Monitoring Or Scanning Of Software Or Data Including Attack Prevention Patents (Class 726/22)
  • Patent number: 11238179
    Abstract: A chat system transfers chat data transmitted from a user terminal to a chat bot or another user terminal via a network. When the chat data transmitted from the user terminal is detected to include a content related to personal information, the chat system performs a predetermined filtering process on the chat data.
    Type: Grant
    Filed: May 9, 2018
    Date of Patent: February 1, 2022
    Assignee: PANASONIC INTELLECTUAL PROPERTY MANAGEMENT CO., LTD.
    Inventor: Naohiro Fukuda
  • Patent number: 11237812
    Abstract: A technique for deploying an application in a cloud computing environment includes collecting, when a user is deploying an application, metadata and instructions on deploying the application. The metadata includes service metadata, application metadata and topology metadata, where the service metadata includes metadata on a service required for deploying the application, the application metadata includes metadata on the application, and the topology metadata includes metadata indicative of a relationship between the service and the application. The collected metadata and instructions are stored as a model for re-deploying the application.
    Type: Grant
    Filed: November 25, 2019
    Date of Patent: February 1, 2022
    Assignee: International Business Machines Corporation
    Inventors: Tong Li, Xin Sheng Mao, Jia Tan, Bo Yang
  • Patent number: 11233804
    Abstract: A compromise detection system protects data centers (DCs) or other providers in the cloud. The compromise detection system can detect compromised virtual machines (VMs) through changes in network traffic characteristics while avoiding expensive data collection and preserving privacy. The compromise detection system obtains and uses periodically-obtained flow pattern summaries to detect compromised VMs. Agent-based detection on predetermined and compromised VMs can expose (using supervised learning) the network behavior of compromised VMs and then apply the learned model to all VMs in the DC. The compromise detection system can run continuously, protect the privacy of cloud customers, comply with Europe's General Data Protection Regulation (GDPR), and avoid various techniques that both erode privacy and degrade VM performance.
    Type: Grant
    Filed: January 28, 2019
    Date of Patent: January 25, 2022
    Assignee: Microsoft Technology Licensing, LLC
    Inventors: Behnaz Arzani, Selim Ciraci, Stefan Saroiu, Alastair Wolman, Jack Wilson Stokes, III, Geoff Outhred
  • Patent number: 11232149
    Abstract: The technology relates to determining an establishment's presence at a geolocation. A computing device may receive a first image including location data associated with the first image's capture. A set of images, which include location information and one or more identification marks associated with one or more establishments may also be received. The computing device may compare the first image to the set of images to determine whether the first image contains one of the one or more identification marks, and determine that one of the one or more establishments, associated with the one of the one or more identification marks contained in the first image, is currently located within a set proximity of the first image location. The computing device may also update a location database by associating the one of the one or more establishments with a location within a set proximity of the first image location.
    Type: Grant
    Filed: July 24, 2019
    Date of Patent: January 25, 2022
    Assignee: Google LLC
    Inventors: Brian Edmond Brewington, Kirk Johnson
  • Patent number: 11232194
    Abstract: A method for executing a binary code of a secure function includes obtaining a pointer containing: a first range of bits containing the address of a line of code, and a second, different range of bits containing an identifier of the pointer, storing the line of code, this line of code containing a first integrity tag constructed or encrypted using the identifier of the pointer, loading the line of code from the address contained in the first range of bits of the pointer, verifying the integrity of the loaded line of code by constructing a second integrity tag using the identifier of the pointer contained in the second range of bits of the pointer used to load it.
    Type: Grant
    Filed: July 1, 2020
    Date of Patent: January 25, 2022
    Assignee: Commissariat a l'Energie Atomique et aux Energies Alternatives
    Inventor: Olivier Savry
  • Patent number: 11233806
    Abstract: Techniques and architectures for privilege escalation detection. User login information for multiple users in a multiuser secure computing environment is analyzed to generate multiple user evaluations. The multiple user evaluations are analyzed to generate at least a population evaluation for the multiuser secure computing environment. Node scores are generated for nodes in the population evaluation to determine one or more entry nodes for the multiple users in the multiuser secure computing environment. The node scores are compared to one or more threshold values to determine whether the user login information corresponding to one or more of the multiple users indicates a privilege escalation condition. A security response action occurs in response to detecting a privilege escalation condition.
    Type: Grant
    Filed: June 18, 2018
    Date of Patent: January 25, 2022
    Assignee: salesforce.com, Inc.
    Inventor: Anirudh Kondaveeti
  • Patent number: 11227047
    Abstract: The presently disclosed subject matter includes an apparatus that receives a dataset with values associated with different digital resources captured from a group of compute devices. The apparatus includes a feature extractor, to generate a set of feature vectors, each feature vector from the set of feature vectors associated with a set of data included in the received dataset. The apparatus uses the set of feature vectors to validate multiple machine learning models trained to determine whether a digital resource is associated with a cyberattack. The apparatus selects at least one active machine learning model and sets the remaining trained machine learning models to operate in an inactive mode. The active machine learning model generates a signal to alert a security administrator, blocks a digital resource from loading at a compute device, or executes other remedial action, upon a determination that the digital resource is associated with a cyberattack.
