Vulnerability Assessment Patents (Class 726/25)
-
Patent number: 12130931Abstract: Systems and methods are provided for vulnerability proofing subsystems of hardware components of an IHS (Information Handling System). A request to modify configurations of a hardware component of the IHS is detected. Catalogs specifying known vulnerabilities of hardware components are accessed to determine whether any of the modified hardware configurations are identified as vulnerable in one or more of the catalogs. When vulnerabilities are identified in the modified configurations for the hardware component, other hardware components of the IHS are identified that are interdependent on the hardware component as part of an IHS subsystem. Hardware configurations for any of the hardware components of the subsystem are evaluated for vulnerabilities based on the catalogs.Type: GrantFiled: October 21, 2022Date of Patent: October 29, 2024Assignee: Dell Products, L.P.Inventors: Raveendra Babu Madala, Santosh Gore
-
Patent number: 12132750Abstract: Systems and methods are provided for data security. A server system provides data security using one or more processor devices, one or more communication interfaces, and one or more memory devices including computer-executable instructions.Type: GrantFiled: June 14, 2023Date of Patent: October 29, 2024Assignee: Nasdaq, Inc.Inventor: Stuart Ogawa
-
Patent number: 12130909Abstract: A method performed by an enterprise search system to conduct an automated, computerized search for select operational attributes of a plurality of network devices is shown. The method comprises initiating the search via a user interface based on receipt of input information, which is used to form a query. The method then determines based on the query, one or more audits each specifying one or more tasks to be performed by at least a first network device to search for the select operational attributes. Subsequently, the method makes the one or more audits available to the first network device via a network, and receives, from the first network device, one or more responses to the query. The method may include generating one or more filter conditions to apply to results of executing the one or more tasks to yield the select operational attributes when included in the results.Type: GrantFiled: October 5, 2020Date of Patent: October 29, 2024Assignee: Musarubra US LLCInventors: Steven Antonio Ross, Ai Quoc Duong, Larry Alan King, John Patrick Young
-
Patent number: 12126597Abstract: A VPN servers request is received from a user device. An ISP of the user device is obtained. A geolocation of the user device is obtained. Respective server penalty scores of available VPN servers are obtained. The respective server penalty scores of the available VPN servers are adjusted using respective ISP data, where ISP data of a VPN server include data indicative of connections from devices in the geolocation to the VPN server. At least one VPN server is transmitted to the user device based on the adjusted respective server penalty scores.Type: GrantFiled: February 24, 2022Date of Patent: October 22, 2024Assignee: Oversec, UABInventors: Tomas Kolaitis, Vytautas Neubauer
-
Patent number: 12124582Abstract: Method include receiving banner information from one or more queries of a network connecting a set of devices, wherein the banner information of one or more of the devices includes common vulnerability and exposure identifiers (CVEs) and the banner information of one or more of the devices does not include a CVE, identifying the devices based on the banner information including classifying devices without known CVEs by a device type, determining vulnerability scores for the devices with known CVEs based on retrieved CVE information, and determining vulnerability scores for the devices without CVEs based on a series of exploitability and impact parameter estimates associated with the device type classifications. Some methods include estimating a cyberattack vulnerability risk for the devices using the determined vulnerability scores.Type: GrantFiled: December 10, 2020Date of Patent: October 22, 2024Assignee: Battelle Memorial InstituteInventors: Sri Nikhil Gupta Gourisetti, Michael E. Mylrea, Md. Touhiduzzaman, Travis Ashley, Beverly E. Johnson, Newton B. Brown, Penny L. McKenzie, Seemita Pal
-
Patent number: 12120524Abstract: A programmable radio exposure function switches between real-time and near-real-time modes of operation for a radio access network (RAN) intelligent controller of a telecommunications system. An application programming interface is exposed by the radio exposure function and performs radio resource management for the telecommunications system. The application programming interface communicates with services and/or applications to control RAN functions, and allocates RAN resources of the telecommunications system to a user equipment for the services and/or applications. A machine learning module is embedded within the radio exposure function and trained to identify network slices of the telecommunications system for the services and/or applications. The machine learning module analyzes data received from the user equipment to detect that the user equipment has violated a security constraint of the telecommunications system.Type: GrantFiled: November 10, 2023Date of Patent: October 15, 2024Assignee: T-Mobile USA, Inc.Inventors: Marouane Balmakhtar, Lyle Walter Paczkowski
-
