Patents Examined by C. Lewis
-
Patent number: 10268821Abstract: Disclosed herein is a method for detection of a cyber-threat to a computer system. The method is arranged to be performed by a processing apparatus. The method comprises receiving input data associated with a first entity associated with the computer system, deriving metrics from the input data, the metrics representative of characteristics of the received input data, analyzing the metrics using one or more models, and determining, in accordance with the analyzed metrics and a model of normal behavior of the first entity, a cyber-threat risk parameter indicative of a likelihood of a cyber-threat. A computer readable medium, a computer program and a threat detection system are also disclosed.Type: GrantFiled: August 3, 2015Date of Patent: April 23, 2019Assignee: Darktrace LimitedInventors: Jack Stockdale, Alex Markham
-
Patent number: 10271164Abstract: Provided are exemplary embodiments including a method for creating and using a personal encounter history using a communication device. The method involves the communication device receiving the transmission of a pseudo identifier from a proximal communication device where the pseudo identifier is associated with the user of the proximal communication device. Once received, the method continues with the wireless communication device requesting and receiving the actual identification of the user of the proximal communication device that is correlated with the pseudo identifier. The communication device includes a transceiver capable of communicating wirelessly with a mobile telecommunications network, a memory device and a processor. To ensure privacy, the processor is capable of receiving a pseudo identifier from a proximate communication device and then requesting an actual identification correlated with the pseudo identifier of the proximate communication device.Type: GrantFiled: September 26, 2016Date of Patent: April 23, 2019Assignee: AT&T Intellectual Property I, L.P.Inventor: Jeffrey A. Aaron
-
Patent number: 10250588Abstract: The disclosed computer-implemented method for determining reputations of digital certificate signers may include (i) identifying a group of endpoint devices that have accessed files to which a digital certificate signer has attached digital certificates that assert the files are legitimate, (ii) determining, for each endpoint device, whether a security state of the endpoint device is compromised or uncompromised based on a security analysis of computing events detected on the endpoint device, (iii) classifying the digital certificate signer as potentially malicious by determining that the files were accessed more frequently by endpoint devices with compromised security states than by endpoint devices with uncompromised security states, and (iv) protecting a security state of an additional endpoint device by preventing the additional endpoint device from accessing a file with a digital certificate signed by the digital certificate signer.Type: GrantFiled: March 7, 2017Date of Patent: April 2, 2019Assignee: Symantec CorporationInventors: Shayak Tarafdar, Sunil Kumar, Pratik Vagyani
-
Patent number: 10242230Abstract: In an example embodiment, a method for protecting against confidential data-based inference attacks in a computer system is provided. A first confidential data value is received. Then a modification value is selected based on a level of privacy specified for the computer system. Then the first confidential data value is altered by adding the modification value to the first confidential data value.Type: GrantFiled: July 29, 2016Date of Patent: March 26, 2019Assignee: Microsoft Technology Licensing, LLCInventors: Krishnaram Kenthapadi, Ahsan Chudhary, Ryan Wade Sandler, Anthony Duane Duerr
-
Patent number: 10243990Abstract: A system and method for detecting replay attacks on secure data are disclosed. A system on a chip (SOC) includes a security processor. Blocks of data corresponding to sensitive information are stored in off-chip memory. The security processor uses an integrity data structure, such as an integrity tree, for the blocks. The intermediate nodes of the integrity tree use nonces which have been generated independent of any value within a corresponding block. By using only the nonces to generate tags in the root at the top layer stored in on-chip memory and the nodes of the intermediate layers stored in off-chip memory, an amount of storage used is reduced for supporting the integrity tree. When the security processor detects events which create access requests for one or more blocks, the security processor uses the integrity tree to verify a replay attack has not occurred and corrupted data.Type: GrantFiled: September 23, 2016Date of Patent: March 26, 2019Assignee: Apple Inc.Inventors: Zhimin Chen, Timothy R. Paaske, Gilbert H. Herbeck
-
Patent number: 10243927Abstract: A proxy server receives, from multiple visitors of multiple client devices, a plurality of requests for actions to be performed on identified network resources belonging to a plurality of origin servers. At least some of the origin servers belong to different domains and are owned by different entities. The proxy server and the origin servers are also owned by different entities. The proxy server analyzes each request it receives to determine whether that request poses a threat and whether the visitor belonging to the request poses a threat. The proxy server blocks those requests from visitors that pose a threat or in which the request itself poses a threat. The proxy server transmits the requests that are not a threat and is from a visitor that is not a threat to the appropriate origin server.Type: GrantFiled: October 29, 2013Date of Patent: March 26, 2019Assignee: CLOUDFLARE, INCInventors: Lee Hahn Holloway, Matthew Browning Prince, Ian Gerald Pye, Matthieu Philippe François Tourne, Michelle Marie Zatlyn
-
Patent number: 10235442Abstract: A computer system includes a server having a memory connected thereto. The server is adapted to be connected to a network to permit remote storage and retrieval of data files from the memory. A file identification application is operative with the server to identify errant files stored in the memory. The file identification application provides the functions of: (1) selecting a file stored in said memory; (2) generating a unique checksum corresponding to the stored fire; (3) comparing said unique checksum to each of a plurality of previously generated checksums, wherein the plurality of previously generated checksums correspond to known errant files; and (4) marking the file for deletion from the memory if the unique checksum matches one of the plurality of previously generated checksums.Type: GrantFiled: January 18, 2016Date of Patent: March 19, 2019Assignee: INTELLECTUAL VENTURES I LLCInventor: Gary Stephen Shuster