    Type: Grant
    Filed: July 30, 2018
    Date of Patent: January 18, 2022
    Assignee: FireEye Security Holdings US LLC
    Inventors: Sai Omkar Vashisht, Rahul Khul, Chunsheng Fang
  • Patent number: 11228614
    Abstract: Disclosed are various embodiments providing automated management of security operations centers. In one embodiment, a correlation and decision engine correlates event data generated by a plurality of monitoring services with a plurality of alerts generated by a plurality of threat intelligence services. The engine then adjusts at least one rule of one or more threat intelligence services with respect to at least one event based at least in part on a corresponding frequency of at least one of the plurality of alerts meeting a threshold, where the adjusted alert(s) are associated with the event(s).
    Type: Grant
    Filed: July 24, 2018
    Date of Patent: January 18, 2022
    Assignee: Amazon Technologies, Inc.
    Inventors: Jessica Erin Clark, Matthew Ryan Jezorek, Matthew Michael Sommer
  • Patent number: 11228597
    Abstract: An aspect of the present disclosure provides control to tenants over user access of content hosted in cloud infrastructures. In one embodiment, a host node (of a cloud infrastructure) accepts a content item in encrypted form and an associated set of attributes from a tenant, and hosts the content item in encrypted form. Upon receiving a request from a user to access the content item, the node determines a set of attributes associated with the request, the determined set including at least one attribute originating at another host node of the cloud infrastructure. If the determined set of attributes matches the associated set of attributes, the node decrypts the content item to generate the content item in decrypted form and then provides access to the content item in decrypted form to the user as a response to the request.
    Type: Grant
    Filed: February 12, 2019
    Date of Patent: January 18, 2022
    Assignee: NUTANIX, INC.
    Inventor: Ritesh Kumar
  • Patent number: 11228655
    Abstract: Facilitating separation of intended and non-intended browsing traffic in browsing history advanced networks (e.g., 4G, 5G, and beyond) is provided herein. Operations of a system can comprise determining respective contradiction values for second-level domains of a group of second-level domains in observed browsing history traffic. The operations can also comprise separating intended network traffic from non-intended network traffic based on the respective contradiction values. The respective contradiction values can indicate levels of inconsistency between the observed browsing history traffic and a determined popularity ranking.
    Type: Grant
    Filed: October 1, 2020
    Date of Patent: January 18, 2022
    Assignee: AT&T Intellectual Property I, L.P.
    Inventors: Zhengyi Zhou, Christopher Volinsky
  • Patent number: 11228910
    Abstract: A mobile communication device comprising a microphone; a display; a computer storage configured to store an operating system, a messaging application, and one or more other software applications; and a processor configured to execute the messaging application. The messaging application is configured to check for conditions including a status of the operating system and for presence of test-keys; presence of software applications that allow access to the mobile communication device in root mode thereof; and/or an ability to perform operations on behalf of a root user; wherein if the mobile communication device is considered compromised, a visual warning message is displayed on the display.
    Type: Grant
    Filed: January 25, 2019
    Date of Patent: January 18, 2022
    Assignee: V440 SPÓ£KA AKCYJNA
    Inventors: Kamil Kaczyński, Michal Glet
  • Patent number: 11227053
    Abstract: A malware attack is detected in a computing system by monitoring file I/O and coordinated network I/O traffic and referencing criteria including a correlation coefficient calculated relative to the I/O. If the file I/O and coordinated network I/O was initiated by an executing process that meets criteria indicative of malware, a correlation coefficient is calculated with respect to the file I/O and coordinated network I/O. The executing process is identified as malware if a threshold criteria is met that considers the correlation coefficient.
    Type: Grant
    Filed: December 10, 2019
    Date of Patent: January 18, 2022
    Assignee: Micro Focus LLC
    Inventor: Manoj Dahal
  • Patent number: 11223635
    Abstract: Systems and methods are described for inception of suspicious network traffic to allow detection of the beginning of common attacks by network security devices, such as NGFWs, UTM appliances and IPS appliances. According to one embodiment, inception engine running on network security appliance protecting a private network monitors a session between an external computing device and a server device associated with the private network. In response to receipt of suspicious traffic from external computing device indicative of an attack sequence, the inception engine blocks the suspicious traffic from reaching the server device and incepts the attack sequence by providing one or more responses to the external computing device, which are selected based on the attack sequence. Further, when the attack is confirmed, the inception engine diverts the traffic to a more capable deception device.
    Type: Grant
    Filed: September 28, 2019
    Date of Patent: January 11, 2022
    Assignee: Fortinet, Inc.
