Patents Assigned to Trend Micro Incorporated
-
Patent number: 11558375Abstract: A virtual keyboard rendered on a separate computing device is independent of the user's computer. A virtual keyboard displayed on the user's computer screen is blank without any alphanumeric characters. Another virtual keyboard displayed on the user's independent computing device has a randomly generated layout of alphanumeric characters on a keypad. The user enters a password by pressing the blank keys of the blank keyboard on his computer screen with reference to the other virtual keyboard. The position sequence of these entered keys is sent to an application on a remote server computer. The remote server computer shares a virtual keyboard having the randomly generated layout of characters with the independent computing device via an online or off-line technique. When online, an encoded image of the encrypted layout is sent to the client computer and displayed for scanning by the device.Type: GrantFiled: December 16, 2019Date of Patent: January 17, 2023Assignee: Trend Micro IncorporatedInventors: Jing Cao, Quan Yuan, Bo Liu
-
Patent number: 11539755Abstract: An inline network traffic monitor is deployed inline between two endpoints of a computer network. A particular endpoint of the two endpoints works in conjunction with the inline network traffic monitor to decrypt encrypted network traffic transmitted between the two endpoints. A series of Change Cipher Spec (CCS) messages is exchanged between the inline network traffic monitor and the particular endpoint during a Transport Layer Security (TLS) handshake between the two endpoints. The series of CCS messages allows the particular endpoint and the inline network traffic monitor to detect each other on the computer network. After detecting each other's presence, the particular endpoint sends the inline network traffic monitor a session key that is used by the two endpoints to encrypt their network traffic. The inline network traffic monitor uses the session key to decrypt encrypted data of the network traffic transmitted between the two endpoints.Type: GrantFiled: March 22, 2021Date of Patent: December 27, 2022Assignee: Trend Micro IncorporatedInventor: Kevin G. Boyce
-
Patent number: 11516249Abstract: An attachment to an e-mail message received at an e-mail gateway is scanned by a scan server and then is converted into an HTML file. The HTML file includes preview data of the attachment (minus any macro scripts), the entire original data of the attachment, scan functionality enabling a user to send the attachment back to a scan server for a second scan, or extract functionality enabling a user to extract the original attachment data for saving or opening in an application. The recipient is able to open or save the attachment directly if he or she believes it comes from a trusted sender. If the attachment seems suspicious, the recipient previews the attachment first before performing a scan, opening the attachment or deleting it. The recipient performs a scan of the attachment by clicking a “scan” button to send the attachment to a backend server for a second scan where an updated virus pattern file may be available to detect any zero-day malware.Type: GrantFiled: April 19, 2021Date of Patent: November 29, 2022Assignee: Trend Micro IncorporatedInventors: Jing Cao, Quan Yuan, Bo Liu
-
Patent number: 11510061Abstract: A pause command is sent to a Subscriber Identity Module (SIM) card of a cellular device in response to detecting a cyberattack against the cellular device on the cellular network. To mitigate the cyberattack, the SIM card temporarily disconnects the cellular device from the cellular network for a pause time. The SIM card prohibits the cellular device from connecting to the cellular network during the pause time and automatically allows the cellular device to reconnect to the cellular network after the pause time.Type: GrantFiled: December 30, 2020Date of Patent: November 22, 2022Assignee: Trend Micro IncorporatedInventors: Chih-Shen Lin, Jyun-Yan Cheng, Ting-Yin Yen, Yi-Lun Li
-
Patent number: 11481492Abstract: Disclosed are a method and system for static behavior-predictive malware detection. The method and system use a transfer learning model from behavior prediction to malware detection based on static features. In accordance with an embodiment, machine learning is used to capture the relations between static features, behavior features, and other context information. For example, the machine learning may be implemented with a deep learning network model with multiple embedded layers pre-trained with metadata gathered from various resources, including sandbox logs, simulator logs and context information. Synthesized behavior-related static features are generated by projecting the original static features to the behavior features. A final static model may then be trained using the combination of the original static features and the synthesized features as the training data. The detection stage may be performed in real time with static analysis because only static features are needed.Type: GrantFiled: July 25, 2017Date of Patent: October 25, 2022Assignee: TREND MICRO INCORPORATEDInventors: Wen-Kwang Tsao, Chia-Yen Chang, PingHuan Wu
-
Patent number: 11449794Abstract: Language-based machine learning approach for automatically detecting universal charset and the language of a received document is disclosed. The language-based machine learning approach employs a plurality of text document samples in different languages, after converting them to a selected Unicode style (if their original encoding schemes are not the selected Unicode), to generate a plurality of language-based machine learning models during the training stage. During the application stage, vector representations of the received document for different combinations of charsets and their respective applicable languages are tested against the plurality of machine learning models to ascertain the charset and language combination that is most similar to its associated machine learning model, thereby identifying the charset and language of the received document.Type: GrantFiled: August 21, 2019Date of Patent: September 20, 2022Assignee: Trend Micro IncorporatedInventor: Lili Diao
