Patents Assigned to Security, Inc.
  • Patent number: 9712561
    Abstract: In an embodiment, a method comprises intercepting a first set of instructions from a server computer that define one or more objects and one or more original operations that are based, at least in part, on the one or more objects; modifying the first set of instructions by adding one or more supervisor operations that are based, at least in part, on the one or more objects; transforming the one or more original operations to produce one or more transformed operations that are based, at least in part, on the one or more supervisor operations; rendering a second set of instructions which define the one or more supervisor operations and the one or more transformed operations; sending the second set of instructions to a remote client computer.
    Type: Grant
    Filed: May 18, 2016
    Date of Patent: July 18, 2017
    Assignee: Shape Security, Inc.
    Inventors: Xiaoming Zhou, Roger Hoover, Sergey Shekyan, Justin Call
  • Patent number: 9712557
    Abstract: A data processing system comprising: a sensor computer that is coupled to and co-located with a compromised computer, the compromised computer comprising at least one malware item that is configured to direct unauthorized network activity toward one or more enterprise networks or enterprise computers, wherein the compromised computer is coupled to a firewall that is configured to control ingress of packets to the compromised computer and is logically between one or more attacker computers and the one or more enterprise networks or enterprise computers; a security control computer that is coupled to the sensor computer; one or more non-transitory data storage media in the security control computer storing security logic comprising one or more sequences of instructions which when executed cause the security control computer to perform: obtaining, from the sensor computer, detection data relating to network messages that the compromised computer emits, as the compromised computer emits the network messages; usin
    Type: Grant
    Filed: May 27, 2015
    Date of Patent: July 18, 2017
    Assignee: Area 1 Security, Inc.
    Inventors: Oren Falkowitz, Philip Syme, Blake Darche
  • Patent number: 9705902
    Abstract: A computer-implemented method includes providing, for use by a third-party, injectable computer code that is capable of being served with other code provided by the third-party to client computing devices; receiving data from client computing devices that have been served the code by the third-party, the data including data that characterizes (a) the client computing devices and (b) user interaction with the client computing devices; classifying the client computing devices as controlled by actual users or instead by automated software based on analysis of the received data from the client computing devices; and providing to the third party one or more reports that characterize an overall level of automated software activity among client computing devices that have been served code by the third party.
    Type: Grant
    Filed: March 30, 2015
    Date of Patent: July 11, 2017
    Assignee: Shape Security, Inc.
    Inventors: Justin D. Call, Xinran Wang, Yao Zhao, Timothy Dylan Peacock
  • Patent number: 9695620
    Abstract: An apparatus for adjusting the force in a door operator or closer includes a tube rotatable about a longitudinal axis and a coil spring therein connected to door operator/closer. A fixed adjusting screw extends along the longitudinal axis of the housing through the coil spring and a spring collar is threaded onto the adjusting screw and rotatable with the tube. The spring collar bears on the distal end of the spring to vary the spring compression upon rotation of the housing and thereby vary force applied by the door operator or closer. The housing has an opening though which the spring is visible, and the tube has markings indicating the degree of spring compression. An indicator is moveable along and visible outside the housing to indicate the compression of the spring.
    Type: Grant
    Filed: October 1, 2015
    Date of Patent: July 4, 2017
    Assignee: Yale Security Inc.
    Inventors: Peter Zasowski, Dustin Lawhon, Robert M. Bell
  • Patent number: 9683378
    Abstract: A bracket is provided for use in installing door hardware on a support surface. The bracket comprises a rigid member having a longitudinal axis, a front surface, a substantially planar rear surface for engaging the support surface, and a peripheral edge extending between and joining the front and rear surfaces. A spirit bubble level is disposed on the rigid member such that the rigid member can be oriented relative to a horizontal line or a vertical line, the level having the bubble centered only when the level is horizontal or vertical. At least a portion of the peripheral edge of the rigid member provides a mounting surface for the door hardware when the rigid member is secured to the support surface.
    Type: Grant
    Filed: August 20, 2015
    Date of Patent: June 20, 2017
    Assignee: Yale Security Inc.
    Inventors: Blue Houser, Tommy G. McNally, II
  • Patent number: 9686314
    Abstract: Systems and methods for matching and scoring sameness. In some embodiments, a computer-implemented method is provided, comprising acts of: detecting a plurality of digital interactions at different points in time; for each digital interaction of the plurality of digital interactions: identifying from the digital interaction an anchor value X of an anchor type T; and updating a profile of the anchor value X.
    Type: Grant
    Filed: September 4, 2016
    Date of Patent: June 20, 2017
    Assignee: NuData Security Inc.