    Inventor: James Cabe
  • Patent number: 11223689
    Abstract: Methods, non-transitory computer readable media, network traffic management apparatuses, and network traffic management systems that facilitates multipath transmission control protocol (MPTCP) based session migration. The primary network traffic management apparatus migrates the MPTCP session state data associated with a client-server pair flow transactions to a secondary traffic management apparatus. The primary traffic management apparatus then disconnects the first connection for the client-server pair flow transactions and the secondary traffic management apparatus establishes a second connection to continue with the processing of client-server pair flow transactions without introducing application faults.
    Type: Grant
    Filed: January 2, 2019
    Date of Patent: January 11, 2022
    Assignee: F5 NETWORKS, INC.
    Inventor: Saxon Amdahl
  • Patent number: 11223640
    Abstract: Systems and methods are disclosed for computing network operations. For example, methods may include receiving, at a computing device located within a private network, a message sent from a server located outside of the private network, the message including an observable; invoking, within the private network, a search of data associated with the private network to obtain a search result that includes data matching the observable; aggregating, within the private network, data from the search result that matches the observable to obtain a report that includes an indication of the observable, a count of occurrences of the observable, and identification of one or more components associated with the observable; and transmitting the report to the server.
    Type: Grant
    Filed: May 21, 2019
    Date of Patent: January 11, 2022
    Assignee: ServiceNow, Inc.
    Inventors: Kurt Joseph Zettel, II, Richard Reybok, Jr., Phillip DiCorpo, Simon N. Allen, Amit Sharma, Giora Tamir
  • Patent number: 11223649
    Abstract: A method for ransomware detection and prevention includes receiving an event stream associated with one or more computer system events, generating user-added-value knowledge data for one or more digital assets by modeling digital asset interactions based on the event stream, including accumulating user-added-values of each of the one or more digital assets, and detecting ransomware behavior based at least in part on the user-added-value knowledge, including analyzing destruction of the user-added values for the one or more digital assets.
    Type: Grant
    Filed: April 9, 2019
    Date of Patent: January 11, 2022
    Inventors: Zhenyu Wu, Yue Li, Junghwan Rhee, Kangkook Jee, Zichun Li, Jumpei Kamimura, LuAn Tang, Zhengzhang Chen
  • Patent number: 11218476
    Abstract: The present disclosure relates to a system for authenticating a computerized sub-system of a vehicle, comprising: (A) at the vehicle: (a) a tele-processor configured to periodically record during a period T1 a flow of messages over a bus of the vehicle's sub-system, and to transmit periodically every period T2 the recorded flow of messages to a remote server via a transceiver; (B) at a remote authentication server: (b) a transceiver configured to receive each of said recorded flow of messages; (c) a profile generator configured to generate from each of said flow of messages a temporary profile; and (d) a comparator configured to compare each of said temporary profiles with a final profile which was previously created based on one or more of flows of messages within the vehicle's bus.
    Type: Grant
    Filed: January 11, 2019
    Date of Patent: January 4, 2022
    Assignee: ENIGMATOS LTD.
    Inventors: Eyal Kamir, Alexander Fok, Orit Fredkof, Avi Bitton, Yehonatan shlomo Malka, Charly Bitton, Liran Zwickel, Uriel Friedman, Meni Dali
  • Patent number: 11218499
    Abstract: A security system detects and attributes anomalous activity in a network. The system logs user network activity, which can include ports used, IP addresses, commands typed, etc., and may detect anomalous activity by comparing users to find similar users, sorting similar users into cohorts, and comparing new user activity to logged behavior of the cohort. The comparison can include a divergence calculation. Origins of user activity can also be used to determine anomalous network activity. The hostname, username, IP address, and timestamp can be used to calculate aggregate scores and convoluted scores. The system extracts features from the logged anomalous network activity, and determines whether the activity is attributable to an actor profile by comparing the extracted features and attributes associated with the actor profile based upon previous activity attributed to the actor.
    Type: Grant
    Filed: March 27, 2019
    Date of Patent: January 4, 2022
    Assignee: Palantir Technologies Inc.
    Inventor: Daniel Bardenstein
  • Patent number: 11218501
    Abstract: This detection device detects an attack in an on-vehicle network that includes a bus in which a frame including identification information that allows recognition of at least one of a transmission source and a destination is transmitted. In the bus, a plurality of the frames including pieces of the identification information different from each other are transmitted. The detection device includes: a monitoring unit configured to monitor a communication error in the bus; an aggregation unit configured to aggregate a communication error occurrence state regarding each piece of the identification information on the basis of a monitoring result by the monitoring unit; and a detection unit configured to detect the attack on the basis of an aggregation result by the aggregation unit.
    Type: Grant
    Filed: April 11, 2018
    Date of Patent: January 4, 2022
    Assignees: SUMITOMO ELECTRIC INDUSTRIES, LTD., SUMITOMO WIRING SYSTEMS, LTD., AUTONETWORKS TECHNOLOGIES, LTD.