-
Patent number: 10237297Abstract: A system and method for evaluating cyber-security threat incidents of a computer network is described in this document. In particular, it is described that cyber-security threat incidents of a computer network may be visualized by displaying these threat incidents as a plurality of graphical objects on a display of a device. A subset of these graphical objects or threat incidents may then be selected by applying a single continuous touch input to a touch interface of the device. A risk score will then be generated and displayed based on the threat incidents that are contained within the subset of graphical objects. Mitigation actions addressing the cyber-security threats that triggered these threat incidents are then implemented by the device.Type: GrantFiled: April 11, 2016Date of Patent: March 19, 2019Assignee: Certis Cisco Security Pte LtdInventor: Keng Leng Albert Lim
-
Patent number: 10194317Abstract: The present invention discloses methods and systems for performing at least one action at a system according to a user's gesture information. The required steps comprises of capturing the user's gestures information by a mobile apparatus, wherein the apparatus comprises an antenna, a processor, a storage medium, at least one accelerometer, wherein the accelerometer has at least 3 axis; comparing gesture information against one or more predefined gesture information at the mobile apparatus and when the gesture information matches a predefined gesture information, the mobile apparatus selects a first identity based on the predefined gesture information, sends encrypted information to a system through a reader wherein the encrypted information comprises the predefined gesture information, the first identity, a timestamp, and a device identity. The system performs at least one action according to the encrypted information.Type: GrantFiled: December 31, 2015Date of Patent: January 29, 2019Assignee: PISMO LABS TECHNOLOGY LIMITEDInventors: Alex Wing Hong Chan, Ming Pui Chong
-
Patent number: 10192053Abstract: The present invention provides a method, apparatus, system, device and a computer storage medium for treating virus. A client reports a scan log to a cloud service platform, and/or reports virus family information to the cloud service platform after the virus family information is identified based on the scan log. The cloud service platform identifies the scan log to obtain virus family information, and/or issues the virus removal instruction corresponding to the virus family information to the client after receiving the virus family information from the client, for the client to execute the virus removal instruction. Compared with the method of simply performing the behavior analysis and deleting files by the client, it is more advantageous that the method of the present invention issues virus removal instructions regarding the virus family information from the cloud, the virus treating is more personalized and precise, and the security of the machine system is improved.Type: GrantFiled: June 29, 2015Date of Patent: January 29, 2019Assignee: Baidu Online Network Technology (Beijing) Co., Ltd.Inventors: Rongxin Zou, Yinming Mei, Zhu Xiang, Hanzhong Hu
-
Patent number: 10193930Abstract: According to one embodiment, a system includes a processing circuit and logic integrated with and/or executable by the processing circuit. The logic is configured to cause the processing circuit to determine, by an application operating on a first host in a network, one or more security features and/or capabilities available to the application for protecting the application and first data used by the application from unauthorized activity. The logic is also configured to cause the processing circuit to send, by an ADPL operating on the first host via a data socket descriptor, a first message to one or more peer applications in the network, the first message including indication of the one or more security features and/or capabilities available to the application. The logic may further cause the processing circuit to receive a second message indicating security features available to a peer application in the network operating on another host.Type: GrantFiled: June 29, 2016Date of Patent: January 29, 2019Assignee: AVOCADO SYSTEMS INC.Inventors: Keshav Govind Kamble, Amitabh Sinha
-
Patent number: 10187418Abstract: A system and method for identifying and preventing vulnerability exploitation is provided. The system comprises a processor and memory. The memory stores one or more programs comprising instructions to execute a method. The method first comprises comparing a first version of a software module with a second version of a software module. Second, the system determines one or more differences between the first version and the second version. Next, the system represents the one or more differences as symbolic constraints. Last, the system generates a firewall for identifying exploitative input using the symbolic constraints.Type: GrantFiled: July 13, 2016Date of Patent: January 22, 2019Assignee: NARF INDUSTRIES, LLCInventors: Paul Makowski, Benjamin Schmidt
-
Patent number: 10182068Abstract: Example embodiments disclosed herein relate to determination of vulnerability of an application under test using a runtime agent and network sniffer during a security test. A runtime agent monitors execution of an application under test. A network sniffer is used to identify a probe value for determination of the vulnerability.Type: GrantFiled: November 26, 2014Date of Patent: January 15, 2019Assignee: ENTIT SOFTWARE LLCInventors: Alvaro Munoz, Sasi Siddharth Muthurajan
-