    Inventors: Christopher Everett Bailey, Randy Lukashuk, Gary Wayne Richardson
  • Patent number: 9686315
    Abstract: Systems and methods for matching and scoring sameness. In some embodiments, a computer-implemented method is provided, comprising acts of: identifying an anchor value X from the first digital interaction; identifying a first plurality of past digital interactions from which the anchor value X was previously observed, wherein each past digital interaction of the first plurality of past digital interactions has associated therewith a respective sameness score; select a second plurality of past digital interactions from the first plurality of past digital interactions based at least in part on the respective sameness scores; generating a profile for the anchor value X based on the second plurality of past digital interactions; and determining a biometric score for the first digital interaction.
    Type: Grant
    Filed: September 4, 2016
    Date of Patent: June 20, 2017
    Assignee: NuData Security Inc.
    Inventors: Christopher Everett Bailey, Randy Lukashuk, Gary Wayne Richardson
  • Patent number: 9680868
    Abstract: Systems and methods for matching and scoring sameness. In some embodiments, a computer-implemented method is provided, comprising acts of: identifying an anchor value X from the digital interaction; identifying, in a record of the digital interaction, a data structure associated with an anchor type T of the anchor value, wherein a plurality of anchor values of the anchor type T are divided into a plurality of buckets of anchor values; identifying a bucket B of the plurality of buckets of anchor values, wherein the anchor value X falls into the bucket B; and operating on the data structure associated with the anchor type T to indicate that at least one anchor value from the bucket B has been observed in connection with the digital interaction.
    Type: Grant
    Filed: September 4, 2016
    Date of Patent: June 13, 2017
    Assignee: NuData Security Inc.
    Inventors: Christopher Everett Bailey, Randy Lukashuk, Gary Wayne Richardson
  • Patent number: 9680856
    Abstract: A security auditing computer system efficiently evaluates and reports security exposures in a target Web site hosted on a remote Web server system. The auditing system includes a crawler subsystem that constructs a first list of Web page identifiers representing the target Web site. An auditing subsystem selectively retrieves and audits Web pages based on a second list, based on the first. Retrieval is sub-selected dependent on a determined uniqueness of Web page identifiers relative to the second list. Auditing is further sub-selected dependent on a determined uniqueness of structural identifiers computed for each retrieved Web page, including structural identifiers of Web page components contained within a Web page. The computed structural identifiers are stored in correspondence with Web page identifiers and Web page component identifiers in the second list. A reporting system produces reports of security exposures identified through the auditing of Web pages and Web page components.
    Type: Grant
    Filed: January 11, 2016
    Date of Patent: June 13, 2017
    Assignee: Tinfoil Security, Inc.
    Inventors: Michael Borohovski, Ainsley K Braun, Benjamin Sedat, Angel Irizarry
  • Patent number: 9674213
    Abstract: A system, method, and computer program product for implementing a phishing assessment of a target computer network that includes a phishing assessment platform for generating parameters for the phishing assessment; generating the phishing assessment parameters includes identifying a target domain name for the phishing assessment; identifying a pseudo domain name based on the target domain name; generating a pseudo web page using one or more features and attributes of an entity; and implementing the phishing assessment using the pseudo domain name and pseudo web page.
    Type: Grant
    Filed: October 28, 2016
    Date of Patent: June 6, 2017
    Assignee: Duo Security, Inc.
    Inventor: Jon Oberheide
  • Patent number: 9674208
    Abstract: In an embodiment, a data processing method providing an improvement in computer security comprises selecting, from a queue identifying a plurality of web pages, a particular web page to retrieve from one of a plurality of internet sources; causing retrieving a copy of the particular web page from a particular internet source; determining a hierarchical structure of the particular web page; based upon a hierarchical structure of the particular web page and without consideration of content of the particular web page, identifying one or more features, of links in the particular web page or files referenced in the particular web page, that indicate one or more security threats; determining a reputation score for the particular web page; determining a specified remediation measure, based upon the reputation score, to remediate a security threat that is identified in the particular web page; providing the specified remediation measure to one or more of a compromised computer, a sensor computer and an enterprise com
    Type: Grant
    Filed: August 31, 2015
    Date of Patent: June 6, 2017
    Assignee: Area 1 Security, Inc.
    Inventors: Oren Falkowitz, Philip Syme
  • Patent number: 9665932
    Abstract: A cable safety and maintenance vision system includes an imaging unit comprising at least one imaging device configured to capture images of a side profile portion of a cable. The cable forms a continuous cable loop. A cable defect detection processor is in communication with the at least one imaging device. The cable defect detection processor is configured to receive images from the at least one imaging device, to identify features in the images that indicate potential defects, and to output a location on the continuous cable loop of the features in the images that indicate potential defects.
