Patents Examined by Jayesh M Jhaveri
-
Patent number: 11539689Abstract: Provided is a method, system, and apparatus for authenticating a user device. The method includes registering a device identifier with at least one transformation rule, receiving a request for authentication comprising a device identifier associated with a user device, obtaining a one-time password (OTP) in response to receiving the request, communicating the OTP to the user device, receiving a transformed OTP from the user device, and authenticating the user device based on the OTP, the transformed OTP, and the at least one transformation rule.Type: GrantFiled: January 19, 2021Date of Patent: December 27, 2022Assignee: Visa International Service AssociationInventors: Vaibhav Prakash Gajre, Veerabhadraiah Lingadhalli Matadha, Akon Samir Dey
-
Patent number: 11537752Abstract: A request is received from a trusted application to authorize a client application that requests a service offered by the trusted application. Whether the client application is authorized to access the trusted application is determined in view of the request. An authentication of a user of the client application is caused in response to determining the client application is authorized to access the trusted application. An authorization result is returned to the trusted application in view of the determining and the authentication.Type: GrantFiled: November 18, 2019Date of Patent: December 27, 2022Assignee: Red Hat, Inc.Inventor: David Zeuthen
-
Patent number: 11531755Abstract: Techniques are described herein that are capable of detecting ransomware among files using information that is not included in content of the files. The files are determined based on file-related operation(s) being performed on each of the files during a session of a cloud-based application. A subset of the files is determined such that each file in the subset has multiple file extensions during the session. A value, which is based on a number of the files in the subset, is compared to a threshold. A determination is made whether the files include the ransomware based on whether the value is greater than or equal to the threshold. An alert, which indicates that the files include the ransomware, is selectively triggered based on detection of whether the files include the ransomware.Type: GrantFiled: November 25, 2020Date of Patent: December 20, 2022Assignee: Microsoft Technology Licensing, LLCInventors: Danielle Rachel Poleg, Adi Rose Lefkowitz, Amos Avraham Rimon
-
Patent number: 11528298Abstract: A method and a system for preventing an activity of a malware application in a computer system are provided. The method comprising: receiving at least one artefact of a sandbox environment to be installed in the computer system for simulating the sandbox environment in the computer system; receiving an indication of at least one interaction of a given application with the at least one artefact; analyzing an activity of the given application to detect at least one of a first type event and a second type event triggered thereby after executing the at least one interaction; in response to the analyzing rendering a positive result: identifying the given application as being the malware application; and using data indicative of a digital footprint of the given application in the computer system for further updating the at least one artefact for further preventing the activity of the malware application.Type: GrantFiled: May 7, 2021Date of Patent: December 13, 2022Assignee: TRUST LTD.Inventors: Andrei Bryzgin, Pavel Suprunyuk
-
Patent number: 11522844Abstract: A key master service capable of operating on a service provider in a network enables is disclosed. The key master enables authorized parties to securely exchange client information without compromising client security. One feature of the key master service is the generation of a unique key for each client. All parties in an authorized universe access, exchange and modify client information by referencing the universal key, rather than using known client identifiers. Client information is further secured by advantageously applying an obfuscation function to the data. Obfuscated client information is stored together with the universal key as keyed client data at the client and/or server, where it may be directly accessed by the service provider or third parties. Because client information is stored and exchanged without the ability to discern either the client identity or the nature of the information, such information is secured against malicious third-party interception.Type: GrantFiled: March 4, 2019Date of Patent: December 6, 2022Assignee: Capital One Services, LLCInventors: Jeremy Yoches, Christopher Vito Covalucci, Scott Johnson
-
Patent number: 11520886Abstract: Methods, apparatuses and computer program products implement embodiments of the present invention that include protecting a computer system coupled to a storage device by storing, to the storage device, a set of protected files and one or more decoy files, wherein any modification to the decoy file indicates a cyber-attack on the computer system. Upon receiving a request from a process executing on the computing device to enumerate files stored on the storage device, the process is analyzed so as to classify the process as benign or suspicious. The protected files are enumerated to the process whether the process was classified as benign or suspicious. However, the one or more decoy files are enumerated to the process only upon process being classified as suspicious.Type: GrantFiled: July 26, 2020Date of Patent: December 6, 2022Assignee: PALO ALTO NETWORKS (ISRAEL ANALYTICS) LTD.Inventors: Erez Levy, Or Chechik, Liav Zigelbaum, Eldar Aharoni
-