-
Patent number: 11440190Abstract: An automation task program is inspected for unsecure data flow. The task program is parsed to generate a parse tree, which is visited to generate control flow graphs of functions of the task program. The control flow graphs have nodes, which have domain-agnostic intermediate representations. The control flow graphs are connected to form an intermediate control flow graph. The task program is deemed to have an unsecure data flow when data is detected to flow from a data source to a data sink, with the data source and the data sink forming a source-sink pair that is indicative of an unsecure data flow.Type: GrantFiled: March 18, 2020Date of Patent: September 13, 2022Assignee: TREND MICRO INCORPORATEDInventors: Federico Maggi, Marcello Pogliani, Davide Quarta, Martino Vittone, Stefano Zanero
-
Patent number: 11379578Abstract: Systems and methods are presented for performing sandboxing to detect malware. Sample files are received and activated individually in separate sandboxes in one mode of operation. In another mode of operation, sample files are assigned to pools. Sample files of a pool are activated together in the same sandbox. The sample files of the pool are deemed to be normal when no anomalous event is detected in the sandbox. Otherwise, when an anomalous event is detected in the sandbox, the sample files of the pool are activated separately in separate sandboxes to isolate and identify malware among the sample files.Type: GrantFiled: October 16, 2020Date of Patent: July 5, 2022Assignee: TREND MICRO INCORPORATEDInventors: Jun Qu, Zhichao Ding, Renkui Tao
-
Patent number: 11356853Abstract: A mobile app is in a form of a package file. A structural feature digest is generated from contents of a manifest part, bytecode part, and resource part of the package file. A mobile device receives an unknown mobile app, generates a structural feature digest of the unknown mobile app, and sends the structural feature digests to a backend system over a computer network. In the backend system, the structural feature digest of the unknown mobile app is compared to structural feature digests of known malicious mobile apps. The unknown mobile app is detected to be malicious when its structural feature digest is similar to that of a known malicious mobile app.Type: GrantFiled: September 22, 2020Date of Patent: June 7, 2022Assignee: TREND MICRO INCORPORATEDInventors: Longping Wu, Hua Ye, Bin Yin, Zhihua Zhou, Zhengbao Zhang
-
Patent number: 11354433Abstract: Taint is dynamically tracked on a mobile device. Taint virtual instructions are added to virtual instructions of a control-flow graph (CFG). A taint virtual instruction has a taint operand that corresponds to an operand of a virtual instruction and has a taint output that corresponds to an output of the virtual instruction in a block of the CFG. Registers are allocated for the taint virtual instruction and the virtual instructions. After register allocation, the taint virtual instruction and the virtual instructions are converted to native code, which is executed to track taint on the mobile device.Type: GrantFiled: March 25, 2019Date of Patent: June 7, 2022Assignee: Trend Micro IncorporatedInventors: Liang Sun, Xingxing Sun, Hua Ye
-
Patent number: 11349926Abstract: A system includes Internet of things (IOT) devices that are paired with corresponding edge computers. Smart contracts are generated for edge computers, and deployed in a blockchain. Upon receipt of a message, a smart contract compares a sender of the message to a designated owner of the smart contract. The smart contract has a privilege checker that allows a message from the owner of the smart contract to initiate execution of a function that modifies a variable of the smart contract, but prevents messages from non-owners from initiating execution of the function.Type: GrantFiled: April 2, 2019Date of Patent: May 31, 2022Assignee: Trend Micro IncorporatedInventors: Tai-An Wang, Liang-Chih Chen, Yu-Shu Chen, Ting-Yin Yen
-
Patent number: 11316894Abstract: A system for detecting leakage of email addresses generates an alias email address that will be used by a user to register with a web service. The alias email address is an alias for a primary email address of the user, and is paired with the web service. The web service is included in a whitelist upon confirmation from the web service that the alias email address has been registered with the web service. Emails that are addressed to the alias email address and from the web service are forwarded to the primary email address. Emails that are addressed to the alias email address but is not from the web service are detected to be suspicious.Type: GrantFiled: September 3, 2019Date of Patent: April 26, 2022Assignee: Trend Micro IncorporatedInventors: Tomoyuki Shiga, Machika Mase, Hiroshi Hasegawa
-
Patent number: 11310285Abstract: Adaptive network security policies can be selected by assigning a number of risk values to security intelligence associated with network traffic, and identifying a number of security policies to implement based on the risk values.Type: GrantFiled: July 2, 2019Date of Patent: April 19, 2022Assignee: Trend Micro IncorporatedInventors: Harry A. Bryson, Malcolm Dodds, Wei Lu, Julian Palmer
-
