Malicious Software Patents (Class 707/952)
  • Patent number: 11838303
    Abstract: A log generation method for generating a log of communication on an in-vehicle network includes: performing a plurality of determination processes for determining, by using different methods, whether or not a message sent to the in-vehicle network is anomalous; generating a log in accordance with results of the plurality of determination processes; and transmitting the generated log. In the generating, information items to be included in the log are determined in accordance with a combination of the results of the plurality of determination processes so that the log does not include identical information items.
    Type: Grant
    Filed: July 2, 2020
    Date of Patent: December 5, 2023
    Assignee: PANASONIC INTELLECTUAL PROPERTY CORPORATION OF AMERICA
    Inventors: Manabu Maeda, Jun Anzai, Takeshi Kishikawa
  • Patent number: 11741150
    Abstract: Methods, systems, and apparatus, including computer programs encoded on computer storage media, for suppressing search results to personally objectionable content. One of the methods includes receiving an identifier of a resource that has image content. A first classifier classifies the image content as including objectionable content or not including objectionable content. A second classifier classifies the image content as including professionally produced content or not including professionally produced content. Whenever the image content is classified as including objectionable content and as not including professionally produced content, the resource is designated as having personally objectionable content.
    Type: Grant
    Filed: October 5, 2020
    Date of Patent: August 29, 2023
    Assignee: Google LLC
    Inventors: Christian von Essen, Xiaoxiang Yu, Matthias Heiler
  • Patent number: 9030316
    Abstract: A method and apparatus where the method includes detecting a plurality of events related to the activities of users within a security system wherein the events are defined by a plurality of attributes, wherein at least one attribute is categorical and wherein a data distance between events is a function of event attributes, evaluating the detected events using a density based anomaly detection method f(r), where r is a size of a neighborhood around a data point, comparing a value of the evaluated expression with a margin threshold value (msg(r)) and setting an alarm upon detecting that the value exceeds the threshold value.
    Type: Grant
    Filed: March 12, 2013
    Date of Patent: May 12, 2015
    Assignee: Honeywell International Inc.
    Inventors: Vit Libal, Pavel Vacha, Valerie Guralnik
  • Patent number: 8799190
    Abstract: A reliable automated malware classification approach with substantially low false positive rates is provided. Graph-based local and/or global file relationships are used to improve malware classification along with a feature selection algorithm. File relationships such as containing, creating, copying, downloading, modifying, etc. are used to assign malware probabilities and simultaneously reduce the false positive and false negative rates on executable files.
    Type: Grant
    Filed: June 17, 2011
    Date of Patent: August 5, 2014
    Assignee: Microsoft Corporation
    Inventors: Jack W. Stokes, Nikos Karampatziakis, John C. Platt, Anil Francis Thomas, Adrian M. Marinescu
  • Patent number: 8463758
    Abstract: A cleaning application that can clean at least one of one or more files and a registry of a computer is provided. The cleaning application can be remotely deployed over a network to one or more computers. The cleaning application can include an administrator cleaning module and a user cleaning module. The administrator cleaning module can automatically scan a network and detect one or more computers. The administrator cleaning module can then remotely deploy the user cleaning module to one or more selected computers of the network. Once the user cleaning module is deployed on a computer, the administrator cleaning module can remotely manage the user cleaning module over the network. In particular, the administrator cleaning module can instruct the user cleaning module to clean at least one of one or more files and a registry of the computer.
    Type: Grant
    Filed: May 13, 2011
    Date of Patent: June 11, 2013
    Assignee: Piriform Ltd.
    Inventor: Guy Saner
  • Patent number: 8407462
    Abstract: A method for implementing network security access control is provided, including: receiving and decrypting terminal identity information that is encrypted in a bi-directional encryption mode and forwarded by a switch, and authenticating the decrypted terminal identity information; returning an authentication result to the switch so that the switch controls access of a terminal to a network according to the authentication result; encrypting the decrypted terminal identity information in a solo-directional encryption mode and authenticating the encrypted terminal identity information; returning an authentication result to a security access control gateway so that the security access control gateway controls access of the terminal to network resources according to the authentication result; delivering a security policy to a security control module on the terminal so that the security control module controls the terminal according to the security policy.
    Type: Grant
    Filed: March 18, 2011
    Date of Patent: March 26, 2013
    Assignee: Chengdu Huawei Symantec Technologies Co., Ltd.
    Inventors: Yongfang Xie, Weijia Sun
  • Patent number: 8387147
    Abstract: A method and system for detecting and removing a hidden pestware file is described. One illustrative embodiment detects, using direct drive access, a file on a computer storage device; determines whether the file is also detectable by the operating system by attempting to access the file using a standard file Application-Program-Interface (API) function call of the operating system; identifies the file as a potential hidden pestware file, when the file is undetectable by the operating system; confirms through an automated pestware-signature scan of the potential hidden pestware file that the potential hidden pestware file is a hidden pestware file; and removes automatically, using direct drive access, the hidden pestware file from the storage device.
