Monitoring Or Scanning Of Software Or Data Including Attack Prevention Patents (Class 726/22)
  • Patent number: 11074324
    Abstract: Systems and methods for preventing software application tampering are disclosed. 1. In embodiments, a computer-implemented method includes: identifying, by a computing device, an IP related software code segment of a software application; segregating, by the computing device, the IP related software code segment into one or more native code clusters and one or more non-native code clusters; refactoring, by the computing device, the one or more non-native code clusters into one or more stand-alone portable components (SPCs); determining, by the computing device, code migration scores for the one or more SPCs; and determining, by the computing device, select SPCs from the one or more SPCs to migrate to a remote security server based on the code migration scores.
    Type: Grant
    Filed: September 5, 2018
    Date of Patent: July 27, 2021
    Assignee: INTERNATIONAL BUSINESS MACHINES CORPORATION
    Inventors: Vijay Ekambaram, Padmanabha Venkatagiri Seshadri, Vijay Kumar Ananthapur Bache, Jhilam Bera
  • Patent number: 11075946
    Abstract: A Honeypot Adaptive Security (HAS) system is described that determines whether a pre-loaded partner or third-party (PP-TP) application executed on a client device has gained over-privileged access to confidential client or network (CCN) data, or over-privileged use of client account features or information provided by a telecommunications service provider. The HAS system is configured to retrieve client data associated with a PP-TP application executed on the client device, retrieve policy rules associated with the PP-TP application, generate a PP-TP application data model to determine a probability of the PP-TP application gaining over-privileged access to CCN data or over-privileged use of client account features on a client device. Responsive to the determined probability, the HAS system is configured to deploy a solution data package to the client device that resolves the instance of over-privileged access or over-privileged use.
    Type: Grant
    Filed: December 19, 2017
    Date of Patent: July 27, 2021
    Assignee: T-MOBILE USA, Inc.
    Inventors: Peter Myron, Samson Kwong, Michael Mitchell
  • Patent number: 11070583
    Abstract: A method for automatically improving security of a network system includes: collecting security relevant information from network devices of the network system, the security relevant information including security settings and operational information of the network devices; analyzing the security relevant information for determining weak security settings of a network device, the weak security settings being not necessary for a regular operation of the network system; determining hardened security settings for the network devices based on the weak security settings, the hardened security settings restricting a possible operation of the network device but allow a regular operation of the network system; and applying the hardened security settings to the network device.
    Type: Grant
    Filed: September 4, 2019
    Date of Patent: July 20, 2021
    Assignee: ABB SCHWEIZ AG
    Inventors: Thanikesavan Sivanthi, Thomas Locher
  • Patent number: 11070557
    Abstract: Techniques are described for delayed serving of protected content. A request has been made by a client computing device for a requested resource comprising a first portion and a second portion that is initially withheld from the client computing device. First content comprising the first portion of the requested resource and reconnaissance code is served for execution on the client computing device. When executed at the client computing device, the reconnaissance code gathers data at the client computing device that indicates whether the client computing device is human-controlled or bot-controlled. The data gathered by the reconnaissance code is received. Based on the data, it is determined that the client computing device is not bot-controlled. In response to determining that the client computing device is not bot-controlled, the second portion of the requested resource is served to the client computing device.
    Type: Grant
    Filed: December 30, 2019
    Date of Patent: July 20, 2021
    Assignee: SHAPE SECURITY, INC.
    Inventors: Nwokedi Idika, Justin D. Call
  • Patent number: 11070580
    Abstract: A vulnerability scanning method includes: identifying a host service running on a target host and creating a scan task that matches the identified host service; issuing the created scan task to a task scheduling center, to allow a proxy node to acquire at least one scan task from the task scheduling center, where the proxy node executes the at least one scan task for the target host, and obtains a scan result; and receiving the scan result fed back by the proxy node, determining whether there exists a specified host service in the identified host service, where the specified host service signifies an existence of a web site resource running on the target host, and if there exists the specified host service in the identified host service, issuing again a scan subtask corresponding to the specified host service to the task scheduling center.
    Type: Grant
    Filed: February 28, 2018
    Date of Patent: July 20, 2021
    Assignee: WANGSU SCIENCE & TECHNOLOGY CO., LTD.
    Inventors: Haihan Wang, Younan Xu, Qifu Zhong, Chunyi Shi
  • Patent number: 11070582
    Abstract: A cybersecurity assessment system is provided for monitoring, assessing, and addressing the cybersecurity status of a target network. The cybersecurity assessment system may scan the target network and produce data regarding the current state and properties of devices on the target network, events occurring on the target network, vulnerabilities detected in devices on the target network, and the like. The cybersecurity assessment system can analyze the scan data and determine a degree to which the current status of the target network satisfies a particular cybersecurity readiness standard, and how the status changes over time. The cybersecurity assessment system can also transform large amounts of vulnerability scan data into efficient representations for use in providing interactive presentations of the vulnerabilities detected on the target network. The cybersecurity assessment system can also provide information regarding cybersecurity events in substantially real time.
