Patents Assigned to Trend Micro Incorporated
  • Patent number: 11558375
    Abstract: A virtual keyboard rendered on a separate computing device is independent of the user's computer. A virtual keyboard displayed on the user's computer screen is blank without any alphanumeric characters. Another virtual keyboard displayed on the user's independent computing device has a randomly generated layout of alphanumeric characters on a keypad. The user enters a password by pressing the blank keys of the blank keyboard on his computer screen with reference to the other virtual keyboard. The position sequence of these entered keys is sent to an application on a remote server computer. The remote server computer shares a virtual keyboard having the randomly generated layout of characters with the independent computing device via an online or off-line technique. When online, an encoded image of the encrypted layout is sent to the client computer and displayed for scanning by the device.
    Type: Grant
    Filed: December 16, 2019
    Date of Patent: January 17, 2023
    Assignee: Trend Micro Incorporated
    Inventors: Jing Cao, Quan Yuan, Bo Liu
  • Patent number: 11539755
    Abstract: An inline network traffic monitor is deployed inline between two endpoints of a computer network. A particular endpoint of the two endpoints works in conjunction with the inline network traffic monitor to decrypt encrypted network traffic transmitted between the two endpoints. A series of Change Cipher Spec (CCS) messages is exchanged between the inline network traffic monitor and the particular endpoint during a Transport Layer Security (TLS) handshake between the two endpoints. The series of CCS messages allows the particular endpoint and the inline network traffic monitor to detect each other on the computer network. After detecting each other's presence, the particular endpoint sends the inline network traffic monitor a session key that is used by the two endpoints to encrypt their network traffic. The inline network traffic monitor uses the session key to decrypt encrypted data of the network traffic transmitted between the two endpoints.
    Type: Grant
    Filed: March 22, 2021
    Date of Patent: December 27, 2022
    Assignee: Trend Micro Incorporated
    Inventor: Kevin G. Boyce
  • Patent number: 11516249
    Abstract: An attachment to an e-mail message received at an e-mail gateway is scanned by a scan server and then is converted into an HTML file. The HTML file includes preview data of the attachment (minus any macro scripts), the entire original data of the attachment, scan functionality enabling a user to send the attachment back to a scan server for a second scan, or extract functionality enabling a user to extract the original attachment data for saving or opening in an application. The recipient is able to open or save the attachment directly if he or she believes it comes from a trusted sender. If the attachment seems suspicious, the recipient previews the attachment first before performing a scan, opening the attachment or deleting it. The recipient performs a scan of the attachment by clicking a “scan” button to send the attachment to a backend server for a second scan where an updated virus pattern file may be available to detect any zero-day malware.
    Type: Grant
    Filed: April 19, 2021
    Date of Patent: November 29, 2022
    Assignee: Trend Micro Incorporated
    Inventors: Jing Cao, Quan Yuan, Bo Liu
  • Patent number: 11510061
    Abstract: A pause command is sent to a Subscriber Identity Module (SIM) card of a cellular device in response to detecting a cyberattack against the cellular device on the cellular network. To mitigate the cyberattack, the SIM card temporarily disconnects the cellular device from the cellular network for a pause time. The SIM card prohibits the cellular device from connecting to the cellular network during the pause time and automatically allows the cellular device to reconnect to the cellular network after the pause time.
    Type: Grant
    Filed: December 30, 2020
    Date of Patent: November 22, 2022
    Assignee: Trend Micro Incorporated
    Inventors: Chih-Shen Lin, Jyun-Yan Cheng, Ting-Yin Yen, Yi-Lun Li
  • Patent number: 11481492
    Abstract: Disclosed are a method and system for static behavior-predictive malware detection. The method and system use a transfer learning model from behavior prediction to malware detection based on static features. In accordance with an embodiment, machine learning is used to capture the relations between static features, behavior features, and other context information. For example, the machine learning may be implemented with a deep learning network model with multiple embedded layers pre-trained with metadata gathered from various resources, including sandbox logs, simulator logs and context information. Synthesized behavior-related static features are generated by projecting the original static features to the behavior features. A final static model may then be trained using the combination of the original static features and the synthesized features as the training data. The detection stage may be performed in real time with static analysis because only static features are needed.
    Type: Grant
    Filed: July 25, 2017
    Date of Patent: October 25, 2022
    Assignee: TREND MICRO INCORPORATED
    Inventors: Wen-Kwang Tsao, Chia-Yen Chang, PingHuan Wu
  • Patent number: 11449794
    Abstract: Language-based machine learning approach for automatically detecting universal charset and the language of a received document is disclosed. The language-based machine learning approach employs a plurality of text document samples in different languages, after converting them to a selected Unicode style (if their original encoding schemes are not the selected Unicode), to generate a plurality of language-based machine learning models during the training stage. During the application stage, vector representations of the received document for different combinations of charsets and their respective applicable languages are tested against the plurality of machine learning models to ascertain the charset and language combination that is most similar to its associated machine learning model, thereby identifying the charset and language of the received document.
