Patents Assigned to Security, Inc.
-
Patent number: 9712561Abstract: In an embodiment, a method comprises intercepting a first set of instructions from a server computer that define one or more objects and one or more original operations that are based, at least in part, on the one or more objects; modifying the first set of instructions by adding one or more supervisor operations that are based, at least in part, on the one or more objects; transforming the one or more original operations to produce one or more transformed operations that are based, at least in part, on the one or more supervisor operations; rendering a second set of instructions which define the one or more supervisor operations and the one or more transformed operations; sending the second set of instructions to a remote client computer.Type: GrantFiled: May 18, 2016Date of Patent: July 18, 2017Assignee: Shape Security, Inc.Inventors: Xiaoming Zhou, Roger Hoover, Sergey Shekyan, Justin Call
-
Patent number: 9712557Abstract: A data processing system comprising: a sensor computer that is coupled to and co-located with a compromised computer, the compromised computer comprising at least one malware item that is configured to direct unauthorized network activity toward one or more enterprise networks or enterprise computers, wherein the compromised computer is coupled to a firewall that is configured to control ingress of packets to the compromised computer and is logically between one or more attacker computers and the one or more enterprise networks or enterprise computers; a security control computer that is coupled to the sensor computer; one or more non-transitory data storage media in the security control computer storing security logic comprising one or more sequences of instructions which when executed cause the security control computer to perform: obtaining, from the sensor computer, detection data relating to network messages that the compromised computer emits, as the compromised computer emits the network messages; usinType: GrantFiled: May 27, 2015Date of Patent: July 18, 2017Assignee: Area 1 Security, Inc.Inventors: Oren Falkowitz, Philip Syme, Blake Darche
-
Patent number: 9705902Abstract: A computer-implemented method includes providing, for use by a third-party, injectable computer code that is capable of being served with other code provided by the third-party to client computing devices; receiving data from client computing devices that have been served the code by the third-party, the data including data that characterizes (a) the client computing devices and (b) user interaction with the client computing devices; classifying the client computing devices as controlled by actual users or instead by automated software based on analysis of the received data from the client computing devices; and providing to the third party one or more reports that characterize an overall level of automated software activity among client computing devices that have been served code by the third party.Type: GrantFiled: March 30, 2015Date of Patent: July 11, 2017Assignee: Shape Security, Inc.Inventors: Justin D. Call, Xinran Wang, Yao Zhao, Timothy Dylan Peacock
-
Patent number: 9695620Abstract: An apparatus for adjusting the force in a door operator or closer includes a tube rotatable about a longitudinal axis and a coil spring therein connected to door operator/closer. A fixed adjusting screw extends along the longitudinal axis of the housing through the coil spring and a spring collar is threaded onto the adjusting screw and rotatable with the tube. The spring collar bears on the distal end of the spring to vary the spring compression upon rotation of the housing and thereby vary force applied by the door operator or closer. The housing has an opening though which the spring is visible, and the tube has markings indicating the degree of spring compression. An indicator is moveable along and visible outside the housing to indicate the compression of the spring.Type: GrantFiled: October 1, 2015Date of Patent: July 4, 2017Assignee: Yale Security Inc.Inventors: Peter Zasowski, Dustin Lawhon, Robert M. Bell
-
Patent number: 9683378Abstract: A bracket is provided for use in installing door hardware on a support surface. The bracket comprises a rigid member having a longitudinal axis, a front surface, a substantially planar rear surface for engaging the support surface, and a peripheral edge extending between and joining the front and rear surfaces. A spirit bubble level is disposed on the rigid member such that the rigid member can be oriented relative to a horizontal line or a vertical line, the level having the bubble centered only when the level is horizontal or vertical. At least a portion of the peripheral edge of the rigid member provides a mounting surface for the door hardware when the rigid member is secured to the support surface.Type: GrantFiled: August 20, 2015Date of Patent: June 20, 2017Assignee: Yale Security Inc.Inventors: Blue Houser, Tommy G. McNally, II
-
Patent number: 9686314Abstract: Systems and methods for matching and scoring sameness. In some embodiments, a computer-implemented method is provided, comprising acts of: detecting a plurality of digital interactions at different points in time; for each digital interaction of the plurality of digital interactions: identifying from the digital interaction an anchor value X of an anchor type T; and updating a profile of the anchor value X.Type: GrantFiled: September 4, 2016Date of Patent: June 20, 2017Assignee: NuData Security Inc.Inventors: Christopher Everett Bailey, Randy Lukashuk, Gary Wayne Richardson