    Type: Grant
    Filed: February 5, 2019
    Date of Patent: July 20, 2021
    Assignee: Cytellix Corporation
    Inventors: Brian Douglas Berger, Howard Chen Lin, Andrew Michael Fabrizio
  • Patent number: 11070592
    Abstract: A system and method for self-adjusting cybersecurity analysis and score generation, wherein a reconnaissance engine gathers data about a client's computer network from the client, from devices and systems on the client's network, and from the Internet regarding various aspects of cybersecurity. Each of these aspects is evaluated independently, weighted, and cross-referenced to generate a cybersecurity score by aggregating individual vulnerability and risk factors together to provide a comprehensive characterization of cybersecurity risk using a transparent and traceable methodology. The scoring system itself can be used as a state machine with the cybersecurity score acting as a feedback mechanism, in which a cybersecurity score can be set at a level appropriate for a given organization, and data from clients or groups of clients with more extensive reporting can be used to supplement data for clients or groups of clients with less extensive reporting to enhance cybersecurity analysis and scoring.
    Type: Grant
    Filed: April 1, 2020
    Date of Patent: July 20, 2021
    Assignee: QOMPLX, INC.
    Inventors: Jason Crabtree, Andrew Sellers
  • Patent number: 11070588
    Abstract: Mechanisms are provided to implement a malicious activity response system (MARS) that automatically identifies and handles malicious activities within the data processing system. The MARS identifies threat intelligence associated with characteristics of malicious activity. The MARS forms a hypothesis for the malicious attack to identify a malicious attack that is occurring. The MARS identifies a trap for use in isolating the malicious activity; deploys the trap and automatically reconfiguring a network associated with the data processing system such that the malicious activity is routed to the trap thereby isolating the malicious activity, observes a behavior of the malicious activity within the trap; and extracts features associated with the malicious activity in the trap. The MARS then utilizes the extracted features to improve an operation of the malicious activity response system in handling future malicious activity.
    Type: Grant
    Filed: June 11, 2018
    Date of Patent: July 20, 2021
    Assignee: International Business Machines Corporation
    Inventors: Markus Ludwig, Johannes Noll, Marc Noske, Matthias Seul, Volker Vogeley
  • Patent number: 11061886
    Abstract: Various embodiments can implement a multi-system or node architecture that can be deployed on-demand and augment existing systems with pre-configured nodes that can be installed within existing architecture. The multi-node architecture is flexible for integration into many systems and can also stand alone to provide data validation and assurance. Various embodiments of the multi-node architecture enable private and public distributed ledgers (e.g., blockchains) that enhance security, enhance confidentiality, and eliminate the need to trust the provider/hosts of the data validation information and/or the hosts of the confidential information.
    Type: Grant
    Filed: June 28, 2018
    Date of Patent: July 13, 2021
    Assignee: Blockchain Integrated Partners, LLC
    Inventors: Robert M. Chepak, Jr., William Brian Evans
  • Patent number: 11063975
    Abstract: A server obtains security intelligence data used for classifying whether data associated with user activity in a network is undesirable, and classifies the data based on the security intelligence data. The server provides an initial classifying result of the data to a device associated with the data. At a subsequent time, the server obtains updated security intelligence data and re-classifies whether the first data is undesirable based on the updated security intelligence data. Responsive to a determination that the initial classifying result is changed based on the re-classifying, the server provides an updated classifying result to the device associated with the data.
    Type: Grant
    Filed: January 9, 2020
    Date of Patent: July 13, 2021
    Assignee: CISCO TECHNOLOGY, INC.
    Inventors: Jason V. Miller, Adam J. O'Donnell
  • Patent number: 11063986
    Abstract: Embodiments of the present disclosure provide a first set of methods, computer-readable media, and system configured for: receiving a configuration for a domain name system (DNS) to log all queries; publishing a customized sender policy framework (SPF) policy to the DNS, the customized SPF policy comprising a macro-endowed mechanism; logging a plurality of received SPF customized queries; accessing a log comprising the plurality of received SPF customized queries; extracting data from each of the received SPF customized queries, the data being populated by the macro mechanism associated with the SPF customized query; populating a datastore with extracted data comprising at least one of the following: a username, a IP address, and a domain, as extracted from each received SPF customized query; and providing, based on the extracted data, an indication of outbound emails sent from the domain. In various embodiments, email authorizations and restrictions may be based thereon.
    Type: Grant
    Filed: August 28, 2020
    Date of Patent: July 13, 2021
    Assignee: FRAUDMARC INC.