    Type: Grant
    Filed: September 3, 2014
    Date of Patent: May 30, 2017
    Assignee: Thales Transport & Security, Inc.
    Inventors: Jason Michael Lauffer, Nicholas Joseph Roefaro, Jason Alexander Kanczes, Kevin Frederick Garben
  • Publication number: 20170147814
    Abstract: Methods and systems for detection and prevention of exploitation of embedded devices. A sensing component is configured to detect a plurality of emanated analog signals and generate one or more synchronization events. The synchronization events are used to perform one or more attestation analyses, including execution attestation, integrity attestation, and control-flow reconstruction, the results of which may be used to generate security events.
    Type: Application
    Filed: November 17, 2016
    Publication date: May 25, 2017
    Applicant: Red Balloon Security, Inc.
    Inventor: ANG CUI
  • Publication number: 20170134414
    Abstract: Systems and methods for detecting and scoring anomalies. In some embodiments, a method is provided, comprising acts of: (A) identifying a plurality of values of an attribute, each value of the plurality of values corresponding respectively to a digital interaction of the plurality of digital interactions; (B) dividing the plurality of values into a plurality of buckets; (C) for at least one bucket of the plurality of buckets, determining a count of values from the plurality of values that fall within the at least one bucket; (D) comparing the count of values from the plurality of values that fall within the at least one bucket against historical information regarding the attribute; and (E) determining whether the attribute is anomalous based at least in part on a result of the act (D).
    Type: Application
    Filed: January 20, 2017
    Publication date: May 11, 2017
    Applicant: NuData Security Inc.
    Inventors: Christopher Everett Bailey, Randy Lukashuk, Gary Wayne Richardson
  • Patent number: 9648034
    Abstract: Systems and methods for detecting and scoring anomalies. In some embodiments, a method is provided, comprising acts of: determining whether the digital interaction is suspicious; in response to determining that the digital interaction is suspicious, deploying a security probe of a first type to collect first data from the digital interaction; analyzing first data collected from the digital interaction by the security probe of the first type to determine if the digital interaction continues to appear suspicious; and if the first data collected from the digital interaction by the security probe of the first type indicates that the digital interaction continues to appear suspicious, deploying a security probe of a second type to collect second data from the digital interaction.
    Type: Grant
    Filed: September 4, 2016
    Date of Patent: May 9, 2017
    Assignee: NuData Security Inc.
    Inventors: Christopher Everett Bailey, Randy Lukashuk, Gary Wayne Richardson
  • Publication number: 20170126730
    Abstract: A system, method, and computer program product for implementing a phishing assessment that includes a phishing server that implements one or more phishing assessments; the phishing server: identifies legitimate target domain names to be used in the phishing assessment, generates one or more pseudo domain names and pseudo web pages, where the pseudo domain name are visually similar to an identified target domain name and the pseudo web page includes one or more characteristics and attributes of a legitimate web page.
    Type: Application
    Filed: October 28, 2016
    Publication date: May 4, 2017
    Applicant: Duo Security, Inc.
    Inventor: Jon Oberheide
  • Publication number: 20170126729
    Abstract: A system, method, and computer program product for implementing a phishing assessment of a target computer network that includes a phishing assessment platform for generating parameters for the phishing assessment; generating the phishing assessment parameters includes identifying a target domain name for the phishing assessment; identifying a pseudo domain name based on the target domain name; generating a pseudo web page using one or more features and attributes of an entity; and implementing the phishing assessment using the pseudo domain name and pseudo web page.
    Type: Application
    Filed: October 28, 2016
    Publication date: May 4, 2017
    Applicant: Duo Security, Inc.
    Inventor: Jon Oberheide
  • Patent number: 9641341
    Abstract: A method for distributed trust authentication of one or more users attempting to access one or more service providers operating on a network includes performing primary authentication of a user using a first authentication factor, generating a first partial digital signature for a first authentication response to the primary authentication, performing secondary authentication of the user using a second authentication factor, generating a second partial digital signature for the second authentication response to the secondary authentication, combining the first and second partial digital signatures to form a composite digital signature, and validating the composite digital signature.
    Type: Grant
    Filed: March 21, 2016
    Date of Patent: May 2, 2017
    Assignee: Duo Security, Inc.
    Inventors: Jon Oberheide, Dug Song, Adam Goodman
  • Patent number: D790956
    Type: Grant
    Filed: July 8, 2015
    Date of Patent: July 4, 2017
    Assignee: Yale Security Inc.
    Inventor: Meg Hetfield
  • Patent number: D791577
    Type: Grant
    Filed: July 8, 2015
    Date of Patent: July 11, 2017
    Assignee: Yale Security Inc.
    Inventor: Meg Hetfield