Patents Examined by Sakinah White Taylor
  • Patent number: 11805139
    Abstract: A multiclass classifier generates a probability vector for individual data units of an input data stream. The probability vector has prediction probability values for classes that the multiclass classifier has been trained to detect. A class with the highest prediction probability value among the classes in a probability vector is selected as the predicted class. A confidence score is calculated based on the prediction probability value of the class. Confidence scores of the class are accumulated within a sliding window. The class is declared to be the detected class of the input data stream when the accumulated value of the class meets an accumulator threshold. A security policy for an application program that is mapped to the class is enforced against the input data stream.
    Type: Grant
    Filed: January 25, 2021
    Date of Patent: October 31, 2023
    Assignee: Trend Micro Incorporated
    Inventors: Chinghsien Liao, Daniel Cheng
  • Patent number: 11799907
    Abstract: A synthetic identity network for detecting synthetic identities may receive a first request for credit including one or more user attributes, compare the one or more user attributes to one or more stored user identities, create a new user identity, flag the new user identity as a potentially synthetic identity based on comparing the one or more user attributes to the one or more stored user identities, receive a second request for credit including or more second user attributes, compare the one or more second user attributes to the one or more user attributes associated with the potentially synthetic identity, prepare a notice including the potentially synthetic identity and a credit request identifier, and transmit the notice to one or more servers.
    Type: Grant
    Filed: November 15, 2021
    Date of Patent: October 24, 2023
    Assignee: Capital One Services, LLC
    Inventor: Ryan Fox
  • Patent number: 11783050
    Abstract: In one embodiment, a method implemented in a microprocessor, including receiving a fetched branch instruction; performing a privilege level test on a fetched branch instruction using a privilege level indicated by a first tag corresponding to a privilege level in a branch prediction table comprising plural entries, each of the plural entries comprising a tag corresponding to a privilege level; and providing a prediction branch miss for the fetched branch instruction based on a failure of the privilege level test.
    Type: Grant
    Filed: November 13, 2020
    Date of Patent: October 10, 2023
    Assignee: CENTAUR TECHNOLOGY, INC.
    Inventor: Thomas C. McDonald
  • Patent number: 11783036
    Abstract: Described herein is a system that detects ransomware infection in filesystems. The system detects ransomware infection by using backup data of machines. The system detects ransomware infection in two stages. In the first stage, the system analyzes a filesystem's behavior. The filesystem's behavior can be obtained by loading the backup data and crawling the filesystem to create a filesystem metadata including information about file operations during a time interval. The filesystem determines a pattern of the file operations and compares the pattern to a normal patter to analyze the filesystem's behavior. If the filesystem's behavior is abnormal, the system proceeds to the second stage to analyze the content of the files to look for signs of encryption in the filesystem. The system combines the analysis of both stages to determine whether the filesystem is infected by ransomware.
    Type: Grant
    Filed: July 8, 2021
    Date of Patent: October 10, 2023
    Assignee: Rubrik, Inc.
    Inventors: Oscar Chen, Di Wu, Benjamin Reisner, Matthew Edward Noe
  • Patent number: 11777959
    Abstract: A computing system determines that a third party system has been exposed to a digital security violation. The computing system identifies a first user account of a user registered with the computing system that has a corresponding account associated with the third party system. The computing system determines that the first user account has stored a first set of user credentials for the corresponding account associated with the third party system at a storage location accessible by the computing system. The computing system launches a series of web browsers configured to access a first website associated with the third party system. The computing system executes, via a first web browser of the series of web browsers, a first automated script specific to the first website associated with the third party system. The computing system performs at least one of a plurality of remedial operations with respect to the corresponding account.
    Type: Grant
    Filed: February 12, 2021
    Date of Patent: October 3, 2023
    Assignee: Capital One Services, LLC
    Inventors: Mykhaylo Bulgakov, Joshua Edwards, Andrea Montealegre, George Bergeron
  • Patent number: 11775639
    Abstract: A file integrity monitoring system supports monitoring of system-critical, enterprise-critical and user-critical data by reporting events to a threat management facility in response to changes in certain files, folders, registry keys and registry values of the computing environment in which the system is operating and/or monitoring. The file integrity monitoring system may dynamically create, adapt and apply context-based rules to improve the sensitivity and relevance of reported events to undesirable changes in the data footprint of a monitored device.