    Inventors: Keith Wayne Coleman, Richard Duncan
  • Patent number: 11060875
    Abstract: A device receives re-routing event data identifying a deviation from a proposed route at a particular location. The device determines, based on the re-routing event data, whether the deviation from the proposed route is a problem deviation or a planned deviation, and associates, based on determining that the deviation from the proposed route is a problem deviation, the particular location with an problematic location tag. The device determines that a route, corresponding to a request for routing information received from a navigation device, includes the particular location, and determines, based on a user profile and the problematic location tag, a particular alert level, of a plurality of alert levels, to associate with the particular location. The device detects a proximity of the navigation device to the particular location, and causes a particular alert corresponding to the particular alert level to be provided via the navigation device.
    Type: Grant
    Filed: November 9, 2018
    Date of Patent: July 13, 2021
    Assignee: Verizon Patent and Licensing Inc.
    Inventors: John Chipouras, Joshua D. Eno, Daniel Austin Kopyc
  • Patent number: 11063967
    Abstract: A device includes a communication interface and a processor. The communication interface is configured to receive a network threat report. The processor is configured to extract an indicator from the network threat report. The indicator is reported to be associated with a network threat. The processor is also configured to determine, based on the indicator, a confidence score indicating a likelihood that the indicator is associated with malicious activity. The processor is further configured to determine, based on the indicator, an impact score indicating a potential severity of the malicious activity. The processor is further configured to identify, based on the indicator, the confidence score, and the impact score, an action to be performed. The action includes blocking network traffic corresponding to the indicator or monitoring network traffic corresponding to the indicator. The processor is also configured to initiate performance of the action.
    Type: Grant
    Filed: July 3, 2018
    Date of Patent: July 13, 2021
    Assignee: THE BOEING COMPANY
    Inventors: Isaac D. Rego, Bradley R. Logan
  • Patent number: 11063963
    Abstract: A system, method, and apparatus for detecting remote control of a client device are disclosed. An example network security apparatus includes a network switch configured to route first data packets between a client device and a content provider device, determine IP addresses of other devices that transmit second data packets to or receive second data packets from the client device, and throttle the second data packets destined for the client device. The apparatus also includes a controller configured to receive signal packets indicative of activity in relation to a webpage provided by the content provider device to the client device and instruct the network switch to throttle the second data packets after receiving one of the signal packets. The controller is also configured to provide an indication of a malicious device remotely controlling the client device responsive to not receiving another signal packet within a specified time period.
    Type: Grant
    Filed: October 1, 2018
    Date of Patent: July 13, 2021
    Assignee: SUNSTONE INFORMATION DEFENSE, INC.
    Inventor: David K. Ford
  • Patent number: 11055402
    Abstract: A method is provided for safely executing dynamically generated code to avoid the possibility of an attack in unprotected memory space. Upon ascertaining that dynamically generated code is to be executed, a processing circuit and/or operating system kernel restrict the dynamically generated code to use a first memory region within an unprotected memory space, where the first memory region is distinct (e.g., reserved) from other memory regions used by other processes executed by the processing circuit. A first processing stack is maintained for the dynamically generated code within the first memory region. This first processing stack is separate from a general processing stack used by other processes executed by the processing circuit. A stack pointer is switched/pointed to the first processing stack when the dynamically generated code is executed and the stack pointer is switched/pointed to the general processing stack when the dynamically generated code ends.
    Type: Grant
    Filed: September 26, 2018
    Date of Patent: July 6, 2021
    Assignee: QUALCOMM Incorporated
    Inventors: Can Acar, Robert Turner, Alexander Gantman
  • Patent number: 11055408
    Abstract: A computer receives one or more security alerts. The computer selects a subset of the one or more security alerts for processing. The computer executes one or more queries automatically, based on the subset of the one or more security alerts. The computer identifies one or more related processes, wherein the one or more related processes are related to information contained within the subset of the one or more security alerts. The computer displays a full flow of a malware attack, wherein the full flow includes the information contained within the subset of the one or more security alerts and the one or more related processes.
    Type: Grant
    Filed: November 30, 2018
    Date of Patent: July 6, 2021
    Assignee: International Business Machines Corporation
    Inventors: Dara P. Murphy, Michael J. Ryan
  • Patent number: 11057408
    Abstract: Methods and apparatus for evaluating collected data relating to online activity, and modification of services within a service provider network. In one embodiment, a service provider collects data relating to the online activity of users of third-party services and correlates the data with subscribers of the service provider to generate useful products and analytics (e.g., classifications, behavioral models, etc.) containing information relating to the subscribers' online activity. The generated products may be used to determine whether and how to modify services provided to individual subscribers, exported for use by third parties, or for other purposes.
    Type: Grant
    Filed: October 29, 2018
    Date of Patent: July 6, 2021
    Assignee: Time Warner Cable Enterprises LLC
    Inventors: Chris Roosenraad, Richard Harman, John W. Watson, Christopher Turner, Philip Arnhold, Brian Durham, Barbara Stovall
  • Patent number: 11057438
    Abstract: This disclosure provides example techniques to invoke one or more tools, with an investigative tool. The investigative tool provides a common framework that allows investigators to invoke their own trusted tools or third-party generated tools. The investigative tool described herein seamlessly and transparently invokes the tools in accordance with an investigative profile created by the investigator.
