Patents Assigned to Skyhigh Security LLC
-
Patent number: 12261845Abstract: Methods, apparatus, systems, and articles of manufacture are disclosed. An example apparatus to share trust between networks includes trust link former circuitry to form trust with an identity provider (IDP) device separate from the apparatus; interface circuitry to obtain credentials from a client device, the client device and the apparatus connected in a network that does not include the IDP device; and mint requester circuitry to cause the IDP device to mint a token based on the credentials, wherein the interface circuitry further to: obtain the token from the IDP device; and forward the token to the client device.Type: GrantFiled: December 29, 2022Date of Patent: March 25, 2025Assignee: Skyhigh Security LLCInventor: Felix Schulte
-
Patent number: 12254088Abstract: Mechanisms for preventing trojan source attacks are provided, the mechanisms including: receiving first Web page content; determining first one or more languages associated with the first Web page content; determining if the first one or more languages use BIDI characters; and in response to determining that the first one or more languages do not use BIDI characters: searching the Web page content for first reference BIDI characters; and blocking the Web page content in response to finding the first reference BIDI characters in the Web page content. In some embodiments, the mechanisms further include: receiving second Web page content; determining second one or more languages associated with the second Web page content; determining if the second one or more languages use BIDI characters; and in response to determining that the second one or more languages do use BIDI characters, allowing the Web page content.Type: GrantFiled: December 29, 2022Date of Patent: March 18, 2025Assignee: Skyhigh Security LLCInventor: Felix Schulte
-
Patent number: 12126644Abstract: Methods, apparatus, systems, and articles of manufacture are disclosed to identify and report cloud-based security vulnerabilities. An example apparatus includes memory, instructions, and processor circuitry. The example processor circuitry is to execute the instructions to assess a first security vulnerability associated with an application programming interface (API) of a cloud compute network, the first security vulnerability corresponding to at least one call to the API that deviates from a baseline report, the baseline report based on at least one communication in the cloud compute network, and assess a second security vulnerability associated with identity and access management in the cloud compute network based on an entity in the cloud compute network permitted to access a service provided by the cloud compute network, the second security vulnerability corresponding to an unauthorized request to access at least one of a device of the cloud compute network or the service.Type: GrantFiled: May 16, 2022Date of Patent: October 22, 2024Assignee: Skyhigh Security LLCInventors: Sriranga Seetharamaiah, Cedric Cochin
-
Patent number: 12088693Abstract: Particular embodiments described herein provide for a system that can be configured to receive a notification that a client device is requesting, to modify original data associated with an online application, wherein the original data is stored in encrypted format in a cloud; decrypt the original data using a first client encryption key; store the decrypted data in a location accessible by the online application; enable editing capability of the decrypted data; receive a notification that the client device is finished modifying the data in decrypted format; determine whether the original data in decrypted format was modified; encrypt, based on a determination that the original data was modified, the modified data using a second client encryption key; and upload the modified data in encrypted format to the cloud.Type: GrantFiled: June 18, 2021Date of Patent: September 10, 2024Assignee: Skyhigh Security LLCInventor: Roy Douglas Hopkins
-
Patent number: 12021937Abstract: A cloud service account management method identifies unauthorized or unmanaged accounts making administration console access or API access at a cloud computing service and triggers a work flow to place the accounts under management. In one embodiment, the user device is directed to a registration portal to provide access credentials of the unauthorized account. The loud service account management method uses the access credentials to retrieve a list of account users associated with the account. Once the accounts are made managed, the cloud service account management method can monitor the activities of the account, including all of the account users, and can apply compliance or security policies to the managed accounts.Type: GrantFiled: January 28, 2021Date of Patent: June 25, 2024Assignee: Skyhigh Security, LLCInventors: Sekhar Sarukkai, Kaushik Narayan, Rajiv Gupta
-
Patent number: 12015625Abstract: A cloud security system and method implements cloud activity threat detection using analysis of cloud usage user behavior. In particular, the cloud security system and method implements threat detection for users, cloud service providers, or tenants (enterprises) of the cloud security system who are new or unknown to the cloud security system and therefore lacking sufficient cloud activity data to generate an accurate behavior model for effective threat detection. In accordance with embodiments of the present invention, the cloud security system and method performs user behavior analysis to generate generalized user behavior models for user groups, where each user group includes users with similar cloud usage behavior. The user behavior models of the user groups are assigned to users with sparse cloud activity data. In this manner, the cloud security system and method of the present invention ensures effective threat detection by using accurate and reliable user behavior models.Type: GrantFiled: January 13, 2023Date of Patent: June 18, 2024Assignee: Skyhigh Security LLCInventors: Sandeep Chandana, Santosh Raghuram Kumar, Sekhar Sarukkai, Satyanarayana Vummidi, Madhavi Kavathekar, Vinay Gupta
-
Patent number: 12014306Abstract: A method of assessing a risk level of an enterprise using cloud-based services from one or more cloud service providers includes assessing provider risk scores associated with the one or more cloud service providers; assessing cloud service usage behavior and pattern of the enterprise; and generating a risk score for the enterprise based on the provider risk scores and on the cloud service usage behavior and pattern of the enterprise. The risk score is indicative of the risk of the enterprise relating to the use of the cloud-based services from the one or more cloud service providers.Type: GrantFiled: December 5, 2022Date of Patent: June 18, 2024Assignee: Skyhigh Security LLCInventors: Dejan Curcic, Rajiv Gupta, Kaushik Narayan, Prasad Raghavendra Somasamudram, Sekhar Sarukkai