    Type: Grant
    Filed: October 23, 2020
    Date of Patent: October 3, 2023
    Assignee: Sophos Limited
    Inventors: Nicholas James Collier, Nikolay Ivanov Nikolaev, Chloe Acebes
  • Patent number: 11777970
    Abstract: Disclosed herein are methods, systems, and processes for granular and prioritized visualization of anomalous log data. Log data that includes several logs is accessed. A unique identifier is generated for each log by generating a single hash for one or more fields in each log. Based on the hashing, the several logs are converted into a series of unique identifiers. A timestamp for each log in the series of unique identifiers is appended to generate a list of timestamps for each unique identifier in the series of unique identifiers. The list of timestamps for each unique identifier is overlayed on a time series graph in a graphical user interface (GUI).
    Type: Grant
    Filed: December 9, 2020
    Date of Patent: October 3, 2023
    Assignee: Rapid7, Inc.
    Inventor: Douglas George Wainer
  • Patent number: 11769199
    Abstract: Provided are a system, method, and computer program product for network anomaly detection. The method includes receiving event data associated with a plurality of events in a computer network. The method also includes determining nested groups of the event data representing tiers of an operational hierarchy. The method further includes generating display data to show a graphical representation of the event including a plurality of nested graphical nodes and at least one spline. Each graphical node is associated with a group or a computer node, each graphical node encompasses and/or is encompassed by another graphical node, a size of each graphical node is proportional to an aggregated parameter value of events associated therewith, each spline connects at least two graphical nodes and includes a curve that passes through a common graphical node, and each spline is associated with a communication between at least two computer nodes.
    Type: Grant
    Filed: April 14, 2021
    Date of Patent: September 26, 2023
    Assignee: Visa International Service Association
    Inventors: Xiao Tian, Chiranjeet Chetia, Jianhua Huang, Marc Corbalan Vila, Francisco Cardona Lema, Stuart Mark Williams
  • Patent number: 11765139
    Abstract: Methods and apparatus for encrypting and decrypting data for wearable devices that are not based on authentication techniques, such as login/password or handshaking, are provided. A computing device receives a message. The message includes encrypted data and a cryptographic reference. The encrypted data includes physiological data of a wearer of the wearable device. The cryptographic reference includes a reference to a first cryptographic technique. The computing device determines the first cryptographic technique based on the reference to the first cryptographic technique. The computing device determines a cryptographic key. The computing device decrypts the encrypted data using the first cryptographic technique and the cryptographic key to obtain decrypted data. The computing device stores the decrypted data.
    Type: Grant
    Filed: June 16, 2020
    Date of Patent: September 19, 2023
    Assignee: VERILY LIFE SCIENCES LLC
    Inventors: Sarel Kobus Jooste, Jonathan Dixon, Shane Alexander Farmer, Patrick Lin Wheeler
  • Patent number: 11757836
    Abstract: The present invention relates to a method for managing IoT devices by a security fabric. A method is provided for managing IoT devices comprises collecting, by analyzing tier, data of Internet of Things (IoT) devices from a plurality of data sources, abstracting, by analyzing tier, profiled element baselines (PEBs) of IoT devices from the data, wherein each PEB includes characteristics of IoT devices; retrieving, by executing tier, the PEBs from the analyzing tier, wherein the executing tier is configured to control network traffic of IoT devices of a private network; generating, by the executing tier, security policies for IoT devices from PEBs of the IoT devices; and controlling, by the executing tier, network traffic of the IoT devices of the private network to comply with the security policies.
    Type: Grant
    Filed: March 12, 2021
    Date of Patent: September 12, 2023
    Assignee: Fortinet, Inc.