    Inventor: Yoshihiro Hamada
  • Patent number: 11218460
    Abstract: Methods, systems, and apparatus, including computer program products, for secure authentication for accessing remote resources are disclosed. In some implementations, a user is authenticated for a first time on an interface using a first communications channel; the user is authenticated a second time on the interface using a second communications channel; access privileges are determined based on authenticating the user for the second time; and a random Uniform Resource Locator (URL) is generated based on the access privileges, where the random URL is single-use and indirectly associated with a requested resource.
    Type: Grant
    Filed: December 10, 2018
    Date of Patent: January 4, 2022
    Assignee: Apple Inc.
    Inventors: Anton Franz Linecker, Yuval Kossovsky, Martin Libich
  • Patent number: 11218449
    Abstract: The present invention relates to methods, systems and apparatus for providing efficient packet flow fillrate adjustments and providing protection against distributed denial of service attacks. One exemplary embodiment in accordance with the invention is a method of operating a communication system including the steps of receiving, at a session border controller, a first SIP invite request message; making a decision, at the session border controller, as to whether the first SIP invite request originated from an Integrated Access Device or an IP-PBX device; generating, at the SBC, a packet flow fillrate based on said decision as to whether the SIP invite request originated at an Integrated Access Device or an Internet Protocol-Private Branch Exchange (IP-PBX) device.
    Type: Grant
    Filed: May 1, 2020
    Date of Patent: January 4, 2022
    Assignee: Ribbon Communications Operating Company, Inc.
    Inventors: Tolga Asveren, Amol Sudhir Gogate, Subhransu S. Nayak
  • Patent number: 11212305
    Abstract: Computerized methods and systems receive a request message from a client device that is addressed to a web server hosting at least one web application. the request message is analyzed to identify potential attack indicators that are present in the request message. Each potential attack indicator has a score. A reputation score is assigned to the request message that is associated with behavior of the client device relative other client devices sending request message to the web server. A composite score for the request message is calculated based in part on the scores of the potential attack indicators and the reputation score. The request message is handled in accordance with the calculated composite score.
    Type: Grant
    Filed: April 29, 2019
    Date of Patent: December 28, 2021
    Assignee: CHECK POINT WEB APPLICATIONS AND API PROTECTION LTD.
    Inventors: Dotan Bar Noy, Vitaly Neyman, Pavel Borovsky
  • Patent number: 11212303
    Abstract: Systems, devices, media and methods are presented for detecting anomalous resources and events in social data. The systems and methods receive a plurality of events associated with a plurality of resources, wherein the plurality of events includes a plurality of features. The systems and methods detect a set of anomalous resources from the plurality of resources and identify a set of anomalous events associated with the set of anomalous resources. The systems and methods cause an interface to be displayed on a computing device, wherein the interface includes the set of anomalous resources and the set of anomalous events.
    Type: Grant
    Filed: December 28, 2018
    Date of Patent: December 28, 2021
    Assignee: Snap Inc.
    Inventor: Neil Shah
  • Patent number: 11210453
    Abstract: The present disclosure relates to identifying and storing relationships between hosts that are used to present a web page to a user. In certain embodiments, a system for detecting host pairs is provided. The system may receive a first request to identify one or more host pairs associated with a first host. In response to receiving the first request, the system may send a second request to the first host for a document. The document may be a web page file that is used to build a web page associated with the first host. The web page file may include instructions that, when parsed, build the web page. In response to the second request, the first host may send a response to the system. The system may then use the data included in the response to build the web page. While building the web page, a pairing may be stored when a different host is contacted.
    Type: Grant
    Filed: October 18, 2017
    Date of Patent: December 28, 2021
    Assignee: Microsoft Technology Licensing, LLC
    Inventors: Adam Hunt, Jonas Edgeworth, Chris Kiernan, Elias Manousos, David Pon
  • Patent number: 11212255
    Abstract: There is provided a network appliance, methods and systems which intercept web and email traffic, extract executables, compare the executables with a policy and wrap the executables. Then, the wrapped executables are delivered to a client system in a manner to protect the network and end point devices, where the wrapped executables are run in a sandbox with all file system, registry accesses, communication and traffic isolated. Systems, networks, and methods for the prevention of phishing are also provided.
    Type: Grant
    Filed: October 30, 2015
    Date of Patent: December 28, 2021
    Inventor: Melih Abdulhayoglu
  • Patent number: 11212302
    Abstract: Methods and systems to identify the domain names that can potentially be used for delivering instructions to a bot, before bots on a computer network succeed in obtaining the instructions. The system maintains a device rating for each device that reflects a likelihood that the device is infected by malware. The system also maintains a domain-name rating for each device that reflects a likelihood that the domain name is malicious. When a device attempts to access a particular domain name, the domain-name rating of the domain name is updated in light of the device rating of the device, and/or update the device rating of the device in light of the domain-name rating.