Patent number: 12118095Abstract: Various embodiments include systems and methods of implementing a machine learning model for calculating confidence scores associated with potential security vulnerabilities. The machine learning model is trained using vulnerability data associated with a set of previously identified vulnerabilities, where the vulnerability data indicates whether a previously identified vulnerability is a true positive or a false positive. In some embodiments, scan traffic data may be obtained. The scan traffic data may be associated with potential security vulnerabilities detected via scan engine(s) that implement application security testing. The machine learning model may be used to determine respective confidence scores for each potential security vulnerability. According to some embodiments, responsive to a request for scan findings associated with a particular application, the respective confidence scores may be displayed via a vulnerability analysis graphical user interface.Type: GrantFiled: July 30, 2021Date of Patent: October 15, 2024Assignee: Rapid7, Inc.Inventors: Stuart Millar, Denis Podgurskii
-
Patent number: 12120150Abstract: Disclosed herein are methods, systems, and processes for probabilistically identifying anomalous levels of honeypot activity. A honeypot dataset associated with a honeypot network is received and a representative usage value is determined from the honeypot dataset. The representative usage value is identified as being associated with anomalous behavior if the representative usage value deviates from an expected probability distribution. A remediation operation is initiated in the honeypot network in response to the identification of the representative usage value as being associated with the anomalous behavior by virtue of the representative usage value deviating from the expected probability distribution.Type: GrantFiled: October 2, 2023Date of Patent: October 15, 2024Assignee: Rapid7, Inc.Inventors: Wah-Kwan Lin, Curtis Barnard
-
Patent number: 12120141Abstract: In an example implementation according to aspects of the present disclosure, a system, method, and storage medium to identify and score security vulnerabilities is disclosed. A memory and a processor receive security-related data from a plurality of client computing devices, create a security score for each the client computing devices. The processor identifies a subset of the client computing devices with security scores surpassing a threshold and remediates a security vulnerability on each of the subset.Type: GrantFiled: July 28, 2021Date of Patent: October 15, 2024Assignee: Hewlett-Packard Development Company, L.P.Inventors: Narendra Kumar Chincholikar, Sanket Anavkar, Vaibhav Tarange, Manohar Lal Kalwani
-
Patent number: 12119987Abstract: Layer-specific modifications may be applied to a network communication received at a proxy according to configurable rules at the proxy. A modification configuration may be received at the proxy that corresponds to a layer of a communication stack supported by the proxy. When a communication is received, data from the layer of the communication stack of the network communication may be evaluated to determine whether a modification is applicable to the communication according to the modification configuration. An applicable modification may be applied by proxy as part of processing the communication at the proxy.Type: GrantFiled: May 16, 2019Date of Patent: October 15, 2024Assignee: Amazon Technologies, Inc.Inventors: Ryan Preston Gantt, Ethan F. John, Jacob Shannan Carr
-
Patent number: 12120142Abstract: An analysis apparatus includes an analysis target selection unit configured to select entities to be analyzed, an attack graph generation unit configured to generate an attack graph for a set of the selected entities, and a countermeasure implementation assumption unit configured to assume that a countermeasure for invalidating an attack condition is implemented in the generated attack graph. The attack graph generation unit generates the attack graph on a precondition that the countermeasure for invalidating the attack condition assumed by the countermeasure implementation assumption unit has been implemented. The analysis target selection unit selects at least one of all the entities to be analyzed and adds the selected entity in the analysis targets in each of the plurality of cycles.Type: GrantFiled: June 11, 2019Date of Patent: October 15, 2024Assignee: NEC CORPORATIONInventor: Masaki Inokuchi
-
Patent number: 12118361Abstract: In general, this disclosure describes techniques for building an application designed to run on a given infrastructure as a container. For example, a unicontainer as described herein may represent a smallest-size, statically-linked binary that is the most optimal implementation of a container for executing an application. In some examples, a computing system builds this container by identifying unused or unneeded functionalities from dependencies for the application, for instance where such functionalities are provided by a target infrastructure for the container.Type: GrantFiled: November 20, 2019Date of Patent: October 15, 2024Assignee: SRI InternationalInventor: Hassen Saidi
-
Patent number: 12111918Abstract: Methods and systems for evaluating microservice system level activities including system calls and commands, and generating security policies for microservices are disclosed. A microservice agent, operating on a microservice host, can collect system level activity data corresponding to a plurality of microservices operating on the microservice host. The microservice agent can transmit the system level activity data to a microservice evaluator that can use the system level activity data to train machine learning models to identify normal and abnormal microservice system level activities. The normal and abnormal system level activities can be used to generate security policies that can be applied to the microservices. Microservices that perform abnormal system level activities or system level activities that violate security policies can be paused or terminated.Type: GrantFiled: September 18, 2018Date of Patent: October 8, 2024Assignee: Visa International Service AssociationInventors: Ajit Gaddam, Ara Jermakyan, Pushkar Joglekar, Vlad Spichek
-