    Type: Grant
    Filed: July 18, 2011
    Date of Patent: February 26, 2013
    Assignee: Webroot Inc.
    Inventor: Patrick Sprowls
  • Patent number: 8359287
    Abstract: A method for training a system to specifically react on a specific input. The method can include defining a set of binary data structures, each representing a real-world component, item, or virtual object; storing each data structure as a binary pattern; creating uniquely identifiable copies of the data structures to represent individual instances of the components, items, or virtual objects; creating a virtual state space of the components, items, or virtual objects by grouping them as relevant for a specific situation; receiving an input to change a status or an attribute value of at least one of the components, items, or virtual objects; storing the received changes in a new version of the applicable data structure instance; analyzing similarities of the stored binary patterns related to a particular action performed; and if a matched binary pattern is identified, proposing at least one possible action related to the matched binary pattern.
    Type: Grant
    Filed: March 29, 2011
    Date of Patent: January 22, 2013
    Inventor: Max J. Pucher
  • Patent number: 8341200
    Abstract: A method of downloading a file from a Web application to a client computer equipped with a Web browser including: the Web browser sending an original request to download the file to a first front server, the original request being addressed to a URL comprising a hostname portion that is independent of the file, the first front server sending a redirection response to the original request, the response specifying a URL comprising a hostname portion that is dependent on the file, the Web browser sending a follow-up request to download the file to a second front server, the follow-up request being addressed to the URL specified in the redirection response, and the second front server downloading the requested file in response to the follow-up request.
    Type: Grant
    Filed: January 20, 2009
    Date of Patent: December 25, 2012
    Assignee: Pomian & Corella, LLC
    Inventor: Francisco Corella
  • Patent number: 8321432
    Abstract: Disclosed are systems and methods for use in filtering electronic messages using business heuristics. In one aspect, a method includes determining whether the electronic message is associated with a desirable business, and adjusting the likelihood of delivering the electronic message to an intended recipient of the message if the electronic message is determined to be associated with the desirable business. In a more specific embodiment, the method further includes assigning a spam-score to the electronic message based on a likelihood that the electronic message is not unwanted by the intended recipient, blocking delivery of the electronic message to the intended recipient when the spam-score does not cross an overall threshold, and delivering the electronic message to the intended recipient based on the adjusted likelihood when the electronic message is determined to be associated with the desirable business.
    Type: Grant
    Filed: December 9, 2009
    Date of Patent: November 27, 2012
    Assignee: Google Inc.
    Inventors: Peter K. Lung, Scott M. Petry, Jason H. Titus
  • Patent number: 8204915
    Abstract: Various exemplary embodiments disclose an apparatus and method for generating a database that maps metadata to peer-to-peer (P2P) content and, more particularly, to a database that an Internet Service Provider (ISP) can build to correlate metadata with P2P traffic. The database may collect metadata having a key that uniquely corresponds to particular P2P content. An ISP may use the database to identify malware in P2P files and tag P2P traffic that seeks to exchange material in violation of applicable copyright laws.
    Type: Grant
    Filed: February 13, 2009
    Date of Patent: June 19, 2012
    Assignee: Alcatel Lucent
    Inventors: Andrew Dolganow, Steve Morin, David Maxwell
  • Patent number: 8145690
    Abstract: Information collections defining a common subject such as a codified or uncodified body of law are stored on a computer readable medium in association with temporal information indicating the state or status with respect to time of parts of the information collection, including different versions of the same part. Parts that are different versions of each other have different temporal information associated therewith and can be accessed based on the temporal information. Thus, the temporal information may be used to control access to and display of parts of the subject in a computer system based on time as a search or request parameter. Parts of the common subject may be organized and stored according to various schemes, including hierarchical schemes such as topic trees, a relational database, a file system or a structured document system (e.g., using XML). Parts of the common subject and temporal and other information may be associated in various ways, including linking (e.g.
    Type: Grant
    Filed: June 16, 2008
    Date of Patent: March 27, 2012
    Inventors: Fred C. Mitchell, Peter Mosca, James Michael Snyder
  • Patent number: 8078625
    Abstract: Content may be categorized by accessing a URL associated with the content, determining a set of n-grams contained in the URL, and determining a category of the content based on the set of n-grams.
    Type: Grant
    Filed: September 11, 2006
    Date of Patent: December 13, 2011
    Assignee: AOL Inc.
