where each module corresponds to a different hash function, and is shared across the modules to determine maximum observed rates for the signatures within a specified observation window. A moving average of the maximum rates can be computed across several observation windows, to optimize false negative and false positive detections. The modules may designate certain packets as potentially harmful and/or may block such packets, according to a corresponding maximum rate and specified threshold.Type: GrantFiled: February 29, 2016Date of Patent: July 2, 2019Assignee: Corero Networks Security, Inc.Inventors: Thomas J. Teixeira, Thomas C. Porcher
-
Patent number: 10333963Abstract: A first vulnerability that is associated with one or more nodes of a network graph that represent one or more assets of a network infrastructure may be identified. Furthermore, a second vulnerability that is associated with one or more nodes of the network graph may be identified. A determination may be made as to whether the first vulnerability or the second vulnerability contributes more to a probability of a security breach associated with the network infrastructure. A notification may be provided to mitigate the vulnerability that contributes more to the probability of the security breach associated with the network infrastructure.Type: GrantFiled: October 28, 2016Date of Patent: June 25, 2019Assignee: Corax Cyber Security, Inc.Inventors: Jonathan Pope, Lewis Guignard, Thomas Beale
-
Patent number: 10325601Abstract: Utterances of at least two speakers in a speech signal may be distinguished and the associated speaker identified by use of diarization together with automatic speech recognition of identifying words and phrases commonly in the speech signal. The diarization process clusters turns of the conversation while recognized special form phrases and entity names identify the speakers. A trained probabilistic model deduces which entity name(s) correspond to the clusters.Type: GrantFiled: September 19, 2017Date of Patent: June 18, 2019Assignee: Pindrop Security, Inc.Inventors: Elie Khoury, Matthew Garland