    Type: Grant
    Filed: December 28, 2016
    Date of Patent: December 28, 2021
    Assignee: VERINT SYSTEMS LTD.
    Inventors: Yitshak Yishay, Vadim Pogulievsky
  • Patent number: 11212287
    Abstract: Provided are a program execution control method capable of preventing a malicious third party from misappropriating a web application program, a program, a recording medium, a web page, a transmission server, a client, and a web system. In the program execution control method, the program, the recording medium, the web page, the transmission server, the client, and the web system, the web application program includes a list of identification information of authorized servers written by a low-level language, a determination program, and a processing program which are written by a low-level language. The determination program checks whether identification information of the transmission server extracted from a URI of a web page and identification information of an authorized server included in the list match each other, and limits execution of the processing program according to the check result.
    Type: Grant
    Filed: May 30, 2019
    Date of Patent: December 28, 2021
    Assignee: FUJIFILM Corporation
    Inventors: Hiroki Nakamura, Hironori Yano
  • Patent number: 11206282
    Abstract: Methods and systems for penetration testing of a networked system by a penetration testing system. In some embodiments, both active and passive validation methods are used during a single penetration testing campaign in a single networked system. In other embodiments, a first penetration testing campaign uses only active validation and a second penetration campaign uses only passive validation, where both campaigns are performed by a single penetration testing system in a single networked system. Node-by-node determination of whether to use active or passive validation can be based on expected extent and/or likelihood of damage from actually compromising a network node using active validation.
    Type: Grant
    Filed: December 24, 2020
    Date of Patent: December 21, 2021
    Assignee: XM Cyber Ltd.
    Inventors: Boaz Gorodissky, Adi Ashkenazy, Ronen Segal, Menahem Lasser
  • Patent number: 11206127
    Abstract: The disclosure disclosures a blockchain-based verifiable inter-domain routing validation method, which includes: constructing a blockchain-based verifiable inter-domain routing system consisting of a verifiable inter-domain routing and a routing behavior validation subsystem; constructing, by a sender router R1, a routing behavior validation terminal of an autonomous domain to which the R1 belongs, and the routing validation blockchain system, a routing evidence and a routing evidence validation proposal, validating and endorsing the proposal, determining whether the proposal satisfies an endorsement policy, generating a routing evidence transaction, conducting consensus ordering on the transaction and updating a routing validation blockchain; and constructing, by a receiver router T, a routing behavior validation terminal of an autonomous domain to which the T belongs, and the routing validation blockchain system, a routing request validation message and retrieving whether a routing evidence corresponding to
    Type: Grant
    Filed: November 20, 2020
    Date of Patent: December 21, 2021
    Inventors: Yaping Liu, Binxing Fang, Shuo Zhang, Zhe Li, Qingyuan Li
  • Patent number: 11204994
    Abstract: Injection attack identification and mitigation includes tracking characteristics of user input by a user to a computer system via input device(s), building and maintaining a user profile based on the tracking and that provides a baseline of expected characteristics of user input, the baseline defined by the tracked characteristics, monitoring input to the computer system in real time as the input is provided to the computer system, identifying, based on the monitoring and on a comparison of characteristics of the monitored input to the baseline of expected characteristics, a potential malicious code injection as part of the monitored input to the computer system, and performing mitigation processing based on identifying the potential malicious code injection.
    Type: Grant
    Filed: May 9, 2019
    Date of Patent: December 21, 2021
    Assignee: INTERNATIONAL BUSINESS MACHINES CORPORATION
    Inventors: Cesar Augusto Rodriguez Bravo, Craig M. Trim, Wayne F. Tackabury, John R. Feezell
  • Patent number: 11206614
    Abstract: Aspects of the subject disclosure may include, for example, a system and method, for determining power requirements according to a data connection with a remote server that provides services to support execution of a remote application that corresponds to a local application that executes on the mobile device. The power requirements are compared to a remaining charge of a battery of the mobile device to obtain a comparison, and the remote application, in lieu of the local application that executes on the mobile device according to the comparison. Other embodiments are disclosed.
    Type: Grant
    Filed: June 27, 2019
    Date of Patent: December 21, 2021
    Assignee: AT&T Intellectual Property I, L.P.
    Inventors: Sheldon Kent Meredith, Brandon B. Hilliard, William Cottrill, Ivan Rasnik, Radhika Gouni
  • Patent number: 11200291
    Abstract: A computer-implemented method for creating a web programming interface (API) description may include parsing an API usage dataset with a processor to identify a plurality of nodes in each of a plurality of uniform resource locators (URLs), and tagging path parameters for the plurality of nodes. Tagging the path parameters may include identifying, with the processor, which nodes are static parts of the URLs, and identifying, with the processor, which of the nodes are path parameters for the URLs. The method may further include aggregating, with the processor, a plurality of node types based on the tagged path parameters and the static parts of the URLs, and outputting, via the processor, an API description based on the aggregated plurality of node types.