    Inventors: Jianping Zhang, Jinshui Qin, Qiuming Yan
  • Patent number: 8046374
    Abstract: A database intrusion detection system (DIDS) automatically trains itself to account for changes to the database. The DIDS monitors upstream queries sent to the database and downstream data provided in response to the queries. The DIDS classifies an upstream query as legitimate or anomalous. If the query is anomalous, the DIDS determines whether the anomaly resulted from a change in the database by performing one or more tests. One test determines whether the query references new fields or tables. Another test determines the frequency at which the query is received, and/or whether the query is received from multiple sources. A third test determines whether the query accesses sensitive information. Together, the results of these tests describe whether the query should be classified as anomalous or legitimate.
    Type: Grant
    Filed: May 6, 2005
    Date of Patent: October 25, 2011
    Assignee: Symantec Corporation
    Inventor: Adam Bromwich
  • Patent number: 7970772
    Abstract: Techniques for monitoring abnormalities in a data stream are provided. A plurality of objects are received from the data stream and one or more clusters are created from these objects. At least a portion of the one or more clusters have statistical data of the respective cluster. It is determined from the statistical data whether one or more abnormalities exist in the data stream.
    Type: Grant
    Filed: May 24, 2007
    Date of Patent: June 28, 2011
    Assignee: International Business Machines Corporation
    Inventors: Charu C. Aggarwal, Philip Shi-Lung Yu
  • Patent number: 7937349
    Abstract: A method for training a system to specifically react on a specific input. The method can include defining a set of binary data structures, each representing a real-world component, item, or virtual object; storing each data structure as a binary pattern; creating uniquely identifiable copies of the data structures to represent individual instances of the components, items, or virtual objects; creating a virtual state space of the components, items, or virtual objects by grouping them as relevant for a specific situation; receiving an input to change a status or an attribute value of at least one of the components, items, or virtual objects; storing the received changes in a new version of the applicable data structure instance; analyzing similarities of the stored binary patterns related to a particular action performed; and if a matched binary pattern is identified, proposing at least one possible action related to the matched binary pattern.
    Type: Grant
    Filed: August 27, 2007
    Date of Patent: May 3, 2011
    Inventor: Max J. Pucher
  • Patent number: 7917481
    Abstract: The present invention enables a large number of files to be processed for evidence of malicious content, independently of the file system that maintains the files. The processed files can be obtained from live data or a point-in-time copy (e.g., a snapshot) of the data, based on mapping information that maps the files to the physical storage device. In one embodiment, a method involves accessing mapping information corresponding to a set of data. The mapping information maps at least a portion of a file to a physical storage location. The portion of the file can be read from the physical storage location using the mapping information, without accessing a file system. The portion of the file can then be analyzed for evidence of malicious content.
    Type: Grant
    Filed: September 28, 2006
    Date of Patent: March 29, 2011
    Assignee: Symantec Operating Corporation
    Inventors: Sanjay Ramchandra Kale, Kuldeep Sureshrao Nagarkar, Abhay Harishchandra Marode, Michael P. Spertus
  • Patent number: 7774361
    Abstract: An incident managing module aggregates related database intrusion incidents and presents them in a manageable manner. A receiving module receives an anomalous query requesting data from a database and a type-identification module identifies anomaly type for the query received. A conversion module converts the anomalous query into a characteristic representation. In some embodiments, this is done by replacing literal field values in the query with representative values. In other embodiments, this is done by creating a tuple describing anomaly parameters for the anomalous query. In still other embodiments, the query is converted into a characteristic representation that distinguishes between injected and non-injected portions of the query. An aggregation module then aggregates into a group the anomalous queries with substantially similar characteristic representations according to anomaly type and a generation module generates a database intrusion incident report describing the group of anomalous queries.
    Type: Grant
    Filed: July 8, 2005
    Date of Patent: August 10, 2010
    Assignee: Symantec Corporation
    Inventors: Carey Nachenberg, Abu Wawda, Adam Bromwich, On Lee, Darren Sanders
  • Patent number: 7761427
    Abstract: A system, apparatus, method, and computer program product for electronically stored file profiling and conversion including converting printable files to images, supported by meta-data, and one or more searchable master text files.
    Type: Grant
    Filed: April 12, 2004
    Date of Patent: July 20, 2010
    Assignee: Cricket Technologies, LLC
    Inventors: John Martin, Jennifer St. James Cody, Christopher Shepley
  • Patent number: 7711714
    Abstract: A method and a device for managing a computer network, especially a technique for ensuring the security of a network. A computer network system in which computers are connected to each other through transmission lines, each computer stores the data which constitutes a moving type software exclusively used for security and transmitted together with a message when the computer transmits the message to another computer of the system, and executes the moving type software by using the stored data upon receiving a message from another computer.
    Type: Grant
    Filed: September 1, 2006
    Date of Patent: May 4, 2010
    Assignee: Hitachi, Ltd.
    Inventors: Kazuo Takaragi, Seiichi Domyo, Hiroshi Yoshiura