16 patents
Utility
Parametric Behavioral Pattern Definition
30 Dec 20
A security agent implemented on a monitored computing device is described herein.
David F. Diehl, Daniel W. Brown, Aaron Javan Marks, Kirby J. Koster, Daniel T. Martin
Filed: 10 Sep 20
Utility
Securely and Efficiently Providing User Notifications About Security Actions
16 Dec 20
A security agent executing in kernel mode may receive a request from the anti-malware component executing with low privileges in user mode, and, in response, the security agent may perform a security action with respect to a malicious file detected on the computing device.
Ion-Alexandru Ionescu
Filed: 30 Aug 20
Utility
Firmware Retrieval and Analysis
28 Oct 20
A bus filter driver and security agent components configured to retrieve and analyze firmware images are described herein.
Timo Kreuzer, Ion-Alexandru Ionescu, Aaron LeMasters
Filed: 21 Apr 20
Utility
Detecting Security-Violation-Associated Event Data
14 Oct 20
An event can be analyzed for association with a security violation.
Cory-Khoi Quang Nguyen, Jaron Michael Bradley, William Leon Charles Pauley
Filed: 9 Jul 19
Utility
Computer-Security Event Clustering and Violation Detection
30 Sep 20
An event can be associated with a monitored computing device and a command-line record.
Cory-Khoi Quang Nguyen, Jaron Michael Bradley, John Lee, Brody Nisbet
Filed: 27 Mar 19
Utility
Computer-Security Violation Detection using Coordinate Vectors
30 Sep 20
Event vectors can be determined for respective events based on respective command-line records and a trained representation mapping.
Cory-Khoi Quang Nguyen, Jaron Michael Bradley, John Lee, Brody Nisbet
Filed: 27 Mar 19
Utility
Deception-Based Responses to Security Attacks
9 Sep 20
Deception-based techniques for responding to security attacks are described herein.
Adam S. Meyers, Dmitri Alperovitch, George Robert Kurtz, David F. Diehl, Sven Krasser
Filed: 26 May 20
Utility
Deception-Based Responses to Security Attacks
9 Sep 20
Deception-based techniques for responding to security attacks are described herein.
Adam S. Meyers, Dmitri Alperovitch, George Robert Kurtz, David F. Diehl, Sven Krasser
Filed: 26 May 20
Utility
Network Containment of Compromised Machines
2 Sep 20
A computing device can install and execute a kernel-level security agent that interacts with a remote security system as part of a detection loop aimed at defeating malware attacks.
Paul Meyer, Cameron Gutman, John R. Kooker
Filed: 17 May 20
Utility
Container Application for Android-based Devices
2 Sep 20
A computer-processor executable container application operates within an operating system, such as an Android operating system.
Vincenzo Iozzo, Giovanni Gola
Filed: 27 Feb 19
Utility
Computer-security Event Security-violation Detection
20 May 20
Example techniques herein determine that an event associated with a monitored computing device is associated with a security violation.
Cory-Khoi Quang Nguyen, John Lee
Filed: 14 Nov 18
Utility
Binary Search of Byte Sequences Using Inverted Indices
20 May 20
Techniques for searching an inverted index associating byte sequences of a fixed length and files that contain those byte sequences are described herein.
Horea Coroiu, Daniel Radu
Filed: 23 Jan 20
Utility
Byte N-gram Embedding Model
1 Jan 20
Training and use of a byte n-gram embedding model is described herein.
Radu Cazan, Daniel Radu, Marian Radu
Filed: 30 Dec 18
Utility
RPC Call Interception
6 Nov 19
A service proxy is described herein.
Ion-Alexandru Ionescu
Filed: 14 Jul 19
Utility
Identifying and Correlating Physical Devices Across Disconnected Device Stacks
30 Oct 19
Drivers in different functional paths can use different types of identifiers for the same hardware device, such that the drivers may not be able to natively coordinate their actions related to the hardware device due to incompatible identifier types.
Cameron Gutman, Aaron LeMasters
Filed: 29 May 18
Utility
Securely and Efficiently Providing User Notifications About Security Actions
16 Oct 19
A security agent executing in kernel mode may receive a request from the anti-malware component executing with low privileges in user mode, and, in response, the security agent may perform a security action with respect to a malicious file detected on the computing device.
Ion-Alexandru Ionescu
Filed: 10 Apr 18
- Prev
- 1
- Next
Patents are sorted by USPTO publication date, most recent first