    Type: Grant
    Filed: August 20, 2018
    Date of Patent: July 6, 2021
    Assignee: ARCHITECTURE TECHNOLOGY CORPORATION
    Inventors: Derek P. Bronner, Robert A. Joyce, Matthew P. Donovan, Julia A. Baker
  • Patent number: 11055392
    Abstract: The described embodiments perform a proximity unlock operation. For the proximity unlock operation, a first electronic device in a locked operating state detects that an authorized second electronic device is in proximity to the first electronic device. Based on detecting the authorized second electronic device in proximity to the first electronic device, the first electronic device transitions from a locked operating state to an unlocked operating state. In the described embodiments, the transition to the unlocked operating state occurs without the user performing a manual authentication step that is performed in existing electronic devices to cause the transition from the locked operating state to the unlocked operating state.
    Type: Grant
    Filed: January 24, 2020
    Date of Patent: July 6, 2021
    Assignee: Apple Inc.
    Inventors: Robert R. Ulrich, Jean-Pierre Cuidad, Kevin N. Armstrong, Andreas W. Wendker, Craig M. Federighi, Steve S. Ko
  • Patent number: 11057385
    Abstract: Certain embodiments described herein are generally directed to systems and methods for preventing access to files on a virtual machine. One example method involves receiving network information associated with a network connection opened at the virtual machine and determining a process that opened the network connection. The method further involves receiving information indicative of a file access event attempted at the virtual machine and determining the process that opened the network connection initiated the file access event. The method further involves transmitting information indicative of the file access event and the network connection to a security virtual machine and receiving an enforcement decision for the file access event from the security virtual machine based on the information indicative of the file access event and the network connection. The method further involves applying the enforcement decision to either allow or prevent the file access event by the process.
    Type: Grant
    Filed: July 12, 2018
    Date of Patent: July 6, 2021
    Assignee: Nicira, Inc.
    Inventors: Nilesh Awate, Rayanagouda Bheemanagouda Patil, Vasantha Kumar, Amit Vasant Patil
  • Patent number: 11057405
    Abstract: The automatic generation of malware family signatures is disclosed. A set of metadata associated with a plurality of samples is received. The samples are clustered. For members of a first cluster, a set of similarities shared among at least a portion of the members of the first cluster is determined. The similarities are evaluated for suitability as a malware family signature. Suitability is evaluated based on how well the similarities uniquely identify the members of the first cluster. In the event the similarities are determined to be suitable as a malware family signature, a signature is generated.
    Type: Grant
    Filed: August 9, 2019
    Date of Patent: July 6, 2021
    Assignee: Palo Alto Networks, Inc.
    Inventors: Zhi Xu, Jiajie Wang, Xiao Zhang, Wenjun Hu
  • Patent number: 11050713
    Abstract: A method is provided to control the flow of packets within a system that includes one or more computer networks comprising: policy rules are provided that set forth attribute dependent conditions for communications among machines on the one or more networks; machine attributes and corresponding machine identifiers are obtained for respective machines on the networks; and policy rules are transformed to firewall rules that include machine identifiers of machines having attributes from among the obtained machine attributes that satisfy the attribute dependent policy rules.
    Type: Grant
    Filed: November 8, 2019
    Date of Patent: June 29, 2021
    Assignee: VMware, Inc.
    Inventors: Debashis Basak, Rohit Toshniwal, Allwyn Sequeira
  • Patent number: 11050775
    Abstract: Methods apparatus, systems, and articles of manufacture for IoT and PoS anti-malware are disclosed. An example method includes detecting a combination of function calls. Whether the combination of function calls is a forbidden combination of function calls for the device is detected based on a limited intended functionality of the device. The forbidden combination of function calls includes a first function call and a second function call. The first function call is allowed in isolation from the second function call. The second function call is allowed in isolation from the first function call. In response to determining that the combination of function calls is forbidden for the device, a responsive action is performed.
    Type: Grant
    Filed: September 30, 2019
    Date of Patent: June 29, 2021
    Assignee: McAfee, LLC
    Inventors: Sean T. Tiernan, Simon Hunt
  • Patent number: 11048985
    Abstract: This disclosure relates to method and system for classifying an object in input data using an artificial neural network (ANN) model. The method may include extracting positive features and orthogonal features associated with the object in the input data, performing a partial classification of the object based on the positive features by a first part of the ANN model, and determining an accuracy of the classification of the object based on the orthogonal features by a second part of the ANN model. The positive features are features uniquely contributing to identification of a class for the object, while the orthogonal features are features not contributing to identification of the class but contributing to identification of one or more of remaining classes.