-
Patent number: 9686315Abstract: Systems and methods for matching and scoring sameness. In some embodiments, a computer-implemented method is provided, comprising acts of: identifying an anchor value X from the first digital interaction; identifying a first plurality of past digital interactions from which the anchor value X was previously observed, wherein each past digital interaction of the first plurality of past digital interactions has associated therewith a respective sameness score; select a second plurality of past digital interactions from the first plurality of past digital interactions based at least in part on the respective sameness scores; generating a profile for the anchor value X based on the second plurality of past digital interactions; and determining a biometric score for the first digital interaction.Type: GrantFiled: September 4, 2016Date of Patent: June 20, 2017Assignee: NuData Security Inc.Inventors: Christopher Everett Bailey, Randy Lukashuk, Gary Wayne Richardson
-
Patent number: 9680868Abstract: Systems and methods for matching and scoring sameness. In some embodiments, a computer-implemented method is provided, comprising acts of: identifying an anchor value X from the digital interaction; identifying, in a record of the digital interaction, a data structure associated with an anchor type T of the anchor value, wherein a plurality of anchor values of the anchor type T are divided into a plurality of buckets of anchor values; identifying a bucket B of the plurality of buckets of anchor values, wherein the anchor value X falls into the bucket B; and operating on the data structure associated with the anchor type T to indicate that at least one anchor value from the bucket B has been observed in connection with the digital interaction.Type: GrantFiled: September 4, 2016Date of Patent: June 13, 2017Assignee: NuData Security Inc.Inventors: Christopher Everett Bailey, Randy Lukashuk, Gary Wayne Richardson
-
Patent number: 9680856Abstract: A security auditing computer system efficiently evaluates and reports security exposures in a target Web site hosted on a remote Web server system. The auditing system includes a crawler subsystem that constructs a first list of Web page identifiers representing the target Web site. An auditing subsystem selectively retrieves and audits Web pages based on a second list, based on the first. Retrieval is sub-selected dependent on a determined uniqueness of Web page identifiers relative to the second list. Auditing is further sub-selected dependent on a determined uniqueness of structural identifiers computed for each retrieved Web page, including structural identifiers of Web page components contained within a Web page. The computed structural identifiers are stored in correspondence with Web page identifiers and Web page component identifiers in the second list. A reporting system produces reports of security exposures identified through the auditing of Web pages and Web page components.Type: GrantFiled: January 11, 2016Date of Patent: June 13, 2017Assignee: Tinfoil Security, Inc.Inventors: Michael Borohovski, Ainsley K Braun, Benjamin Sedat, Angel Irizarry
-
Patent number: 9674213Abstract: A system, method, and computer program product for implementing a phishing assessment of a target computer network that includes a phishing assessment platform for generating parameters for the phishing assessment; generating the phishing assessment parameters includes identifying a target domain name for the phishing assessment; identifying a pseudo domain name based on the target domain name; generating a pseudo web page using one or more features and attributes of an entity; and implementing the phishing assessment using the pseudo domain name and pseudo web page.Type: GrantFiled: October 28, 2016Date of Patent: June 6, 2017Assignee: Duo Security, Inc.Inventor: Jon Oberheide
-
Patent number: 9674208Abstract: In an embodiment, a data processing method providing an improvement in computer security comprises selecting, from a queue identifying a plurality of web pages, a particular web page to retrieve from one of a plurality of internet sources; causing retrieving a copy of the particular web page from a particular internet source; determining a hierarchical structure of the particular web page; based upon a hierarchical structure of the particular web page and without consideration of content of the particular web page, identifying one or more features, of links in the particular web page or files referenced in the particular web page, that indicate one or more security threats; determining a reputation score for the particular web page; determining a specified remediation measure, based upon the reputation score, to remediate a security threat that is identified in the particular web page; providing the specified remediation measure to one or more of a compromised computer, a sensor computer and an enterprise comType: GrantFiled: August 31, 2015Date of Patent: June 6, 2017Assignee: Area 1 Security, Inc.Inventors: Oren Falkowitz, Philip Syme
-
Patent number: 9665932Abstract: A cable safety and maintenance vision system includes an imaging unit comprising at least one imaging device configured to capture images of a side profile portion of a cable. The cable forms a continuous cable loop. A cable defect detection processor is in communication with the at least one imaging device. The cable defect detection processor is configured to receive images from the at least one imaging device, to identify features in the images that indicate potential defects, and to output a location on the continuous cable loop of the features in the images that indicate potential defects.Type: GrantFiled: September 3, 2014Date of Patent: May 30, 2017Assignee: Thales Transport & Security, Inc.Inventors: Jason Michael Lauffer, Nicholas Joseph Roefaro, Jason Alexander Kanczes, Kevin Frederick Garben