Patent number: 12113825Abstract: A system obtains security data of interconnected networks. The visibility of the security data is asymmetric for each interconnected network relative to the other. The security data is continuously stored and used in real-time or near real-time to identify services of the interconnected networks that require safeguards against a potential cyberattack. The interworking system determines a security parameter that relates the security data to the potential cyberattack and communicates the security parameter to the interconnected networks. The interconnected networks can safeguard against the potential cyberattack based on the security parameter.Type: GrantFiled: May 8, 2023Date of Patent: October 8, 2024Assignee: T-Mobile USA, Inc.Inventors: Venson Shaw, Gaviphat Lekutai
-
Patent number: 12112321Abstract: Various embodiments include methods and devices for implementing a secure user interface. The method may include generating a secure user interface display in a secure execution environment, generating a non-secure display in a normal execution environment, combining the secure user interface and the non-secure display into a combined display, and presenting the combined display via a display device.Type: GrantFiled: November 28, 2019Date of Patent: October 8, 2024Assignee: QUALCOMM IncorporatedInventors: Prakash Tiwari, Shvetank Kumar Singh, Rajesh Yadav, Naga Chandan Babu Gudivada, Vidyasagar Gopireddy, Manish Sharma, Utkarsh Mehta
-
Patent number: 12105851Abstract: A system hash for each production system is generated. Each system hash includes a concatenation of a hardware hash and a software hash of each production system in the datacenter. A datacenter hash tree is created based on a combination of the system hashes. A test copy of the software hash of each of the production systems is created in respective test systems in the datacenter. In response to detecting a change in the datacenter hash tree, a modification in a system hash which resulted in the change is identified. The central copy of the software hash is compared with the test copy of the software hash. In response to a mismatch between the central copy and the test copy, occurrence of an unauthorized attack in a software of the production system is detected.Type: GrantFiled: September 27, 2021Date of Patent: October 1, 2024Assignee: Hewlett Packard Enterprise Development LPInventor: Debdipta Ghosh
-
Patent number: 12105799Abstract: Systems, methods, and computer-readable storage media for improving cybersecurity protections across entities. One system includes a response system including one or more processing circuits including memory and at least one processor configured to identify or collect incident data corresponding with a cybersecurity incident. The at least one processor further configured to record the incident data in a distributed ledger or data source and analyze the incident data utilizing a cybersecurity model to generate one or more verified intelligences corresponding to at least one cybersecurity threat. The at least one processor further configured to determine the one or more verified intelligences corresponds to at least one of the plurality of entities and decode the one or more verified intelligences into one or more entity-specific data formats. The at least one processor further configured to configure or re-configure at least one security tool.Type: GrantFiled: April 5, 2024Date of Patent: October 1, 2024Assignee: AS0001, INC.Inventor: Jonathan J. Thompson
-
Patent number: 12107879Abstract: Methods, systems, apparatuses, and computer-readable storage mediums are described for assigning a security risk score to a resource. In one example, resource access data is collected for a resource. Based at least on the resource access data, a data risk index (DRI) score is generated for the resource. The DRI score comprises a value that is indicative of a level of risk that the resource will be compromised. At least one of the DRI score, an alert based at least on the DRI score, or a policy change for the resource based at least on the generated DRI score is reported to an administrator.Type: GrantFiled: January 28, 2022Date of Patent: October 1, 2024Assignee: MICROSOFT TECHNOLOGY LICENSING, LLCInventors: Carl Alan Waldspurger, Shaun Robert Applegate-Swanson, Venkata Adusumilli, Balaji Parimi, Naga Venkata Naveen Teja Jangalapalli, Nicholas James Barretta, Guruprasad Ramprakash, Parag Mahendrakumar Bajaria
-
Patent number: 12107895Abstract: A system and method for the privilege assurance of enterprise computer network environments using attack path detection and prediction. The system uses local session monitors to monitor logon sessions within a network, track session details, and log session and network host details. Cyber-physical graphs are produced and used to identify paths within the network based on the logged information, and to apply risk weighting to the identified paths and determine likely attack paths an attacker may use.Type: GrantFiled: June 29, 2021Date of Patent: October 1, 2024Assignee: QOMPLX LLCInventors: Jason Crabtree, Andrew Sellers, Richard Kelley
-
Patent number: 12101307Abstract: Systems and methods for secure stateless client-server communication. User credentials in a client authorization request are authenticated and used to generate a JSON web token (JWT). The JWT header and signature are encrypted and included in an HTTP-only cookie. The JWT payload is encrypted and sent to the client in a response body along with the HTTP-only cookie. Each subsequent client request includes the cookie and has the encrypted JWT payload in the request header. Upon receiving the request, the server decrypts the encrypted JWT payload from the header and decrypts the encrypted JWT header and signature from the cookie, then reconstructs the JWT from the JWT header, payload and signature. The server validates the JWT and, if valid, processes the request according to authorizations in the JWT payload.Type: GrantFiled: May 31, 2022Date of Patent: September 24, 2024Assignee: OPEN TEXT CORPORATIONInventors: Conrado Eduardo Poole Siguero, Sandip Chitale, Derek Zasiewski