    Type: Grant
    Filed: July 29, 2019
    Date of Patent: June 29, 2021
    Assignee: Wipro Limited
    Inventor: Manjunath Ramachandra Iyer
  • Patent number: 11049177
    Abstract: Systems and apparatus for tracking tools are disclosed. In one embodiment, among others, an apparatus has a tool cabinet with at least one bin. A computing device is associated with the tool cabinet. A sensor network layer is positioned in the at least one bin. The sensor network is coupled with the computing device. The sensor network layer is configured to detect a presence and an absence of a tool item at a predetermined location. The sensor network is configured to transmit a signal to the computing device indicative of the presence or the absence of the tool item at the predetermined location. A covering positioned over the sensor network layer. The covering is configured to facilitate a placement of the tool item at the predetermined location.
    Type: Grant
    Filed: July 24, 2017
    Date of Patent: June 29, 2021
    Assignee: STANLEY BLACK & DECKER, INC.
    Inventors: Christopher White, James Michael Ratteree, Wan-Chun Liao
  • Patent number: 11042580
    Abstract: A method may include determining that input text data includes a first keyword from a first set of keywords. The method also includes determining a similarity between the input text data and a first stored text string that has previously been identified as a false positive match for the first keyword, and based on the similarity, generating a first false positive score corresponding to the input text data. Further, the method includes determining a number of keywords, from a second set of keywords, that are included in the input text data, and based on the number of keywords, generating a second false positive score corresponding to the input text data. The method also includes calculating a final false positive score corresponding to the input text data based on the first false positive score and the second false positive score.
    Type: Grant
    Filed: December 30, 2018
    Date of Patent: June 22, 2021
    Assignee: PayPal, Inc.
    Inventors: Rushik Upadhyay, Dhamodharan Lakshmipathy, Nandhini Ramesh, Aditya Kaulagi
  • Patent number: 11042630
    Abstract: A method for determining which web page among multiple candidate web pages is similar to a given web page. For each candidate web page, a set of scoring rules is provided to score the components therein. When the given web page is compared against a candidate web page, each component that is found in both the given web page and the candidate web page under examination is given a score in accordance with the set of scoring rules that is specific to that web page under examination. A composite similarity score is computed for each comparison between the given webpage and a candidate web page. If the composite similarity score exceeds a predefined threshold value for a comparison between the given webpage and a candidate web page, that candidate web page is deemed the web page that is similar.
    Type: Grant
    Filed: August 22, 2019
    Date of Patent: June 22, 2021
    Assignee: Trend Micro Incorporated
    Inventors: Chao-Yu Chen, Peng-Shih Pu, Yu-Fang Tsai
  • Patent number: 11042633
    Abstract: A computing apparatus for protecting software hooks from interference may include a processing device and a memory access monitoring device configured to monitor access to the memory addresses of one or more hooks. When a task T1 attempts to write to a memory address of a monitored hook, the monitoring device may generate a notification (e.g., an interrupt), and the processing device may pause execution of the task T1 and initiate execution of a hook protection task T2. The hook protection task T2 may determine whether to allow task T1 to modify the monitored hook. If task T1 is not a trusted task (e.g., if task T1 is or may be malware), the processing device blocks T1 from modifying the monitored hook. In this manner, some attempts to unhook critical software hooks may be thwarted.
    Type: Grant
    Filed: September 27, 2018
    Date of Patent: June 22, 2021
    Assignee: Carbon Black, Inc.
    Inventors: Paul M. Drapeau, Brian M. Sturk
  • Patent number: 11044264
    Abstract: A lateral movement application identifies lateral movement (LM) candidates that potentially represent a security threat. Security platforms generate event data when performing security-related functions, such as authenticating a user account. The disclosed technology enables greatly increased accuracy identification of lateral movement (LM) candidates by, for example, refining a population of LM candidates based on an analysis of a time constrained graph in which nodes represent entities, and edges between nodes represent a time sequence of login or other association activities between the entities. The graph is created based on an analysis of the event data, including time sequences of the event data.
    Type: Grant
    Filed: September 17, 2019
    Date of Patent: June 22, 2021
    Assignee: SPLUNK INC.
    Inventors: Satheesh Kumar Joseph Durairaj, Stanislav Miskovic, Georgios Apostolopoulos
  • Patent number: 11042638
    Abstract: In some implementations, a method includes retrieving data from multiple sensors in a computing device, and the multiple sensors comprise different types of sensors. The sensor data is analyzed based on a predictive model, and the predictive model is trained to detect malware. Initiation of malware is determined based on the analysis. In response to the determination, the malware is terminated.
    Type: Grant
    Filed: November 14, 2017
    Date of Patent: June 22, 2021
    Assignee: Southern Methodist University
    Inventors: Mitchell Thornton, Michael Taylor, Kaitlin Smith
  • Patent number: 11042401
    Abstract: Techniques for controlling the performance of remote operations on computing devices within a video processing environment are described. One embodiment determines to perform a remote operation on a remote device in a media processing environment and determines a signal chain within the media processing environment that includes the remote device. An operational status of the signal chain is determined, based on a media processing schedule for the signal chain. Upon determining that the operational status indicates that the remote device is available for performance of the remote operation, embodiments initiate the performance of the remote operation on the remote device.