    Type: Grant
    Filed: August 21, 2019
    Date of Patent: September 20, 2022
    Assignee: Trend Micro Incorporated
    Inventor: Lili Diao
  • Patent number: 11440190
    Abstract: An automation task program is inspected for unsecure data flow. The task program is parsed to generate a parse tree, which is visited to generate control flow graphs of functions of the task program. The control flow graphs have nodes, which have domain-agnostic intermediate representations. The control flow graphs are connected to form an intermediate control flow graph. The task program is deemed to have an unsecure data flow when data is detected to flow from a data source to a data sink, with the data source and the data sink forming a source-sink pair that is indicative of an unsecure data flow.
    Type: Grant
    Filed: March 18, 2020
    Date of Patent: September 13, 2022
    Assignee: TREND MICRO INCORPORATED
    Inventors: Federico Maggi, Marcello Pogliani, Davide Quarta, Martino Vittone, Stefano Zanero
  • Patent number: 11379578
    Abstract: Systems and methods are presented for performing sandboxing to detect malware. Sample files are received and activated individually in separate sandboxes in one mode of operation. In another mode of operation, sample files are assigned to pools. Sample files of a pool are activated together in the same sandbox. The sample files of the pool are deemed to be normal when no anomalous event is detected in the sandbox. Otherwise, when an anomalous event is detected in the sandbox, the sample files of the pool are activated separately in separate sandboxes to isolate and identify malware among the sample files.
    Type: Grant
    Filed: October 16, 2020
    Date of Patent: July 5, 2022
    Assignee: TREND MICRO INCORPORATED
    Inventors: Jun Qu, Zhichao Ding, Renkui Tao
  • Patent number: 11356853
    Abstract: A mobile app is in a form of a package file. A structural feature digest is generated from contents of a manifest part, bytecode part, and resource part of the package file. A mobile device receives an unknown mobile app, generates a structural feature digest of the unknown mobile app, and sends the structural feature digests to a backend system over a computer network. In the backend system, the structural feature digest of the unknown mobile app is compared to structural feature digests of known malicious mobile apps. The unknown mobile app is detected to be malicious when its structural feature digest is similar to that of a known malicious mobile app.
    Type: Grant
    Filed: September 22, 2020
    Date of Patent: June 7, 2022
    Assignee: TREND MICRO INCORPORATED
    Inventors: Longping Wu, Hua Ye, Bin Yin, Zhihua Zhou, Zhengbao Zhang
  • Patent number: 11354433
    Abstract: Taint is dynamically tracked on a mobile device. Taint virtual instructions are added to virtual instructions of a control-flow graph (CFG). A taint virtual instruction has a taint operand that corresponds to an operand of a virtual instruction and has a taint output that corresponds to an output of the virtual instruction in a block of the CFG. Registers are allocated for the taint virtual instruction and the virtual instructions. After register allocation, the taint virtual instruction and the virtual instructions are converted to native code, which is executed to track taint on the mobile device.
    Type: Grant
    Filed: March 25, 2019
    Date of Patent: June 7, 2022
    Assignee: Trend Micro Incorporated
    Inventors: Liang Sun, Xingxing Sun, Hua Ye
  • Patent number: 11349926
    Abstract: A system includes Internet of things (IOT) devices that are paired with corresponding edge computers. Smart contracts are generated for edge computers, and deployed in a blockchain. Upon receipt of a message, a smart contract compares a sender of the message to a designated owner of the smart contract. The smart contract has a privilege checker that allows a message from the owner of the smart contract to initiate execution of a function that modifies a variable of the smart contract, but prevents messages from non-owners from initiating execution of the function.
    Type: Grant
    Filed: April 2, 2019
    Date of Patent: May 31, 2022
    Assignee: Trend Micro Incorporated
    Inventors: Tai-An Wang, Liang-Chih Chen, Yu-Shu Chen, Ting-Yin Yen
  • Patent number: 11316894
    Abstract: A system for detecting leakage of email addresses generates an alias email address that will be used by a user to register with a web service. The alias email address is an alias for a primary email address of the user, and is paired with the web service. The web service is included in a whitelist upon confirmation from the web service that the alias email address has been registered with the web service. Emails that are addressed to the alias email address and from the web service are forwarded to the primary email address. Emails that are addressed to the alias email address but is not from the web service are detected to be suspicious.
    Type: Grant
    Filed: September 3, 2019
    Date of Patent: April 26, 2022
    Assignee: Trend Micro Incorporated
    Inventors: Tomoyuki Shiga, Machika Mase, Hiroshi Hasegawa
  • Patent number: 11310285
    Abstract: Adaptive network security policies can be selected by assigning a number of risk values to security intelligence associated with network traffic, and identifying a number of security policies to implement based on the risk values.