-
Patent number: 12099613Abstract: A method, computer program product, and computer system for repairing a Dockerfile. Library versions containing initial version numbers of libraries are extracted from the Dockerfile. A Monte Carlo tree search (MCTS) is executed, using the extracted library versions as input, which generates a tree that includes multiple levels populated with noses. Each node in a level represents the generic library name of a library version in the Dockrerfile and an associated randomly selected version number. At least one of the randomly selected version numbers associated with at least one node in a level differs from the initial version number associated with a versionf. A best successful installation path is selected from the at least one successful installation path. The Dockerfile is repaired by inserting randomly selected version numbers into Dockerfile as replacements for some of the initial version numbers.Type: GrantFiled: September 16, 2021Date of Patent: September 24, 2024Assignee: International Business Machines CorporationInventors: Xiang Yu Yang, Yong Wang, Zhong Fang Yuan, Deng Xin Luo, Ye Wang, Zhi Yong Jia
-
Patent number: 12101357Abstract: Embodiments provide a system and method for constructing a graph-based model for optimizing the security posture of a composed system. During operation, the system constructs a multi-layer graph for a system with a plurality of components, wherein the multi-layer graph comprises a configuration subgraph, a vulnerability subgraph, and a dependency subgraph. The system constructs the multi-layer graph by the following. The system generates nodes in the configuration subgraph, including: nodes in a first class which encode information associated with a configuration parameter for a respective component, wherein the encoded information includes a name, a default value, a range of values, and a data type; and nodes in a second class which encode value assignments for configuration parameters and relationships between configuration parameters. The system generates nodes in the vulnerability subgraph based on known vulnerabilities associated with a component, bad security practices, and best security practices.Type: GrantFiled: July 1, 2020Date of Patent: September 24, 2024Assignee: Xerox CorporationInventors: Hamed Soroush, Milad Asgari Mehrabadi, Shantanu Rane, Massimiliano Albanese
-
Patent number: 12101323Abstract: Disclosed herein are systems and methods for providing network protection for web-based conferencing services. In one aspect, an exemplary system comprises, a device comprising a processor, an operating system (OS) operable in a user mode and a kernel mode, and a kernel driver for performing operations while the OS is in kernel mode, the kernel driver configured to: monitor file operations that involve objects belonging to a web conferencing service, receive a request from an application executing in a user mode, the request being for an operation to be executed in the kernel mode, when the operation involves at least one object belonging to the web conferencing service, request for an authorization from a protection service executing in the user mode, and allow the operation to be performed only when the authorization is received from the protection service.Type: GrantFiled: November 16, 2021Date of Patent: September 24, 2024Assignee: ACRONIS INTERNATIONAL GMBHInventors: Vladimir Strogov, Serguei Beloussov, Stanislav Protasov
-
Patent number: 12095796Abstract: Instruction-level threat assessment, including: identifying one or more probe insertion points in code of a package corresponding to one or more vulnerabilities of the package; inserting, into one or more instances of the package deployed in one or more hosts of a cloud deployment, one or more probes based on the one or more probe insertion points; and elevating a severity of a particular vulnerability in response to reaching a particular probe of the one or more probes.Type: GrantFiled: December 12, 2022Date of Patent: September 17, 2024Assignee: LACEWORK, INC.Inventors: Patrice Godefroid, Curtis Condra, Yijou Chen
-
Patent number: 12095787Abstract: A system and method for mitigating cyber threats. A method includes aggregating a plurality of mitigation actions into at least one mitigation action set with respect to at least one security control, wherein each mitigation action set includes a respective subset of the plurality of mitigation actions corresponding to a respective security control of the at least one security control; and performing the at least one mitigation action set via the at least one security control, wherein performing each mitigation action set includes sending a respective set of instructions, wherein the set of instructions sent for each mitigation action set causes a respective security control of the at least one security control to implement each mitigation action of the mitigation action set.Type: GrantFiled: March 21, 2024Date of Patent: September 17, 2024Assignee: Zafran Security LTDInventors: Ben Seri, Snir Havdala
-
Patent number: 12095786Abstract: A system and method for generating a remediation action in a computing environment based on a cybersecurity inspection. The method includes: inspecting a computing environment for a cybersecurity object; detecting a cybersecurity issue in the computing environment based on detection of the cybersecurity object; generating an input for a generative remediator based on the detected cybersecurity issue, wherein the generative remediator is configured to generate an output including a remediation action based on the input; and initiating the remediation action in the computing environment.Type: GrantFiled: December 18, 2023Date of Patent: September 17, 2024Assignee: Wiz, Inc.Inventors: Itay Arbel, Roy Reznik, Bar Magnezi, Erez Eyal
-