    Type: Grant
    Filed: October 29, 2018
    Date of Patent: June 22, 2021
    Assignee: Disney Enterprises, Inc.
    Inventors: Efthimis Stefanidis, Michael J. Strein, Craig L. Beardsley, Vladislav Feldman
  • Patent number: 11038978
    Abstract: A method of performing a redirect in a browser viewing a page in a first-party domain is provided. The method includes the steps of checking for the presence of a cookie in the browser associated with a third-party domain, and in the absence of the third-party cookie, the method includes redirecting the browser from the first-party domain to the third-party domain and, in response, returning from the third-party domain, a fixed value cookie for storage in the browser.
    Type: Grant
    Filed: June 21, 2017
    Date of Patent: June 15, 2021
    Assignee: IPCO 2012 LIMITED
    Inventors: Chinmay Meghani, Richard Henderson
  • Patent number: 11036860
    Abstract: An electrical apparatus includes a secured functional unit, an unsecured functional unit and a supply device. The secured functional unit has a first interface device for secure communication and a control unit, and the unsecured functional unit has a second interface device for non-secure communication. The secured functional unit and the unsecured functional unit are designed for communicating with one another. The supply device further includes a supply unit. A first power path for supplying the secured functional unit is arranged between the supply unit and the secured functional unit, and a second power path for supplying the secured functional unit with electrical energy from the supply unit is arranged between the supply unit and the unsecured functional unit. A switch is arranged in the second power path. A second power path in the switch is looped in the first switching state and disconnected in the second switching state.
    Type: Grant
    Filed: January 14, 2019
    Date of Patent: June 15, 2021
    Assignee: KROHNE Messtechnik GmbH
    Inventor: Holger Glasmachers
  • Patent number: 11036534
    Abstract: A system and method for serverless runtime application self-protection.
    Type: Grant
    Filed: September 27, 2018
    Date of Patent: June 15, 2021
    Assignee: TWISTLOCK, Ltd.
    Inventors: Liron Levin, Dima Stopel, Michael Velbaum, Alon Adler, Michael Kletselman, John Morello
  • Patent number: 11036474
    Abstract: Techniques for computer-implemented automation of analysis of service maturity and automation of estimation of service maturity for software applications and services are provided, identifying a service to determine the service maturity level compared to an identified task comprising optimal service maturity criteria. In response to identifying the service and task, determining that each criteria of the task is met by the service. Subsequently, updating a score for the overall task and the individual criteria based on the total service conformity to the criteria. The scores and differences can be displayed in an interface to indicate the maturity of the service.
    Type: Grant
    Filed: December 27, 2018
    Date of Patent: June 15, 2021
    Assignees: ATLASSIAN PTY LTD., ATLASSIAN INC.
    Inventors: Samuel Caldwell, Patrick Hill
  • Patent number: 11038866
    Abstract: The disclosed system implements techniques to secure communications for injecting a workload (e.g., a container) into a virtual network hosted by a cloud-based platform. Based on a delegation instruction received from a tenant, a virtual network of the tenant can connect to and execute a workload via a virtual machine that is part of a virtual network that belongs to a resource provider. To secure calls and authorize access to the tenant's virtual network, authentication information provided in association with a call from the virtual network of the resource provider may need to match authorization information made available via a publication service of the cloud-based platform. Moreover, an identifier of a NIC used to make a call may need to correspond to a registered name of the resource provider for the call to be authorized. These checks provide increased security by preventing unauthorized calls from accessing the tenant's virtual network.
    Type: Grant
    Filed: December 27, 2018
    Date of Patent: June 15, 2021
    Assignee: Microsoft Technology Licensing, LLC
    Inventors: Abhijeet Kumar, Aanand Ramachandran, Jayesh Kumaran, David Michael Brumley, Rishabh Tewari, Nisheeth Srivastava, Sushant Sharma, Deepak Bansal, Abhishek Ellore Sreenath, Parag Sharma, Abhishek Shukla, Avijit Gupta
  • Patent number: 11036852
    Abstract: The present disclosure pertains to a system configured to prepare and use prediction models for software diversification. Some embodiments may: obtain compilation data; identify a plurality of blocks from the compilation data; and pad each of one or more blocks of the plurality of blocks by a random amount such that executable instructions within the each block begin at a different location to prevent a deterministic memory addressing attack, none of the one or more blocks being a beginning block of the compilation data.
    Type: Grant
    Filed: March 14, 2019
    Date of Patent: June 15, 2021
    Inventors: David Lau, Greg St. Louis, Dan Wojciechowski, Gerald Thompson
  • Patent number: 11036564
    Abstract: A non-transitory computer-readable storage medium storing a program that causes an information processing apparatus to execute a process, the process includes executing a first program and a second program using a system including a kernel of an OS, acquiring first information regarding a first API call and second information regarding a second API call, executing a similarity judgment process in which a similarity between the first program and the second program is judged, wherein the first information is information indicating at least one of a type of the first API call, the number of executions of the first API call, and a call order of the first API call, the second information includes at least one of a type of the second API call, the second information includes the number of executions of the second API call, and a call order of the second API cal.