    Type: Grant
    Filed: November 2, 2015
    Date of Patent: December 14, 2021
    Assignee: INTERNATIONAL BUSINESS MACHINES CORPORATION
    Inventors: Philippe Suter, John E. Wittern
  • Patent number: 11200318
    Abstract: Methods and apparatus to detect adversarial malware are disclosed. An example adversarial malware detector includes a machine learning engine to classify a first feature representation representing features of a program as benign or malware, a feature perturber to, when the first feature representation is classified as benign, remove a first one of the features to form a second feature representation, and a decider to classify the program as adversarial malware when the machine learning engine classifies the second feature representation as malware.
    Type: Grant
    Filed: December 28, 2018
    Date of Patent: December 14, 2021
    Assignee: McAfee, LLC
    Inventors: Yonghong Huang, Raj Vardhan, Celeste R. Fralick, Gabriel G. Infante-Lopez, Dattatraya Kulkarni, Srikanth Nalluri, Sonam Bothra
  • Patent number: 11201862
    Abstract: Techniques provided herein relate to electronic authentication on public systems. A backend system receives at least one electronic data action request from a publicly available client system that is shared amongst a plurality of users. At least a portion of the primary authentication information is received from a secondary device separate from the publicly available client system. The electronic data action request is authenticated by determining if the primary authentication information matches expected primary authentication information that is expected to complete the electronic data action request. Performance of the electronic data action request is facilitated when the primary authentication information matches the expected primary authentication information.
    Type: Grant
    Filed: February 6, 2020
    Date of Patent: December 14, 2021
    Assignee: United Services Automobile Association (USAA)
    Inventors: Bharat Prasad, Charles Lee Oakes, III, Gunjan C. Vijayvergia, Vijay Jayapalan, Thomas Bret Buckingham
  • Patent number: 11194914
    Abstract: An improved anti-malware protection system protects computers against exploits in a scripting language that may be run in a browser. The system comprises a recorder that records scripting language execution events, a trace generator that transforms the recorded scripting language execution events into an execution trace, and a security engine that scans the execution trace and advises a security software about exploits found in the execution trace. By hooking the recorder into a runtime application programming interface for the scripting language, the improved protection system can detect exploits dynamically without the need for a browser-dependent plugin. An optional plugin can be included to perform file-based analysis of the script in addition to the runtime analysis of the script. The system can provide an application programming interface that can be used by multiple security software programs from multiple vendors to create an enhanced security software product.
    Type: Grant
    Filed: July 4, 2016
    Date of Patent: December 7, 2021
    Assignee: McAfee, LLC
    Inventors: Jin Yang, Yongnian Le, Igor Muttik, Hong Li
  • Patent number: 11196773
    Abstract: Systems and techniques are described for virtual machine security. A described technique includes operating one or more virtual machines each in accordance with a respective security container, wherein the respective security container is associated with a respective rule that specifies transfer of the virtual machine from the respective security container to a quarantine container based on one or more criteria. One or more security services are operated on the one or more virtual machines to identify one or more security threats associated with one or more of the virtual machines. One or more tags generated by the endpoint security services are obtained, where each tag is for a virtual machine that is associated with one of the identified security threats. And one of the virtual machines is identified as requiring transfer to the quarantine container based on, at least, one or more of the obtained tags and the one or more criteria.
    Type: Grant
    Filed: November 14, 2019
    Date of Patent: December 7, 2021
    Assignee: NICIRA, INC.
    Inventors: Sachin Mohan Vaidya, Azeem Feroz, Anirban Sengupta, James Christopher Wiese
  • Patent number: 11196746
    Abstract: “Sensitive” URIs for a website can be determined. Access attempts to a sensitive URI can be extracted from server logs. As used herein, sensitive URIs are URIs which if breached are likely to result in harm to the website owner. Access to sensitive URIs can be restricted to trusted accessors. Trusted accessors can be determined by filtering out untrusted accessors using thresholds and/or machine learning techniques. After filtering out untrusted accessors, any remaining accessors can be identified as trusted accessors. Trusted accessors can be added to a whitelist. Access requests to access-restricted URIs by an accessor not in the whitelist can be denied and an alert can be generated. Access requests to access-restricted URIs by an accessor in the whitelist can be granted.
    Type: Grant
    Filed: July 4, 2018
    Date of Patent: December 7, 2021
    Assignee: Microsoft Technology Licensing, LLC
    Inventors: Omer Karin, Hani Hana Neuvirth, Dotan Patrich, Tomer Koren, Ram Haim Pliskin, Josef Weizman, Yotam Livny
  • Patent number: 11196546
    Abstract: In one embodiment, an apparatus captures a memory dump of a device in a sandbox environment executing a malware sample. The apparatus identifies a cryptographic key based on a particular data structure in the captured memory dump. The apparatus uses the identified cryptographic key to decrypt encrypted traffic sent by the device. The apparatus labels at least a portion of the decrypted traffic sent by the device as benign. The apparatus trains a machine learning-based traffic classifier based on the at least a portion of the decrypted traffic sent by the device and labeled as benign.