Patent number: 12093365Abstract: A new transactional, constraint-based system is provided to define and maintain authorization policies. Constraints are expressed as user-defined, domain-specific programs that operate on authoritative representations of entities and administrative hierarchies.Type: GrantFiled: July 27, 2020Date of Patent: September 17, 2024Assignee: Google LLCInventors: Henning Korsholm Rohde, William C. Neubauer, III, Rafael de Jesús Fernández Moctezuma
-
Patent number: 12096296Abstract: An information processing apparatus includes a processor configured to: when three conditions are satisfied, output information indicating that there is possibility that an access point to be connected is switched, the first condition being that an automatic switching setting for automatically switching the access point is ON, the automatic switching being made in accordance with the reception strength of a radio wave from the access point, the second condition being that the information processing apparatus connects to a first access point, the first access point being capable of connecting to a device, the device performing a process, the third condition being that the information processing apparatus is allowed to establish a connection to a second access point, the second access point being not capable of connecting to the device, the second access point having a higher reception strength of a radio wave than the first access point.Type: GrantFiled: January 13, 2022Date of Patent: September 17, 2024Assignee: FUJIFILM BUSINESS INNOVATION CORP.Inventor: Shuhei Toda
-
Patent number: 12086265Abstract: Methods, apparatus, and processor-readable storage media for automatically performing varied security scans on distributed files using machine learning techniques are provided herein. An example computer-implemented method includes obtaining at least one input file from one of multiple source channels; identifying a data security scan operation, from a set of multiple data security scan operations, for the at least one input file by processing historical data attributed to the at least one input file using machine learning techniques; executing the identified data security scan operation on the at least one input file; generating a hash of the at least one input file and information pertaining to results of the executed data security scan operation; caching the generated hash in at least one cache; and performing automated actions based on the caching of the generated hash in the at least one cache.Type: GrantFiled: January 19, 2022Date of Patent: September 10, 2024Assignee: Dell Products L.P.Inventors: Bijan Kumar Mohanty, Vinotth Ramalingam, Subramanya Padubidri, Hung T. Dinh
-
Patent number: 12086240Abstract: Malware infection or an abnormal operation caused by a malicious attack is detected in real time, even in an electronic device with relatively inferior processing capacity. An electronic device includes an executable code identification unit configured to receive an executable code string output from a processor, and identify at least an execution address in a user program region of an operating system (OS), and an execution address in a kernel region, and a determination unit configured to check a predetermined feature value obtained at a predetermined timing from an identification result obtained by the executable code identification unit, against a predetermined expected value, and determine that an attack happens, in a case where a difference is equal to or larger than a predetermined difference, and the determination unit notifies the processor of a predetermined abnormality notification signal if the determination unit determines that an attack happens.Type: GrantFiled: December 7, 2020Date of Patent: September 10, 2024Assignee: HITACHI, LTD.Inventors: Kenichi Shimbo, Tadanobu Toba
-
Patent number: 12088603Abstract: Arrangements for comprehensive threat mitigation are provided. In some aspects, an indication of threat or potential threat may be received from an external entity. In some examples, the threat may include a cybersecurity threat. In response to receiving the indication of threat, identifying data associated with the external entity may be extracted from the indication and used to retrieve pre-stored customizations associated with the desired mitigating actions of the external entity. The one or more mitigating actions may be identified and instructions to execute the one or more mitigating actions may be generated and transmitted to one or more computing devices for execution.Type: GrantFiled: May 9, 2022Date of Patent: September 10, 2024Assignee: Bank of America CorporationInventors: Benjamin F. Tweel, Neal Aaron Slensker, James Siekman, Shannon Sabina Rolinger, John Raymond Omernik, Rebecca Lynn Pietro
-
Patent number: 12088605Abstract: Methods and systems comprising a first portion of a model that includes a model component that is trained to perform sentiment analysis based on training data for a plurality of users (e.g., what language, phrases, and/or responses the population at large uses). The first portion of the model also includes a model component that is trained to identify user intent based on the sentiment analysis that is specific to user groups. For example, the system first determines the likely context and/or meaning of communications of the user. The system then determines a likely intent of the user based on the likely context and/or meaning of communications (e.g., based on a correlation of the meaning of communications of the user and the intents of users corresponding to a user group of the user).Type: GrantFiled: July 8, 2022Date of Patent: September 10, 2024Assignee: Capital One Services, LLCInventors: Farshid Marbouti, Gurpreet Singh Sandhu, Sarvani Kare, Nahid Farhady Ghalaty, Daniel Liu, Patrick Sofo, Lee Adcock
-