Patent number: 10182049Abstract: Implementations of a system and method of generating and using bilaterally generated variable instant passwords are disclosed. In some implementations, a computer implemented method of Authenticated Dialogue Initiation between a USER and another party is provided. In some implementations, the USER may attempt to establish a connection with another party at their IP address; the other party may be known or unknown by the USER. In this implementation, a publically available authentication device, comprised of a variable character set, is used to generate a CALL for a password. The password is used to authenticate the other party; authentication is to completed once the correct password is received from the IP address of the party contacted by the USER. In some implementations, Authenticated Dialogue Initiation may be used to control (e.g., grant, deny, and/or limit) another party's access to the USER's computer system.Type: GrantFiled: September 23, 2017Date of Patent: January 15, 2019Inventor: Abdul Rahman Syed Ebrahim Abdul Hameed Khan
-
Patent number: 10178082Abstract: Disclosed are various embodiments that facilitate bootstrap authentication of a second application by way of a user confirmation via a first application. The first application is authenticated using trusted credentials. A first application is authenticated with an authentication service using the security credential. Text input is sent from the first application to the second application via the network. The text input is sent to a text entry field on the second application.Type: GrantFiled: June 23, 2017Date of Patent: January 8, 2019Assignee: Amazon Technologies, Inc.Inventors: Harsha Ramalingam, Jesper Mikael Johansson, Bharath Kumar Bhimanaik
-
Patent number: 10169572Abstract: The invention relates to management of programs on a mobile device, and in particular, to a method for activating application programs on a mobile device, and a mobile device based on this method. The method for activating application programs on a mobile device according to an embodiment of the invention comprises the following steps: receiving an application request from a device which is located outside the mobile device; identifying a transmission protocol associated with the application request; and if there are a plurality of safety entities in the mobile device which support the transmission protocol and store application programs associated with the application request, activating an application program associated with the application request in a default safety entity.Type: GrantFiled: March 17, 2014Date of Patent: January 1, 2019Assignee: CHINA UNIONPAY CO., LTD.Inventors: Hongfeng Chai, Zhijun Lu, Shuo He, Yu Zhou, Wei Guo, Dingzhou Li
-
Patent number: 10169576Abstract: Embodiments of the invention provide for malware collusion detection in a mobile computing device. In one embodiment, a method for malicious inter-application interaction detection in a mobile computing device includes filtering applications installed in a mobile device to a set of related applications and then monitoring in the mobile device execution of the related applications in the set. The method additionally includes computing resource utilization of one of the related applications executing in a background of the mobile device while also computing execution performance of a different one of the related applications. Finally, the method includes responding to a determination that the computed resource utilization is high while the computed execution performance is poor by generating a notification in the display of the mobile device that the one of the related applications is suspected of malware collusion with the different one of the related applications.Type: GrantFiled: November 15, 2016Date of Patent: January 1, 2019Assignee: International Business Machines CorporationInventors: Vijay Ekambaram, Roger C. Snook, Leigh Williamson, Shinoj Zacharias
-
Patent number: 10165004Abstract: Techniques to facilitate passive detection of forged web browsers are disclosed herein. In at least one implementation, web traffic between a web server and a client is monitored, and a hypertext transfer protocol (HTTP) header transmitted by the client is processed to determine a type of web browser associated with the client. Attribute data points for the client are generated based on fields in the HTTP request header transmitted by the client and connection behavior of the client with the web server. The attribute data points for the client are then compared with predetermined attribute data points for the type of web browser associated with the client to determine if the client is a genuine web browser of the type of web browser associated with the client.Type: GrantFiled: March 14, 2016Date of Patent: December 25, 2018Assignee: Cequence Security, Inc.Inventors: Shreyans Mehta, Ameya Talwalkar
-
Patent number: 10165441Abstract: The claimed subject matter provides systems and/or methods that effectuate a simple protocol for tangible security on mobile devices. The system can include devices that generate sets of keys and associated secret identifiers, employs the one or more keys to encrypt a secret and utilizes the identifiers and encryptions of the secret to populate a table associated with a security token device that is used in conjunction with a mobile device to release sensitive information persisted on the mobile device for user selected purposes.Type: GrantFiled: September 22, 2016Date of Patent: December 25, 2018Assignee: Microsoft Technology Licensing, LLCInventors: YuQun Chen, Michael J. Sinclair, Josh D. Benaloh
-
Patent number: 10162969Abstract: A system and method for analyzing cyber-security risk inter-dependencies in a control system having networked devices. The system includes a central server that has a processor and a memory device in communication with the processor. The memory device stores inter-device dependencies and quantified individual risks for each of the networked devices. The memory device also stores a dynamic quantification of risk (DQR) program. The central server is programmed to implement the DQR program. Responsive to observed cyber behavior, the central server changes one or more of the quantified individual risks to generate at least one modified quantified individual risk. The inter-device dependencies for a first of the networked devices and the quantified individual risk for at least one other of the networked devices reflecting the modified quantified individual risk are used to dynamically modify the quantified individual risk for the first device to generate an inter-device modified quantified individual risk.Type: GrantFiled: September 10, 2014Date of Patent: December 25, 2018Assignee: Honeywell International Inc.Inventor: Eric D. Knapp