    Type: Grant
    Filed: December 3, 2019
    Date of Patent: December 7, 2021
    Assignee: Cisco Technology, Inc.
    Inventors: Blake Harrell Anderson, Andrew Chi, David McGrew, Scott William Dunlop
  • Patent number: 11194904
    Abstract: Taking security actions based on monitored computer and user physical activities includes using sensors of a computer system to identify physical activity being performed by a user of the computer system, monitoring computer system activity being performed by the computer system as the user performs the identified physical activity, determining whether the identified physical activity being performed by the user is associated with input to the computer system to cause the computer system activity being performed by the computer system, and performing processing based on determining that the identified physical activity is not associated with input to cause the computer system activity, the processing including automatically performing security measure(s) on the computer system.
    Type: Grant
    Filed: November 7, 2018
    Date of Patent: December 7, 2021
    Assignee: INTERNATIONAL BUSINESS MACHINES CORPORATION
    Inventors: Cesar Augusto Rodriguez Bravo, David Jaramillo, Peeyush Jaiswal
  • Patent number: 11190356
    Abstract: Before a composition is ingested into a runtime environment at a runtime device, the composition may be verified at an authoring trusted execution environment (TEE) operating on an authoring device. A user can operate an untrusted computing platform (e.g., a personal computer, laptop computer, tablet computer, etc.) to write code, generate data, or create some other composition. Since this composition is created on an untrusted device, the authoring TEE may output the composition on a trusted peripheral device to a user for review and approval. Responsive to receiving approval at the trusted peripheral device, the authoring TEE can sign the composition with a local key and forward the composition for execution by the runtime device. The signature can be utilized by the runtime device to prove that it was reviewed and verified by an authorized user operating the authoring device.
    Type: Grant
    Filed: March 8, 2019
    Date of Patent: November 30, 2021
    Assignee: Microsoft Technology Licensing, LLC
    Inventors: David Garfield Thaler, III, Stefan Thom, Brian Clifford Telfer
  • Patent number: 11190357
    Abstract: A variety of frameworks, methods and container structures are described that are well suited for use in conjunction with medical devices and/or medical device support applications that are configured to be used in conjunction with a medical device. The described arrangements are well suited for use by applications executed on external devices such as a mobile communication device or an interface unit that are distinct from the medical device that the external device is being used in conjunction with. One specific application relates to defibrillator support applications executing on devices that are arranged to work in conjunction with a defibrillator, such as an automated external defibrillator.
    Type: Grant
    Filed: May 3, 2019
    Date of Patent: November 30, 2021
    Assignee: Avive Solutions, Inc.
    Inventors: David Picco, Gaurav Rao
  • Patent number: 11188657
    Abstract: There is described a method for determining a level of sensitivity of information in an electronic document. The method comprises scanning a computer location to select the electronic document, such as an unstructured document in which the sensitive nature of a given portion of the contents is not trivial. In the electronic document, contents and metadata of the electronic document are scanned, and each occurrence of sensitive data is identified by classifying each portion of the contents forming the electronic document as sensitive, or not sensitive, per se. For each occurrence of the sensitive data, there are determined a type of the sensitive data and a risk score associated to the type of the sensitive data, for example from a knowledge base. Using the risk score of each occurrence of the sensitive data, one can determine an exposure risk score of the electronic document.
    Type: Grant
    Filed: May 10, 2019
    Date of Patent: November 30, 2021
    Assignee: NETGOVERN INC.
    Inventor: Ludovic Jean-Louis
  • Patent number: 11190479
    Abstract: A method for detecting a predetermined behavior during a domain name registration or a domain resolution activity includes identifying one or more dimensions to be tracked. One or more metrics for each dimension is/are identified. A first time series for each of the metrics is generated. One or more first outliers in at least one of the first time series is detected. One or more sets of metrics is generated, each set including a combination of two or more of the metrics. A second time series for each of the metrics in the one or more sets of metrics is generated. One or more second outliers in at least one of the second time series is/are detected.
    Type: Grant
    Filed: May 23, 2017
    Date of Patent: November 30, 2021
    Assignee: VERISIGN, INC.
    Inventors: Yannis Labrou, Tomofumi Okubo, Eric Osterweil, Matthew Thomas
  • Patent number: 11188760
    Abstract: A computerized method and system for videogame clip detection and capturing on a mobile computing device includes receiving a user consent for capturing screen content by a content capture executable. The method and system includes executing the content capture executable in a background and monitoring processing operations in a foreground of the mobile computing device. Upon detecting gameplay from a gaming executable executing in the foreground, buffering screen content of the gameplay of the gaming executable in a first memory device for a first period of time. After gameplay, the method and system includes executing the content capture executable in the foreground, including receiving a clip generation command from the user and generating a videogame clip from at least a portion of the screen content in the first memory device. Therein, in response to a clip distribution command, the clip is distributed across a networked connection.