Patent number: 11310142Abstract: Network attacks are detected by a protocol engine that works in conjunction with one or more streaming protocol analyzers. The protocol engine receives network packets over a computer network and generates metadata of the network packets. The metadata are placed in a transport envelope, which is streamed over the computer network. The transport envelope is received over the computer network. After receiving the transport envelope over the computer network, the metadata are extracted from the transport envelope and provided to the one or more streaming protocol analyzers, which analyze the metadata to detect network attacks.Type: GrantFiled: April 23, 2021Date of Patent: April 19, 2022Assignee: Trend Micro IncorporatedInventors: Kevin G. Boyce, Troy W. Tuttle
-
Patent number: 11308403Abstract: Critical network assets of a private computer are automatically identified by training a machine learning model with histograms of features obtained by aggregating data of log entries. The model is deployed in a private computer network and retrained using training data set of the private computer network. Data from log entries of a target network asset are aggregated, numerically transformed, and converted into features histograms. The features histograms are concatenated into a single file, which is provided to the machine learning model for prediction. The machine learning model outputs a prediction score that gives an indication of whether or not the target network asset is critical.Type: GrantFiled: May 4, 2017Date of Patent: April 19, 2022Assignee: Trend Micro IncorporatedInventors: Ping-I Chou, Yen-Shuo Huang
-
Patent number: 11296868Abstract: A cyber threat intelligence of a cyber threat includes a threat chain that describes objects involved in the cyber threat and relationships between the objects. A related object hash of an object is calculated by calculating a hash of one or more objects that are linked to the object as indicated in the cyber threat intelligence. A related object sequence hash of the threat chain is generated by calculating a total of the related object hashes. The related object sequence hash of the threat chain is compared to a related object sequence hash of another threat chain to detect cyber threats.Type: GrantFiled: September 17, 2019Date of Patent: April 5, 2022Assignee: Trend Micro IncorporatedInventor: Ardin Christopher C. Maglalang
-
Patent number: 11288594Abstract: In one example in accordance with the present disclosure, a method for domain classification includes sorting a set of sample domains into leaves based on syntactical features of the domains. Each sample domain belongs to a family of domains. The method also includes identifying, for each leaf, a regular expression for each family with at least one domain in the leaf. The method also includes determining, for each leaf, at least one lobe with a set of domains in the leaf that matches the regular expression for a first family with at least one domain in the leaf, and that does not match the regular expression for the other families with at least one domain in the leaf. The method also includes creating a classifier for the domains in each lobe by using the set of domains from each family in the lobe as training classes for machine learning.Type: GrantFiled: February 8, 2018Date of Patent: March 29, 2022Assignee: Trend Micro IncorporatedInventors: Josiah Dede Hagen, Prasad V. Rao, Miranda Jane Felicity Mowbray
-
Patent number: 11270000Abstract: A cybersecurity server receives an executable file that has bytecode and metadata of the bytecode. Strings are extracted from the metadata, sorted, and merged into data streams. The data streams are merged to form a combined data stream. A digest of the combined data stream is calculated using a fuzzy hashing algorithm. The similarity of the digest to another digest is determined to detect whether or not the executable file is malware or a member of a malware family.Type: GrantFiled: November 7, 2019Date of Patent: March 8, 2022Assignee: Trend Micro IncorporatedInventors: Chia-Ming Chiang, Po-Han Hao, Kuo-Cheng Wang
-
Patent number: 11263500Abstract: A method for designating a given image as similar/dissimilar with respect to a reference image is provided. The method includes normalizing the image. Normalizing includes performing pre-processing and a lossy compression on the given image to obtain a lossy representation. The pre-processing includes at least one of cropping, fundamental extracting, gray scale converting and lower color bit converting. The method also includes comparing the lossy representation of the given image with a reference representation, which is a version of a reference spam image after the reference spam image has undergone a similar normalizing process as normalizing. The method further includes, if the lossy representation of the given image matches the reference representation, designating the given image similar to the reference image. The method yet also includes, if the lossy representation of the given image does not match the reference representation, designating the given image dissimilar to the reference image.Type: GrantFiled: August 8, 2019Date of Patent: March 1, 2022Assignee: Trend Micro IncorporatedInventors: Jonathan James Oliver, Yun-Chian Chang
-
Patent number: 11258825Abstract: A cybersecurity system includes sensors that detect and report computer security events. Collected reports of computer security events are formed into state sequences, which are used as training data to train and build a prediction model. A current computer security event is detected and used as an input to the prediction model, which provides a prediction of a next computer security event. A monitoring level of a cybersecurity sensor is adjusted in accordance with the predicted next computer security event.Type: GrantFiled: July 18, 2019Date of Patent: February 22, 2022Assignee: Trend Micro IncorporatedInventors: Chin-En Yang, Wen-Kwang Tsao, Yi-De Wu, Yu-Hsuan Chou, Jaime Yaneza, Jr.