    Type: Grant
    Filed: December 15, 2017
    Date of Patent: June 15, 2021
    Assignee: FUJITSU LIMITED
    Inventors: Kunihiko Yoshimura, Toshitaka Satomi, Ryusuke Masuoka
  • Patent number: 11038755
    Abstract: Calculating a remaining budget in a cloud bursting environment, by a processor. Within a particular time window, a first cost is computed of allocated and released cloud hosts. A second cost is computed of the cloud hosts that are allocated and not yet released. A remaining budget is computed as a difference between a budget limit and a sum of the first cost and the second cost, at the current point in time. A third, estimated cost of allocated and not yet released cloud hosts; and a fourth, estimated cost of cloud host requests currently in progress are each then determined. A safe remaining budget is then computed by subtracting the third and fourth estimated costs from the remaining budget determined prior.
    Type: Grant
    Filed: November 21, 2019
    Date of Patent: June 15, 2021
    Assignee: INTERNATIONAL BUSINESS MACHINES CORPORATION
    Inventors: Priya Unnikrishnan, Lior Aronovich
  • Patent number: 11039317
    Abstract: Systems and methods are described herein for configuring vehicles and infrastructure (e.g., buildings, smart homes, traffic devices, utilities and associated systems, emergency response systems, and so on) to include blockchain nodes, so a smart city or area of the various devices can be supported by a blockchain network, with some or all devices and systems provisioned with nodes acting as distributed nodes for the blockchain network.
    Type: Grant
    Filed: December 31, 2018
    Date of Patent: June 15, 2021
    Assignee: T-Mobile USA, Inc.
    Inventor: Ahmad Arash Obaidi
  • Patent number: 11030562
    Abstract: A method for providing pre-data breach monitoring provides information to businesses that is useful to predict portions of the company data that may not be secured well enough and other risks associated with data breaches, such as employees that may not be trustworthy.
    Type: Grant
    Filed: October 18, 2019
    Date of Patent: June 8, 2021
    Assignee: ConsumerInfo.com, Inc.
    Inventors: Michael John Dean, Mark Joseph Kapczynski
  • Patent number: 11032284
    Abstract: Systems, and methods are provided to provide cloud-based coordination of customer premise service appliances. A system can include a cloud-based service platform, which includes a coordination server and a cloud-based service appliance, and an on-premise service appliance. The coordination server is configured to establish a service session, select a service appliance, and control a sequence of operations on the selected service appliance. Establishing the service session can include establishing a service session with a first client in response to a service request received from the first client, the first client associated with an account including a service policy. Selecting the service appliance can include selecting the cloud-based service appliance or the on-premise service appliance, based on the service policy, to handle the service request.
    Type: Grant
    Filed: June 8, 2020
    Date of Patent: June 8, 2021
    Assignee: DOCUSIGN, INC.
    Inventors: Donald Grant Peterson, Eric Fleischman
  • Patent number: 11030313
    Abstract: Measures for enabling resource-efficient remote malware scanning capable of static and dynamic file analysis including, at a remote entity, obtaining metadata of an electronic file to be scanned for malware, said metadata including at least information for identification of one or more file items contained in the electronic file, identifying whether at least one file item of the electronic file is not pre-known at the remote entity, instructing delivery of any identified at least one file item of the electronic file, reconstructing the electronic file by assembling its file items, including any file item of the electronic file, which is not pre-known at the remote entity, and any remaining file item of the electronic file, which is pre-known at the remote entity, on the basis of the obtained metadata of the electronic file, and executing a dynamic malware analysis on a runtime behavior of the reconstructed electronic file.
    Type: Grant
    Filed: November 14, 2017
    Date of Patent: June 8, 2021
    Assignee: F-Secure Corporation
    Inventors: Pekka Rasanen, Ville Lindfors
  • Patent number: 11032314
    Abstract: In one embodiment, a security service classifies traffic telemetry data for traffic between an endpoint device and a server as potentially associated with a particular type of remote access Trojan (RAT). The security service constructs a scan message to elicit a type of server response associated with the particular type of RAT. The security service obtains a server response from the server, by sending the constructed scan message to the server. The security service determines whether the endpoint device is infected with the particular type of RAT, by validating whether the server response from the server matches the type of server response associated with the particular type of RAT.
    Type: Grant
    Filed: December 14, 2018
    Date of Patent: June 8, 2021
    Assignee: Cisco Technology, Inc.