    Type: Grant
    Filed: December 10, 2020
    Date of Patent: November 30, 2021
    Assignee: Medal B.V.
    Inventors: Ted R Williams, Wilhelmus W. A. de Witte, Brandon Paul Cohen
  • Patent number: 11188622
    Abstract: Computer security techniques are described. One example determines whether to allow a program (e.g., native executable, script, etc.) to execute. This decision is based at least in part on the source of the program, such as whether the program is provided by a privileged source. A privileged program source may be any module, mechanism, or process that can provide executable instructions, such as directory or folder (e.g., on a local disk or network-accessible store), a computing device (e.g., server computer), another program (e.g., a Web server), or the like.
    Type: Grant
    Filed: April 24, 2019
    Date of Patent: November 30, 2021
    Inventor: Daniel Chien
  • Patent number: 11188366
    Abstract: Methods, systems, and techniques for facilitating access to content stored remotely, for example, as part of a virtual machine infrastructure or elsewhere in a networked environment, using a uniform mechanism are provided. Example embodiments provide an Enhanced Virtual Desktop Management Server/System with a Content Abstraction Layer which enables users to access their data stored as part of a virtual machine environment, or replicated otherwise on a network, using a generic API. The API can be incorporated into a web browser or other third party interface to provide access to the users' data without needing to remote a bitmap representation of a virtual desktop display. Accordingly, users can access their data, applications, and settings regardless of the type of access device and regardless of whether the corresponding virtual desktop is running in the data center, provisioned in the datacenter but running on a client device, or not running at all.
    Type: Grant
    Filed: January 4, 2018
    Date of Patent: November 30, 2021
    Assignee: VMware, Inc.
    Inventors: Puneet Chawla, Jad Chamcham
  • Patent number: 11188992
    Abstract: A system and method for inferring appropriate courses for recommendation based on member characteristics is disclosed. A social networking system receives a request for recommended courses, wherein the request is associated with a member of the social networking system. The social networking system identifies a group of members who are similar to the first member. The social networking system creates a list of recently learned skills by members of the group of members similar to the member. For a particular skill in the list of skills, the social networking system determines whether the member possesses the particular skill. In accordance with a determination that the member does not possess the particular skill, the social networking system identifies at least one course that teaches the particular skill from a list of courses. The social networking system transmits the identified course to the client device for display as a recommended course.
    Type: Grant
    Filed: December 1, 2016
    Date of Patent: November 30, 2021
    Assignee: Microsoft Technology Licensing, LLC
    Inventors: Siyuan Zhang, Qin Iris Wang, Dan Shacham, Mohsen Jamali
  • Patent number: 11184338
    Abstract: Precomputed and transactional mixing is believed to allow portable devices, such as smart phones, to send and receive messages, with little extra bandwidth or battery usage, while achieving anonymity for senders and recipients among all messages sent globally in batches defined by short time intervals. To learn anything about which inputs correspond with which outputs of such a batch of messages, the entire cascade of mix devices, each preferably operating independently in a different country, would it is believed have to be compromised. None of the real-time computation, neither by the mixes nor smartphones, uses full public-key operations—resulting it is believed in orders of magnitude performance improvement over previously-known systems. Aspects include untraceable return addresses, group chat, feed-following and large payloads. Transaction protocols include a variety of payments use cases.
    Type: Grant
    Filed: June 13, 2019
    Date of Patent: November 23, 2021
    Inventor: David Chaum
  • Patent number: 11184392
    Abstract: Attempts at lateral movement are detected by monitoring failed login attempts across a number of endpoints in a network. By configuring endpoints across the network to report unsuccessful login attempts and monitoring these login attempts at a central location, patterns of attempts and failures may advantageously be detected and used to identify malicious attempts at lateral movement within the network before any unauthorized lateral movement is achieved.
    Type: Grant
    Filed: December 18, 2018
    Date of Patent: November 23, 2021
    Assignee: Sophos Limited
    Inventors: Andrew J. Thomas, Daniel Stutz
  • Patent number: 11184741
    Abstract: Quarantine stations are steered to a hidden virtual access point for quarantining multicast and broadcast traffic from other traffic on an access point, or other device. The hidden virtual access point can be spawned, with the same configurations as a non-quarantine virtual access point, for on demand traffic containment. The data stream transmitted over Wi-Fi to the quarantine client using a different GTK key generated under virtual access point of hidden SSID for encryption of the multicast or broadcast transmission, and the data packet stream transmitted over wi-fi to the non-quarantine station using different GTK key generated under virtual access point SSID of regular SSID for encryption of the multicast or broadcast transmission.
    Type: Grant
    Filed: September 6, 2020
    Date of Patent: November 23, 2021
    Assignee: Fortinet, Inc.
    Inventor: Venkatesh Kannan