-
Publication number: 20170147814Abstract: Methods and systems for detection and prevention of exploitation of embedded devices. A sensing component is configured to detect a plurality of emanated analog signals and generate one or more synchronization events. The synchronization events are used to perform one or more attestation analyses, including execution attestation, integrity attestation, and control-flow reconstruction, the results of which may be used to generate security events.Type: ApplicationFiled: November 17, 2016Publication date: May 25, 2017Applicant: Red Balloon Security, Inc.Inventor: ANG CUI
-
Publication number: 20170134414Abstract: Systems and methods for detecting and scoring anomalies. In some embodiments, a method is provided, comprising acts of: (A) identifying a plurality of values of an attribute, each value of the plurality of values corresponding respectively to a digital interaction of the plurality of digital interactions; (B) dividing the plurality of values into a plurality of buckets; (C) for at least one bucket of the plurality of buckets, determining a count of values from the plurality of values that fall within the at least one bucket; (D) comparing the count of values from the plurality of values that fall within the at least one bucket against historical information regarding the attribute; and (E) determining whether the attribute is anomalous based at least in part on a result of the act (D).Type: ApplicationFiled: January 20, 2017Publication date: May 11, 2017Applicant: NuData Security Inc.Inventors: Christopher Everett Bailey, Randy Lukashuk, Gary Wayne Richardson
-
Patent number: 9648034Abstract: Systems and methods for detecting and scoring anomalies. In some embodiments, a method is provided, comprising acts of: determining whether the digital interaction is suspicious; in response to determining that the digital interaction is suspicious, deploying a security probe of a first type to collect first data from the digital interaction; analyzing first data collected from the digital interaction by the security probe of the first type to determine if the digital interaction continues to appear suspicious; and if the first data collected from the digital interaction by the security probe of the first type indicates that the digital interaction continues to appear suspicious, deploying a security probe of a second type to collect second data from the digital interaction.Type: GrantFiled: September 4, 2016Date of Patent: May 9, 2017Assignee: NuData Security Inc.Inventors: Christopher Everett Bailey, Randy Lukashuk, Gary Wayne Richardson
-
Publication number: 20170126730Abstract: A system, method, and computer program product for implementing a phishing assessment that includes a phishing server that implements one or more phishing assessments; the phishing server: identifies legitimate target domain names to be used in the phishing assessment, generates one or more pseudo domain names and pseudo web pages, where the pseudo domain name are visually similar to an identified target domain name and the pseudo web page includes one or more characteristics and attributes of a legitimate web page.Type: ApplicationFiled: October 28, 2016Publication date: May 4, 2017Applicant: Duo Security, Inc.Inventor: Jon Oberheide
-
Publication number: 20170126729Abstract: A system, method, and computer program product for implementing a phishing assessment of a target computer network that includes a phishing assessment platform for generating parameters for the phishing assessment; generating the phishing assessment parameters includes identifying a target domain name for the phishing assessment; identifying a pseudo domain name based on the target domain name; generating a pseudo web page using one or more features and attributes of an entity; and implementing the phishing assessment using the pseudo domain name and pseudo web page.Type: ApplicationFiled: October 28, 2016Publication date: May 4, 2017Applicant: Duo Security, Inc.Inventor: Jon Oberheide
-
Patent number: 9641341Abstract: A method for distributed trust authentication of one or more users attempting to access one or more service providers operating on a network includes performing primary authentication of a user using a first authentication factor, generating a first partial digital signature for a first authentication response to the primary authentication, performing secondary authentication of the user using a second authentication factor, generating a second partial digital signature for the second authentication response to the secondary authentication, combining the first and second partial digital signatures to form a composite digital signature, and validating the composite digital signature.Type: GrantFiled: March 21, 2016Date of Patent: May 2, 2017Assignee: Duo Security, Inc.Inventors: Jon Oberheide, Dug Song, Adam Goodman
-
Patent number: D790956Type: GrantFiled: July 8, 2015Date of Patent: July 4, 2017Assignee: Yale Security Inc.Inventor: Meg Hetfield
-
Patent number: D791577Type: GrantFiled: July 8, 2015Date of Patent: July 11, 2017Assignee: Yale Security Inc.Inventor: Meg Hetfield