    Inventors: John Lunsford Gregory Whittle, Jonathan Q. Nguyen-Duy, Michael Craig Woolfe
  • Patent number: 11748475
    Abstract: Systems and techniques are described to detect and recover from ransomware infections. It may be determined if a ransomware attack is in progress based on analyzing read and write requests to a file system. Next, a mitigation action may be performed in response to determining that a ransomware attack is in progress.
    Type: Grant
    Filed: February 5, 2021
    Date of Patent: September 5, 2023
    Assignee: Riverbed Technology, LLC
    Inventors: Vincent H. Berk, Ian D. Gregorio-de Souza
  • Patent number: 11743290
    Abstract: A system and method for detecting phishing cyberattacks. The method involves parsing a code segment retrieved using a suspect uniform resource locator (URL) to identify any links included in the code segment. From these links, additional code segments may be recovered in accordance with a code segment recovery scheme. Thereafter, analytics are performed on the retrieved and possibly recovered code segments. The analytics include determining whether any of the code segments is correlated with a code segment associated with a known prior phishing cyberattack. Upon completing the analytics, an alert message including meta-information associated with results from the analytics is generated to identify that the URL is associated with a known prior phishing cyberattack when one or perhaps a combination of code segments associated with the URL are correlated to any code segment associated with a known prior phishing cyberattack.
    Type: Grant
    Filed: December 23, 2019
    Date of Patent: August 29, 2023
    Assignee: FireEye Security Holdings US LLC
    Inventors: Muhammad Zain Ul Abadin Gardezi, Mohsin Saeed, Hassan Ahmed, Fahim Abbasi, Farrukh Shahzad
  • Patent number: 11736508
    Abstract: A system and method for managing the security health of a network devices interconnected with each other in a service provided in an entity. The security health of the networked device is evaluated by determining a cyber risk score for the entity having a plurality of devices. A first set of data from individual network devices and a second set of data including risk data from an external data source are collected by a data collector. The collected data is normalized into a format which can be further correlated by a correlation engine. The correlating step enables to determine cyber risk scores for the individual network devices. The cyber risk score for the entity may further be determined by aggregating the individual cyber risk scores of the individual network devices. The risk scores are displayed by a web-based user interface which is enabled by an application programming interface.
    Type: Grant
    Filed: May 29, 2020
    Date of Patent: August 22, 2023
    Assignee: JOHNSON CONTROLS TYCO IP HOLDINGS LLP
    Inventors: William M. Fitzgerald, Miguel Morillo Iruela, Silviu G. Sosiade, Vincent P. Hamilton, Seán Phillips
  • Patent number: 11727111
    Abstract: Detecting malware by linking Background Intelligent Transfer Service (BITS) and Scheduled Task Service (STS) activities to a source program. Using send Advanced Local Procedure Call (ALPC) messages and receive ALPC messages, source programs that initiate the creation of temporary files and perform defined operations may be identified. If the source programs responsible for the temporary files and defined operations are determined to be malware programs, a security action may be performed on the source programs.
    Type: Grant
    Filed: September 30, 2021
    Date of Patent: August 15, 2023
    Assignee: GEN DIGITAL INC.
    Inventors: Andrei Stanciu, Teodor Anton, Alin Enachescu, Robert A. Clyde
  • Patent number: 11695788
    Abstract: Described is a system for detecting adversarial activities based on detection of activity patterns in a multiplex network. The system detects one or more subnetworks that are matches to a template network of template nodes. The subnetworks are detected by filtering multiplex network nodes according to a filtering criteria that utilizes monotone function properties in the multiplex network. Nodes that do not meet the filtering criteria are eliminated, resulting in a list of candidate nodes in the multiplex network. The one or more subnetworks are formed from the list of candidate nodes. An activity pattern corresponding to a pattern of adversarial activity is identified in the one or more subnetworks. Based on the identified activity pattern, an alert of adversarial activity is generated and transmitted.