Patent number: 12088616Abstract: A method, system, or apparatus for mitigating computer and network security deficiencies is provided in which, the method, system, or apparatus scans computer system components for finding a vulnerability, generates a Vulnerability Priority Scoring System (VPSS) score for the vulnerability based on the vulnerability, develops a vulnerability mitigation policy based on a system state comprising the VPSS score, wherein the vulnerability mitigation policy provides a best action for mitigating the vulnerability selected among one or more trained possible actions by a deep neural network, and performs the vulnerability mitigation policy based on the best action. Other aspects, embodiments, and features are also claimed and described.Type: GrantFiled: November 8, 2021Date of Patent: September 10, 2024Assignee: UNIVERSITY OF SOUTH FLORIDAInventor: Ankit Shah
-
Patent number: 12086254Abstract: A computer-implemented method according to one approach includes receiving behavior data associated with a user's behavior on at least one device. The behavior data is based on one or more of an email account, a browser history, password usage and online behavior history. Risk levels associated with the behavior data are generated and role-based risk events are predicted based on the behavior data. The method further includes simulating the role-based risk events based on the risk levels, and adjusting role-based access control of the user based on results of the simulating. A computer program product for adjusting role-based access control according to another approach includes a computer readable storage medium having program instructions embodied therewith. The program instructions are readable and/or executable by a computer to cause the computer to perform the foregoing method.Type: GrantFiled: December 22, 2020Date of Patent: September 10, 2024Assignee: International Business Machines CorporationInventors: Stephen William Webster, Margaret Kathryn Lewis, Hanna Oh
-
Patent number: 12086247Abstract: A computerized method for logical identification of malicious threats across a plurality of end-point devices (EPD) communicatively connected by a network, comprising collecting over the network an identifier associated with each file of a plurality of files, wherein each file of the plurality of files is installed on at least one of the plurality of EPDs and wherein the identifier is the same for each like file of the plurality of file. Information associated with an identified subset of files is collected, wherein the information indicates at least a time at which the at least one file was installed on one or more of the plurality of EPDs and the way the at least one file spread within the network. The collected information is analyzed according to a set of predetermined computerized investigation rules. The analysis is used to determine whether at least a file of the identified subset files is a suspicious file.Type: GrantFiled: December 3, 2021Date of Patent: September 10, 2024Assignee: Palo Alto Networks, Inc.Inventor: Gil Barak
-
Patent number: 12079712Abstract: A solid-state image capturing system (1) includes a solid-state image capturing device (100) and an information processing device (200). The solid-state image capturing device (100) includes a first DNN processing unit (130) that executes, on image data, a part of a DNN algorithm by a first DNN to generate a first result. The information processing device (200) includes a second DNN processing unit (230) that executes, on the first result acquired from the solid-state image capturing device, remaining of the DNN algorithm by a second DNN to generate a second result.Type: GrantFiled: August 30, 2019Date of Patent: September 3, 2024Assignee: SONY SEMICONDUCTOR SOLUTIONS CORPORATIONInventors: Seigo Hanada, Suguru Kobayashi
-
Patent number: 12079348Abstract: A risk rating method and system that predicts the risk likelihood, the risk impact, and the risk rating of certain threats and vulnerabilities from exploiting different component groups. In some embodiments, the system's predictions (also referred to herein as inferences) are generated based on data elements provided by a user about its organization's information systems. In further embodiments, the method and system utilizes data mining, historical records, and an AI Engine to provide the predictions for the risk likelihood, the risk impact, and the risk rating posed by the various threat occurrences.Type: GrantFiled: January 25, 2023Date of Patent: September 3, 2024Assignee: CLEARWATER COMPLIANCE LLCInventors: Jonathan D. Stone, Tess Array Miller, Ravneet Singh, Jonathan A. Moore
-
Patent number: 12079336Abstract: A system for securing electronic devices includes a processor, non-transitory machine readable storage medium communicatively coupled to the processor, security applications, and a security controller. The security controller includes computer-executable instructions on the medium that are readable by the processor. The security application is configured to determine a suspicious file from a client using the security applications, identify whether the suspicious file has been encountered by other clients using the security applications, calculate a time range for which the suspicious file has been present on the clients, determine resources accessed by the suspicious file during the time range, and create a visualization of the suspicious file, a relationship between the suspicious file and the clients, the time range, and the resources accessed by the suspicious file during the time range.Type: GrantFiled: December 30, 2022Date of Patent: September 3, 2024Assignee: Musarubra US LLCInventors: Derek Pearcy, Jessica Heinrich, Michael Bishop, Cristian Fiorentino, Jessica Gaskins, Martina Borkowsky
-