-
Patent number: 11950097Abstract: The invention provides a method for managing access to a network resource on a network from a mobile device, the method including the steps of intercepting a data stream from the mobile device attempting to access the network resource, extracting information from the intercepted data stream relating to at least one of the mobile device or a user of the mobile device, accessing at least one of enterprise service based information and third party information regarding at least one of the mobile device or the user of the mobile device, determining whether the mobile device is authorized to access the network resource, preparing an access decision that specifies whether the mobile device is authorized to access the network resource, and storing the access decision in a database on the network.Type: GrantFiled: August 16, 2021Date of Patent: April 2, 2024Assignee: Skyhigh Security LLCInventors: Norm Laudermilch, William Supernor, Roman Boroday, David Moshe Goldschlag
-
Patent number: 11805097Abstract: A network security platform (NSP) device and interaction method are disclosed. The interaction method provides network packet analysis for secure transmission protocols using ephemeral keys or keys that are negotiated dynamically. The NSP may be part of an Intrusion Protection System, or firewall. The disclosed approach does not use man-in-the-middle proxy. Instead, it includes monitoring connections ends: client and/or server, to intercept the required data or negotiated (or changed) encryption keys. Decrypted data may be sent to an NSP sensor in a secure manner for analysis. Alternatively, intercepted keys used for the encrypt/decrypt operations may be sent to an NSP sensor in a secure manner every time they are changed. The NSP sensor may then use the obtained keys to decrypt traffic prior to providing it to the inspection engines. Embodiments focused on inbound traffic to a web server may coordinate between a web server and an NSP.Type: GrantFiled: December 25, 2020Date of Patent: October 31, 2023Assignee: Skyhigh Security LLCInventors: Manikandan Kenyan, Shelendra Sharma, Anil Abraham
-
Patent number: 11729219Abstract: A service action category based cloud security system and method implement cloud security by categorizing service actions of cloud service providers into a set of service action categories. The service action categorization is performed agnostic to the applications or functions provided by the cloud service providers and also agnostic to the cloud service providers. With the service actions of cloud service providers thus categorized, cloud security monitoring and threat detection can be performed based on service action categories. Thus, cloud security can be implemented without requiring knowledge of the applications supported by the cloud service providers and without knowing all of the individual service actions supported by the cloud service providers.Type: GrantFiled: April 12, 2021Date of Patent: August 15, 2023Assignee: Skyhigh Security LLCInventors: Sandeep Chandana, Sekhar Sarukkai
-
Patent number: 11641355Abstract: Particular embodiments described herein provide for a network element that can be configured to receive, from an electronic device, a request to access a network service. In response to the request, the network element can send data related to the network service to the electronic device and add a test link to the data related to the network service. The network element can also be configured to determine if the test link was successfully executed and classify the electronic device as untrusted if the test link was not successfully executed.Type: GrantFiled: August 18, 2021Date of Patent: May 2, 2023Assignee: Skyhigh Security LLCInventors: Martin Stecher, Andre Sabban
-
Patent number: 11641379Abstract: A cloud security method implement web security at the application level by monitoring network traffic and detecting cloud activities related to web applications, and then classifying the detected cloud activities to map certain security-related cloud activities into activity categories to enable security policy to be applied. The application-level cloud security method enables policy enforcement rules to be established for cloud activity categories. The security policies are then applied based on activity categories.Type: GrantFiled: August 9, 2021Date of Patent: May 2, 2023Assignee: Skyhigh Security LLCInventors: Sekhar Sarukkai, Prasad Raghavendra Somasamudram, Rama Taraniganty, Vikram Jaiswal, Chapman Seto, Ravi Hingarajiya, Surendrakumar Viswanathan, Kaushik Narayan, Pradeep Kumar Reddy Mangalapuri, Guruprasad Shenoy
-
Patent number: 11558411Abstract: A cloud security system and method implements cloud activity threat detection using analysis of cloud usage user behavior. In particular, the cloud security system and method implements threat detection for users, cloud service providers, or tenants (enterprises) of the cloud security system who are new or unknown to the cloud security system and therefore lacking sufficient cloud activity data to generate an accurate behavior model for effective threat detection. In accordance with embodiments of the present invention, the cloud security system and method performs user behavior analysis to generate generalized user behavior models for user groups, where each user group includes users with similar cloud usage behavior. The user behavior models of the user groups are assigned to users with sparse cloud activity data. In this manner, the cloud security system and method of the present invention ensures effective threat detection by using accurate and reliable user behavior models.Type: GrantFiled: December 22, 2020Date of Patent: January 17, 2023Assignee: Skyhigh Security LLCInventors: Sandeep Chandana, Santosh Raghuram Kumar, Sekhar Sarukkai, Satyanarayana Vummidi, Madhavi Kavathekar, Vinay Gupta
-
Patent number: 11521147Abstract: A method of assessing a risk level of an enterprise using cloud-based services from one or more cloud service providers includes assessing provider risk scores associated with the one or more cloud service providers; assessing cloud service usage behavior and pattern of the enterprise; and generating a risk score for the enterprise based on the provider risk scores and on the cloud service usage behavior and pattern of the enterprise. The risk score is indicative of the risk of the enterprise relating to the use of the cloud-based services from the one or more cloud service providers.Type: GrantFiled: July 24, 2020Date of Patent: December 6, 2022Assignee: Skyhigh Security LLCInventors: Dejan Curcic, Rajiv Gupta, Kaushik Narayan, Prasad Raghavendra Somasamudram, Sekhar Sarukkai