    Type: Grant
    Filed: October 5, 2020
    Date of Patent: July 4, 2023
    Assignee: HRL LABORATORIES, LLC
    Inventors: Alexei Kopylov, Jiejun Xu
  • Patent number: 11695659
    Abstract: Systems, methods, and computer-readable media are provided for generating a unique ID for a sensor in a network. Once the sensor is installed on a component of the network, the sensor can send attributes of the sensor to a control server of the network. The attributes of the sensor can include at least one unique identifier of the sensor or the host component of the sensor. The control server can determine a hash value using a one-way hash function and a secret key, send the hash value to the sensor, and designate the hash value as a sensor ID of the sensor. In response to receiving the sensor ID, the sensor can incorporate the sensor ID in subsequent communication messages. Other components of the network can verify the validity of the sensor using a hash of the at least one unique identifier of the sensor and the secret key.
    Type: Grant
    Filed: July 28, 2020
    Date of Patent: July 4, 2023
    Assignee: Cisco Technology, Inc.
    Inventors: Abhishek Ranjan Singh, Shih-Chun Chang, Varun Sagar Malhotra, Hai Trong Vu, Jackson Ngoc Ki Pang
  • Patent number: 11695793
    Abstract: A method includes: identifying, by a runtime instrumentation agent of a web server, a plurality of attack surfaces of a web application executed on the web server; generating, by the runtime instrumentation agent, a plurality of hash values, where each hash value is generated based on one of the plurality of attack surfaces; and transmitting, by the runtime instrumentation agent, the plurality of hash values to an attack server external to the web server, where the attack server is to determine whether to scan each attack surface based on the plurality of hash values.
    Type: Grant
    Filed: October 31, 2017
    Date of Patent: July 4, 2023
    Assignee: MICRO FOCUS LLC
    Inventors: Ming Sum Sam Ng, Sasi Siddharth Muthurajan, Nidhi Govindram Kejriwal, Gerald E. Sullivan, II, Alexander Hoole
  • Patent number: 11695787
    Abstract: Disclosed are apparatus and methods that facilitate analysis of events associated with network and computer systems. The methodology includes determining at least one lookup key in a host device for an event occurring in the host device and determining whether the at least one lookup key is used in a memory to determine if at least one key-value pair exists for the event. The methodology also includes appending the at least one key-value pair to the event, and storing the at least one key-value pair in the memory based on the at least one lookup key including replacing existing keys found for the at least one lookup key.
    Type: Grant
    Filed: July 1, 2020
    Date of Patent: July 4, 2023
    Assignee: Hawk Network Defense, Inc.
    Inventors: Timothy J. Shelton, David Edwin Harris, Todd Jason Wheeler, Jr.
  • Patent number: 11689556
    Abstract: A cyber threat defense system can incorporate data from a Software-as-a-Service (SaaS) application hosted by a third-party operator platform to identify cyber threats related to that SaaS application. The cyber threat defense module can have a SaaS module to collect third-party event data from the third-party operator platform. The cyber threat defense system can have a comparison module to compare third-party event data for a network entity to at least one machine-learning model of a network entity using a normal behavior benchmark to spot behavior deviating from normal benign behavior. The comparison module can identify whether the network entity is in a breach state. The cyber threat defense system can have a cyber threat module to identify whether the breach state and a chain of relevant behavioral parameters correspond to a cyber threat. An autonomous response module can execute an autonomous response in response to the cyber threat.
    Type: Grant
    Filed: February 19, 2019
    Date of Patent: June 27, 2023
    Assignee: Darktrace Holdings Limited
    Inventors: Jacob Araiza, Andrew Woodford, David Palmer
  • Patent number: 11677761
    Abstract: Systems and methods for detecting security threats using application execution and connection lineage tracing with embodiments of the invention are disclosed. In one embodiment, detecting suspicious activity in a network includes receiving at a collector server a first activity data including a first set of attributes, combining a first set of context information with the activity data to generate a first activity record, comparing the first activity record to a set of baseline signatures, incrementing a count of a first matching baseline signature when the first activity record has the same values for all attributes, receiving from a second activity data including a third set of attributes, combining a second set of context information with the second activity data to generate a second activity record, and generating an alert when the attributes of the second activity record differ from all baseline signatures.
    Type: Grant
    Filed: September 4, 2020
    Date of Patent: June 13, 2023
    Assignee: Corner Venture Partners, LLC
    Inventors: Anjan Venkatramani, Chihwei Chao