Patent number: 12081503Abstract: An electronic device will identify an electronic message received by a messaging client that is associated with a first recipient, and it will analyze the electronic message to determine whether the electronic message is a simulated malicious message. Upon determining that electronic message is a simulated malicious message, the device will identify an actuatable element in the electronic message. The actuatable element will include a service address. The device will modify the electronic message by appending a user identifier of the first recipient to the service address of the actuatable element. Then, when the actuatable element is actuated, the system may determine whether the first recipient actuated the actuatable element or an alternate recipient did so based on whether the user identifier of the first recipient is still appended (or is the only user identifier appended) to the actuatable element.Type: GrantFiled: July 29, 2020Date of Patent: September 3, 2024Assignee: Proofpoint, Inc.Inventors: Kurt Wescoe, Trevor T. Hawthorn, Alan Himler, Patrick H. Veverka, John T. Campbell, Dustin D. Brungart, Norman Sadeh-Koniecpol
-
Patent number: 12081542Abstract: A computer readable medium having executable code that causes one or more processors to: receive at least one of a first image of the user or a first representation of a face of the user; if a first image of the user was received, then generate a generated representation of the face of the user using the first image; capture a second image of the user and generate a second representation of the face of the user using the second image; receive an authentication factor; determine validity of the authentication factor; reduce a confidence threshold based on the authentication factor; determine a likelihood of a match between the second representation and at least one of the first representation and the generated representation; and permit access by the user to a secure asset in instances where the likelihood of a match meets the confidence threshold.Type: GrantFiled: December 30, 2021Date of Patent: September 3, 2024Assignee: ASSA ABLOY ABInventor: James Scott Voss
-
Patent number: 12075252Abstract: Various embodiments include systems and methods of implementing radio frequency (RF) capture analysis reporting. The implementing may include receiving RF data captured by RF capture component(s) positioned at location(s) within a physical environment. The captured RF data includes RF device metrics associated with RF device(s) identified by the RF capture component(s) as being located within the physical environment. One or more analysis operations may be performed with respect to the RF device(s) based at least in part on the RF device metrics. Based at least in part on a result of the analysis operation(s), a potential security vulnerability associated with a particular RF device may be identified. A report may be generated that identifies at least the potential security vulnerability associated with the particular RF device.Type: GrantFiled: November 15, 2021Date of Patent: August 27, 2024Assignee: Rapid7, Inc.Inventors: Deral Heiland, Matthew Kienow, Adam Bunn, Alberto Cecioni
-
Patent number: 12074902Abstract: A method for performing cyber-security analysis includes generating a semantic graph in which each object is represented as a node, and each event associated with an object is represented as an edge. A cyber-threat related alert, with an associated alert type, is received from a source. A first object from the plurality of objects is modified based on the alert. A plurality of threat scores, each associated with an object, are calculated, substantially concurrently, based on the alert type. Subsequently, a plurality of modified threat scores are determined for each object, based on: (1) the threat score for that object, (2) a connectivity of that object to each of the remaining objects within the semantic graph; and (3) the threat score for each remaining object from the plurality of objects. A subgraph of the semantic graph is identified based on normalized versions of the modified threat scores.Type: GrantFiled: June 20, 2023Date of Patent: August 27, 2024Assignee: GOOGLE LLCInventors: Scott Eric Coull, Jeffrey Thomas Johns
-
Patent number: 12074893Abstract: Disclosed are a system, method, and computer program product for user network activity anomaly detection. The method includes generating a multilayer graph from network resource data, and generating an adjacency matrix associated with each layer of the multilayer graph to produce a plurality of adjacency matrices. The method further includes assigning a weight to each adjacency matrix to produce a plurality of weights, and generating a merged single layer graph by merging the plurality of layers based on a weighted sum of the plurality of adjacency matrices using the plurality of weights. The method further includes generating a set of anomaly scores by generating, for each node in the merged single layer graph, an anomaly score. The method further includes determining a set of anomalous users based on the set of anomaly scores, detecting fraudulent network activity based on the set of anomalous users, and executing a fraud mitigation process.Type: GrantFiled: May 26, 2023Date of Patent: August 27, 2024Assignee: Visa International Service AssociationInventors: Bo Dong, Yuhang Wu, Yu-San Lin, Michael Yeh, Hao Yang
-
Patent number: 12069091Abstract: There is disclosed in one example a computing apparatus, including: a processor and a memory; a network interface; and instructions encoded within the memory to instruct the processor to: receive a uniform resource locator (URL) for analysis, the URL to access a web page via a remote server; via the network interface, retrieve from the remote server a copy of the web page; render the web page in a headless browser to provide a computer-accessible visual output; perform visual analysis of the visual output via a digital eye; compare the visual analysis to a plurality of known phishing target websites; and if the comparison identifies the web page as visually similar to a known phishing target website, detect the web page as a phishing web page.Type: GrantFiled: August 5, 2022Date of Patent: August 20, 2024Assignee: McAfee, LLCInventor: Shashi KIran N
-