Patent number: 11514162Abstract: Systems and methods for malware filtering are provided herein. In some embodiments, a system having one or more processors is configured to: retrieve a file downloaded to a user device; break the downloaded file into a plurality of chunks; scan the plurality of chunks to identify potentially malicious chunks; predict whether the downloaded file is malicious based on the scan of the plurality of chunks; and determine whether the downloaded file is malicious based on the prediction.Type: GrantFiled: January 13, 2022Date of Patent: November 29, 2022Assignee: UAB 360 ITInventors: Aleksandr Sevcenko, Mantas Briliauskas
-
Patent number: 11514160Abstract: Disclosed herein are systems and methods for determining a coefficient of harmfulness of a file using a trained learning model. In one aspect, an exemplary method includes forming a first vector containing a plurality of attributes of a known malicious file. A learning model is trained using the first vector to identify a plurality of significant attributes that influence identification of the malicious file. A second vector is formed containing a plurality of attributes of known safe files. The learning model is trained using the second vector to identify attributes insignificant to the identification of the malicious file. An unknown file is analyzed by the learning model. The learning model outputs a numerical value identifying a coefficient of harmfulness relating to a probability that the unknown file will prove to be harmful.Type: GrantFiled: January 26, 2021Date of Patent: November 29, 2022Assignee: AO Kaspersky LabInventors: Sergey V. Prokudin, Alexey M. Romanenko
-
Patent number: 11509691Abstract: There are provided systems and methods for protecting from directory enumeration using honeypot pages within a network directory. A service provider, such as an electronic transaction processor for digital transactions, may have an internal network that is utilized by employees, developers, and other end users within the organization of the service provider. When internal devices become compromised or internal users act maliciously, they may attempt to enumerate a directory to find hidden pages that have secret or sensitive data. The service provider may therefore detect a scan of an internal directory having files paths to files and pages and may deploy honeypot pages that change an error status. Further, the service provider may add a process or operation to log additional data on these honeypot pages and/or change a byte size of the corresponding pages to confuse the enumeration attempt and obtain true source information.Type: GrantFiled: May 15, 2020Date of Patent: November 22, 2022Assignee: PAYPAL, INC.Inventor: George Chen Kaidi
-
Patent number: 11503034Abstract: Various embodiments are generally directed to techniques for generating rules automatically navigate a website and perform updates of payment token information.Type: GrantFiled: February 23, 2021Date of Patent: November 15, 2022Assignee: Capital One Services, LLCInventors: Mykhaylo Bulgakov, Taurean Butler, William F. Carroll, II
-
Patent number: 11494489Abstract: A method for detecting malicious code may include generating, from deserialization examples, a finite automaton including states. The states may include labeled states corresponding to the deserialization examples. A state may correspond to a path from a start state to the state. The method may further include while traversing the states, generating a state mapping including, for the state, a tracked subset of the states, determining that the path corresponds to a path type, inferring, using the path type and the state mapping, a regular expression for the state, and determining, for a new deserialization example and using the regular expression, a polarity indicating whether it is safe to deserialize the new deserialization example.Type: GrantFiled: June 25, 2021Date of Patent: November 8, 2022Assignee: Oracle International CorporationInventors: Kostyantyn Vorobyov, François Gauthier, Sora Bae, Padmanabhan Krishnan
-
Patent number: 11488265Abstract: Disclosed herein is a time-based leaderboard that ranks users based on a length of time each user has controlled or possessed a given digital object. The leaderboard includes customization options for purposes of user identification and identity connected to social network objects. The leaderboard further uses a staking feature where users provide their digital objects to universal wallets to hold for a predetermined period based on smart contract limitations. Staking improves leaderboard position. The leaderboard further enables expression and displayed of staked digital objects despite the user no longer having actual possession of the digital object. A digital object generator builds unique digital objects based on the user specific input. The unique digital objects are part of a graphic presentation to users.Type: GrantFiled: February 18, 2022Date of Patent: November 1, 2022Assignee: EMOJI ID, LLCInventors: Naveen Kumar Jain, Riccardo Paolo Spagni, Tal Flanchraych, Shradha Rao, Karim Balaa
-
Patent number: 11475133Abstract: A method of training a malicious code detection model and a method of detecting a malicious code. The method includes acquiring application programming interface (API) call information of called functions from a result log of performing dynamic analysis of a malicious code, calculating time intervals between timestamps using the timestamps which indicate API call times extracted from the API call information, determining a feature value of the malicious code on the basis of the time intervals, and training the malicious code detection model using an API call sequence included in the API call information and the feature value.Type: GrantFiled: October 28, 2020Date of Patent: October 18, 2022Assignee: SAMSUNG SDS CO., LTD.Inventors: Jang Mi Shin, Young Min Cho, Jung Bae Jun, Jang Ho Kim, Tae Jin Iyn
-