    Type: Grant
    Filed: July 2, 2019
    Date of Patent: April 19, 2022
    Assignee: Trend Micro Incorporated
    Inventors: Harry A. Bryson, Malcolm Dodds, Wei Lu, Julian Palmer
  • Patent number: 11310142
    Abstract: Network attacks are detected by a protocol engine that works in conjunction with one or more streaming protocol analyzers. The protocol engine receives network packets over a computer network and generates metadata of the network packets. The metadata are placed in a transport envelope, which is streamed over the computer network. The transport envelope is received over the computer network. After receiving the transport envelope over the computer network, the metadata are extracted from the transport envelope and provided to the one or more streaming protocol analyzers, which analyze the metadata to detect network attacks.
    Type: Grant
    Filed: April 23, 2021
    Date of Patent: April 19, 2022
    Assignee: Trend Micro Incorporated
    Inventors: Kevin G. Boyce, Troy W. Tuttle
  • Patent number: 11308403
    Abstract: Critical network assets of a private computer are automatically identified by training a machine learning model with histograms of features obtained by aggregating data of log entries. The model is deployed in a private computer network and retrained using training data set of the private computer network. Data from log entries of a target network asset are aggregated, numerically transformed, and converted into features histograms. The features histograms are concatenated into a single file, which is provided to the machine learning model for prediction. The machine learning model outputs a prediction score that gives an indication of whether or not the target network asset is critical.
    Type: Grant
    Filed: May 4, 2017
    Date of Patent: April 19, 2022
    Assignee: Trend Micro Incorporated
    Inventors: Ping-I Chou, Yen-Shuo Huang
  • Patent number: 11296868
    Abstract: A cyber threat intelligence of a cyber threat includes a threat chain that describes objects involved in the cyber threat and relationships between the objects. A related object hash of an object is calculated by calculating a hash of one or more objects that are linked to the object as indicated in the cyber threat intelligence. A related object sequence hash of the threat chain is generated by calculating a total of the related object hashes. The related object sequence hash of the threat chain is compared to a related object sequence hash of another threat chain to detect cyber threats.
    Type: Grant
    Filed: September 17, 2019
    Date of Patent: April 5, 2022
    Assignee: Trend Micro Incorporated
    Inventor: Ardin Christopher C. Maglalang
  • Patent number: 11288594
    Abstract: In one example in accordance with the present disclosure, a method for domain classification includes sorting a set of sample domains into leaves based on syntactical features of the domains. Each sample domain belongs to a family of domains. The method also includes identifying, for each leaf, a regular expression for each family with at least one domain in the leaf. The method also includes determining, for each leaf, at least one lobe with a set of domains in the leaf that matches the regular expression for a first family with at least one domain in the leaf, and that does not match the regular expression for the other families with at least one domain in the leaf. The method also includes creating a classifier for the domains in each lobe by using the set of domains from each family in the lobe as training classes for machine learning.
    Type: Grant
    Filed: February 8, 2018
    Date of Patent: March 29, 2022
    Assignee: Trend Micro Incorporated
    Inventors: Josiah Dede Hagen, Prasad V. Rao, Miranda Jane Felicity Mowbray
  • Patent number: 11270000
    Abstract: A cybersecurity server receives an executable file that has bytecode and metadata of the bytecode. Strings are extracted from the metadata, sorted, and merged into data streams. The data streams are merged to form a combined data stream. A digest of the combined data stream is calculated using a fuzzy hashing algorithm. The similarity of the digest to another digest is determined to detect whether or not the executable file is malware or a member of a malware family.
    Type: Grant
    Filed: November 7, 2019
    Date of Patent: March 8, 2022
    Assignee: Trend Micro Incorporated
    Inventors: Chia-Ming Chiang, Po-Han Hao, Kuo-Cheng Wang
  • Patent number: 11263500
    Abstract: A method for designating a given image as similar/dissimilar with respect to a reference image is provided. The method includes normalizing the image. Normalizing includes performing pre-processing and a lossy compression on the given image to obtain a lossy representation. The pre-processing includes at least one of cropping, fundamental extracting, gray scale converting and lower color bit converting. The method also includes comparing the lossy representation of the given image with a reference representation, which is a version of a reference spam image after the reference spam image has undergone a similar normalizing process as normalizing. The method further includes, if the lossy representation of the given image matches the reference representation, designating the given image similar to the reference image. The method yet also includes, if the lossy representation of the given image does not match the reference representation, designating the given image dissimilar to the reference image.
    Type: Grant
    Filed: August 8, 2019
    Date of Patent: March 1, 2022
    Assignee: Trend Micro Incorporated
    Inventors: Jonathan James Oliver, Yun-Chian Chang
  • Patent number: 11258825
    Abstract: A cybersecurity system includes sensors that detect and report computer security events. Collected reports of computer security events are formed into state sequences, which are used as training data to train and build a prediction model. A current computer security event is detected and used as an input to the prediction model, which provides a prediction of a next computer security event. A monitoring level of a cybersecurity sensor is adjusted in accordance with the predicted next computer security event.
    Type: Grant
    Filed: July 18, 2019
    Date of Patent: February 22, 2022
    Assignee: Trend Micro Incorporated
    Inventors: Chin-En Yang, Wen-Kwang Tsao, Yi-De Wu, Yu-Hsuan Chou, Jaime Yaneza, Jr.