Patent number: 12069074Abstract: An automated framework provides security monitoring and analysis in a network by autonomously detecting actual and potential threats to the network. In response to detection of a threat, the framework instantiates a Situation to provide directed monitoring of the threat. The Situation invokes specific skills based on the state of the Situation to monitor network traffic for activity specific to the threat that instantiated the Situation. As data is collected, additional skills may be invoked based on the additional data to collect new data, and previously invoked skills may be terminated depending on the additional data to avoid collecting information that is no-longer relevant.Type: GrantFiled: June 9, 2021Date of Patent: August 20, 2024Assignee: ARISTA NETWORKS, INC.Inventors: Keith Amidon, David Pearson, Jeff Polakow, Matthew Park, Gary Golomb
-
Patent number: 12067128Abstract: Methods, computer-readable media, software, systems and apparatuses may retrieve, via a computing device and over a network, information related to one or more characteristics of a particular application or service deployed in a computing environment. The particular application or service may be associated with a class of applications or services based on the information. A type of personal data collected may be determined for each application or service in the associated class. For the particular application or service, a risk metric indicative of a type of personal data collected by the particular application or service in relation to the type of personal data collected by other applications or services in the associated class may be determined. An additional application or service with a lower risk than the particular application or service may be recommended.Type: GrantFiled: December 19, 2022Date of Patent: August 20, 2024Assignee: ALLSTATE INSURANCE COMPANYInventor: Joshua Hurwitz
-
Patent number: 12061709Abstract: A computing device, such as a server, has a sealed housing and runs one or more data extraction agents. In some embodiments, the computing device includes one or more processors and memory located inside the sealed housing, the memory stores instructions that when executed by the one or more processors causes the one or more processors to: authenticate with a data recipient system using a prestored security engine and using a shared registration secret uniquely associating the computing device with the data recipient system; retrieve an extraction job specification from an extraction job specification repository associated with the data recipient system; and using the extraction job specification, communicate to one or more client computing devices associated with a client system to extract data records from one or more data stores of the client system. Related methods are also disclosed.Type: GrantFiled: November 5, 2019Date of Patent: August 13, 2024Assignee: Palantir Technologies Inc.Inventors: Jason Free, Charles Walters, Claude Johnson, Stephen Denney, Drew Tuck, Jerry Sung, Daniel Berkowitz, Quinn Beightol, Melvin Shaw, Charles Smith
-
Patent number: 12061697Abstract: Detecting a malicious package associated with a software repository. A method identifies a subject package in a software repository, and extracts a feature set from the subject package. The feature set includes single-version features, including whether the subject package accesses personally identifying information, accesses specified system resource(s), uses specified application programming interface(s), includes installation script(s), and/or includes a binary, minified, or obfuscated file. The feature set also includes change features, including an amount of time since publication of a prior version of the subject package, a semantic update type, and/or how single-version feature(s) have changed since the prior version. The method provides the feature set as input to a set of classifiers, each being configured to use the feature set to generate a prediction of whether the subject package is malicious or benign.Type: GrantFiled: February 16, 2022Date of Patent: August 13, 2024Assignee: Microsoft Technology Licensing, LLCInventors: Max Schaefer, Adriana Sejfia
-
Patent number: 12061771Abstract: Systems and methods for visual streams/Feeds and no-coding programming/management interface of trusted application/human flows and of addressable/measurable resources for end of supply excellence are described herein. Specifically, a biometrically controlled, crypto secure, peer-to-peer/service/authority/united trusted, “no touch” capable, space point independent, closed-loop self-resource/service-resource efficacy increasing, flexible assistant as a service is described that addresses the situational disconnected multi-channeling, over-processing and parallel communication flaws and lack of evidence/efficiency/non-identifiable transparency seen in current systems of (social) media and (physical) services, administration and overhead.Type: GrantFiled: December 23, 2021Date of Patent: August 13, 2024Inventor: Patrick Schur
-
Patent number: 12063243Abstract: An autonomous email-report composer composes a type of report on cyber threats that is composed in a human-readable format with natural language prose, terminology, and level of detail on the cyber threats aimed at a target audience. The autonomous email-report composer cooperates with libraries with prewritten text templates with i) standard pre-written sentences written in the natural language prose and ii) prewritten text templates with fillable blanks that are populated with data for the cyber threats specific for a current report being composed, where a template for the type of report contains two or more sections in that template. Each section having different standard pre-written sentences written in the natural language prose.Type: GrantFiled: July 29, 2020Date of Patent: August 13, 2024Assignee: Darktrace Holdings LimitedInventors: John Anthony Boyer, Dickon Humphrey, Matthew Dunn