Patent number: 11477189Abstract: A computer system receives a first request as part of a primary session with a client device to access information stored on a primary domain associated with the computer system. The first request includes an authentication key that was generated using a session key. The computer system receives a second request as part of a sub-session with the client device to access information stored on a secondary domain associated with the computer system. The second request includes a second authentication key that includes a session identifier of the primary session and a session payload generated using the session key and an indicator of the secondary domain. The computer system determines whether to grant the first and second requests using the first and second authentication keys, respectively.Type: GrantFiled: July 10, 2020Date of Patent: October 18, 2022Assignee: salesforce.com, inc.Inventors: João Henrique Pimentel Wanderley Neves, Alan Vangpat
-
Patent number: 11468189Abstract: According to embodiments of the present disclosure, there is provided a method, system, apparatus, electronic device, storage medium and program product for data exchange. The method described herein comprises: obtaining original data to be exchanged by a target application between a first platform and a second platform; obtaining normalized data corresponding to a type of the original data by processing the original data based on the type; determining a satisfaction of a data exchange constraint from the normalized data. In this way, the embodiments of the present disclosure may simplify and promote the determination of the data exchange constraint and accelerate the data exchange process.Type: GrantFiled: February 24, 2022Date of Patent: October 11, 2022Assignee: BEIJING BYTEDANCE NETWORK TECHNOLOGY CO., LTD.Inventors: Xingxiu Chen, Yuming Liang, Jianye Ye, Yu Zheng, Wei Jiang, Cheng Wei, Feng Ren, Mingdong Zhao
-
Patent number: 11461484Abstract: A method by one or more runtime agents protecting a web application for capturing contextual information for data accesses. The method includes determining first metadata associated with a web application layer request sent by a web application firewall to the web application, determining second metadata associated with the web application layer request based on information available to the web application, serializing the first metadata and the second metadata to generate serialized metadata, and adding the serialized metadata to a database query that is to be submitted by the web application to the database server, wherein execution of the database query that includes the serialized metadata by the database server is to cause the database activity monitor to store the serialized metadata and third metadata associated with the database query determined by the database activity monitor in a data storage.Type: GrantFiled: December 30, 2019Date of Patent: October 4, 2022Assignee: Imperva, Inc.Inventors: Kunal Anand, Brian Anderson, Joe Moore, Ran Rosin, Itsik Mantin, Peter Klimek, Craig Burlingame
-
Patent number: 11463460Abstract: Techniques for inspecting network traffic are disclosed. An application executing as an operating system extension that uses a virtual private network (VPN) stack of the operating system intercepts an Internet protocol (IP) packet for delivery to a remote computer system. A determination is made of an alteration action to take in response to intercepting the packet. The determined action is taken.Type: GrantFiled: March 23, 2021Date of Patent: October 4, 2022Assignee: Barracuda Networks, Inc.Inventors: Sinan Eren, Jose Luis Ferras Pereira, Pablo German Sole, Luisa Marina Moya Praca de Araujo Lima
-
Patent number: 11457037Abstract: Systems and methods are described for using a template for simulated phishing campaigns based on predetermined date from a date associated with a user. The predetermined date may by an event, an anniversary or a milestone associated with employment of the user with a company. The campaign controller may identify a date associated with the user and based on the identification of the date associated with the user, the campaign controller may select one or more templates for one or more simulated phishing campaigns to be triggered by a predetermined date related to the date associated with the user.Type: GrantFiled: June 8, 2020Date of Patent: September 27, 2022Assignee: KnowBe4, Inc.Inventor: Greg Kras
-
Patent number: 11451553Abstract: A resource-access management system detects whether a user is authorized to access resources. The system may include a user device being configured to include a sensor that detects sensor data associated with the user. Further, the system includes a client qualification engine that determines whether or not a client is authorized to access the resources by comparing the sensor data with a plurality of patterns for evaluating whether or not the user is an authorized user. User scores are generated based on the compared sensor data and the plurality of patterns. Further, a composite score corresponding to the user is generated using the sensor data, plurality of patterns, and one or more additional criteria. Whether the user is granted access to the resources, presented with unauthorized user tests, or blocked from access to the resources depends on the composite score and threshold values.Type: GrantFiled: August 28, 2020Date of Patent: September 20, 2022Assignee: Live Nation Entertainment, Inc.Inventors: Fengpei Du, Michael Lane, Kenneth Ives-Halperin
-
Patent number: 11442624Abstract: A digital certification system (or “analyzer”) provides protection for digital content stored on servers, file sharing systems, hard drives and USB enabled external drives or other digital repositories. The analyzer prevents unauthorized access from both owners/administrators and recipients of digital content being shared through a web based or file sharing type service. The analyzer protects the owner of the shared digital content from unauthorized access, while allowing multiple protection instances to be applied to multiple digital content shares within a digital file hosting and sharing environment. Timers are provided to limit access to digital content at the discretion of the owner of the digital content.Type: GrantFiled: February 22, 2020Date of Patent: September 13, 2022Inventor: Anthony Tan