    Inventors: David McGrew, Blake Harrell Anderson, Julien Thomas Piet
  • Patent number: 11032313
    Abstract: There are provided measures for enabling dynamic remote malware scanning. Such measures could exemplarily include identification of an electronic file to be scanned for malware, generation of at least one scanning object of the identified electronic file on the basis of a dynamic configuration by a remote entity, said at least one scanning object being generated by using malware-susceptible data of the identified electronic file and neglecting malware-insusceptible data of the identified electronic file, transfer of the at least one scanning object of the identified electronic file for remote malware scanning to the remote entity, and execution of a malware scan of the at least one scanning object of the electronic file at the remote entity by a malware scanning engine or application.
    Type: Grant
    Filed: February 18, 2016
    Date of Patent: June 8, 2021
    Assignee: F-Secure Corporation
    Inventors: Juha Ylipekkala, Jammu Kekkonen, Andrew Patel, Jarno Niemela, Jari Savander, Jani Jappinen, Juho Heikkinen, Zimry Ong
  • Patent number: 11030563
    Abstract: Data processing systems and methods, according to various embodiments, are adapted for mapping various questions regarding a data breach from a master questionnaire to a plurality of territory-specific data breach disclosure questionnaires. The answers to the questions in the master questionnaire are used to populate the territory-specific data breach disclosure questionnaires and determine whether disclosure is required in territory. The system can automatically notify the appropriate regulatory bodies for each territory where it is determined that data breach disclosure is required.
    Type: Grant
    Filed: December 31, 2020
    Date of Patent: June 8, 2021
    Assignee: OneTrust, LLC
    Inventors: Jonathan Blake Brannon, Andrew Clearwater, Brian Philbrook, Trey Hecht, Wesley Johnson, Nicholas Ian Pavlichek
  • Patent number: 11025477
    Abstract: This disclosure relates to enhanced overlay network-based transport of traffic to and from customer branch office locations, facilitated through the use of the Internet-based overlay routing. A method of selecting an ingress edge region of the overlay network begins by mapping a service hostname to an IKEv2 destination of an outer IPsec tunnel associated with a first overlay network edge. An IKEv2 session is established from the first overlay network edge to the customer router. Upon tunnel establishment, a secondary lookup is performed to determine whether the first overlay network edge is an appropriate ingress region. Based on a response to the secondary lookup, a IKEv2 redirect is issued to a second overlay network edge. A new tunnel is then established from the second overlay network edge to the customer router. Thereafter, an additional lookup may also be performed to determine whether the second overlay network edge remains an appropriate ingress region.
    Type: Grant
    Filed: December 28, 2016
    Date of Patent: June 1, 2021
    Assignee: Akamai Technologies, Inc.
    Inventors: Ryan Ruel, Fardad Farahmand, Brandon O. Williams
  • Patent number: 11023585
    Abstract: A system and method for setting alert thresholds related to cybersecurity ratings of one or more affiliate entities. An example method includes: obtaining entity data including cybersecurity event data for an affiliate entity; calculating a time-series cybersecurity rating for the affiliate entity based on the entity data; associating an alert reporting threshold with the time-series cybersecurity rating, wherein a comparison of the alert reporting threshold to the time-series cybersecurity rating determines a number of alerts reported for the affiliate entity; applying an alternative alert reporting threshold against the time-series cybersecurity rating to determine an alternative number of alerts reported for the affiliate entity; and updating the alert reporting threshold for the time-series cybersecurity rating to the alternative alert reporting threshold.
    Type: Grant
    Filed: May 27, 2020
    Date of Patent: June 1, 2021
    Assignee: BitSight Technologies, Inc.
    Inventors: Marc Noel Light, Tianyi Cai, Thomas Erhardt Montroy
  • Patent number: 11025665
    Abstract: Malicious activity data is obtained, that is indicative of attempted attacks on a computing system. Clusters of targets are identified and it is determined whether the malicious activity preferentially targets one cluster of targets over other. Also, low prevalence attacks are identified and it is determined whether a low prevalence attack has a high concentration in one or more of the target clusters. If the malicious activity either preferentially targets a cluster, or a low prevalence attack has a high concentration in a cluster, then the attack is identified as a targeted attack, so that remediation steps can be taken.
    Type: Grant
    Filed: June 8, 2020
    Date of Patent: June 1, 2021
    Assignee: Microsoft Technology Licensing, LLC
    Inventors: Philip K. Newman, Puhazholi Vetrivel, Sudhakar Narayanamurthy, Ejike E. Ofuonye, Suresh C. Palani, Ashish Mishra
  • Patent number: 11025670
    Abstract: A method and apparatus that provide a malicious domain emulator in a distributed cloud computing network are described. A malicious node emulator is executed as a third-party code in a compute server of the cloud computing platform to enable emulation of behavior of a malicious node. The malicious node emulator receives requests from one or multiple network devices addressed to the malicious domain and automatically emulates the behavior of the malicious domain to respond to these requests. The malicious node emulator logs information related to the requests and the network devices transmitting the requests.
    Type: Grant
    Filed: August 27, 2019
    Date of Patent: June 1, 2021
    Assignee: CLOUDFLARE, INC.
    Inventor: Justin Matthew Paine