371 patents
Utility
Digital protection that travels with data
16 Jan 24
The present disclosure relates to a system and method for performing anti-malware scanning of data files that is data-centric rather than device-centric.
Dattatraya Kulkarni, Srikanth Nalluri, Kamlesh Halder, Venkatasubrahmanyam Krishnapur, Sailaja K. Shankar, Kaushal Kumar Dhruw
Filed: 11 May 22
Utility
Security broker
16 Jan 24
An attempted transaction is identified involving a customer device and the first customer device is redirected to a security broker.
Michael Condry, Sven Schrecker
Filed: 24 May 21
Utility
Secure DNS using delegated credentials and keyless SSL
16 Jan 24
There is disclosed in an example a gateway device, including a hardware computing platform, and a secure domain name system (DNS) engine having circuitry and stored instructions to-program the circuitry, the secure DNS engine to communicatively couple to an endpoint via a local network, begin a secure DNS transaction with the endpoint, determine whether the endpoint supports delegated credentials, and after determining that the endpoint supports delegated credentials, establish a secure DNS session with the endpoint using a delegated credential.
Tirumaleswar Reddy Konda, Shashank Jain, Himanshu Srivastava
Filed: 13 Aug 21
Utility
Device anomaly detection
16 Jan 24
There is disclosed in one example a computing apparatus, including: a hardware platform including a processor and a memory; and an anomaly detection engine including instructions encoded within the memory to instruct the processor to: periodically collect telemetry for a performance parameter; compute and maintain a local trend line for the performance parameter; receive from a cloud service a global trend line for the performance parameter for a class of devices including the computing apparatus; and perform anomaly detection including analyzing the local trend line and the global trend line to detect an anomaly.
Davoud Maha
Filed: 4 Mar 20
Utility
Methods and apparatus to implement a virtual private network with probe for network connectivity
9 Jan 24
Methods, apparatus, systems and articles of manufacture to implement a virtual private network with probe for network connectivity are disclosed.
Lior Rudnik
Filed: 22 Aug 22
Utility
Determining a reputation for a process
9 Jan 24
Particular embodiments described herein provide for an electronic device that can be configured to identify a process running on the electronic device, assign a reputation to the process if the process has a known reputation, determine if the process includes executable code, determine a reputation for the executable code, and combine the reputation for the executable code with the reputation assigned to the process to create a new reputation for the process.
Joel R. Spurlock
Filed: 30 Sep 20
Utility
Methods, apparatus, and systems to generate regex and detect data similarity
2 Jan 24
Methods, apparatus, systems and articles of manufacture to generate regex and detect data similarity are disclosed.
Paras Nigam, Dilip Kumar Gudimetla
Filed: 25 Jun 19
Utility
Systems, apparatus, and methods for updating a programmable device using a distributed ledger
2 Jan 24
Examples for device-driven auto-recovery using multiple recovery sources are disclosed herein.
Ned M. Smith, Zheng Zhang, Thiago J. Macieira
Filed: 30 Sep 20
Utility
Mechanisms for conserving resources of wearable devices
2 Jan 24
The present disclosure relates to a system and method for providing a service on a wearable device where the wearable device is limited in its functionality in some way when compared with a companion device.
Dattatraya Kulkarni, Srikanth Nalluri, Venkatasubrahmanyam Krishnapur, Kaushal Dhruw, Aravind Doss, Raja Sinha, Susmita Nayak, Yogesh Jain
Filed: 28 Dec 20
Utility
Methods and apparatus to detect malware based on network traffic analysis
19 Dec 23
Methods, apparatus, systems and articles of manufacture are disclosed to detect malware based on network traffic analysis.
Daniel Burke, Bernard Sapaden, Jorge Arias, Hemendra Singh, Bhargav Shah
Filed: 23 Dec 19
Utility
Secure software defined storage
19 Dec 23
Methods and apparatus for secure software defined storage are disclosed.
Dmitri Rubakha, Venkata Ramanan Sambandam, Jonathan King, Igor Polevoy, Andrew V. Holtzmann
Filed: 27 Apr 21
Utility
Model development and application to identify and halt malware
19 Dec 23
A method for halting malware includes: monitoring plural file system events with a system driver to detect an occurrence of a file system event having a predetermined file type and log event type; triggering a listening engine for file system event stream data of a file associated with the detection of the file system event, the file system event stream data indicating data manipulation associated with the file due to execution of a process; obtaining one or more feature values for each of plural different feature combinations of plural features of the file based on the file system event stream data; inputting one or more feature values into a data analytics model to predict a target label value based on the one or more feature values of the plural different feature combinations and agnostic to the process; and performing a predetermined operation based on the target label value.
Celeste R. Fralick, Jonathan King, Carl D. Woodward, Andrew V. Holtzmann, Kunal Mehta, Sherin M. Mathews
Filed: 23 Dec 20
Utility
Methods and apparatus to provide and monitor efficacy of artificial intelligence models
19 Dec 23
Methods, apparatus, systems, and articles of manufacture to provide and monitor efficacy of artificial intelligence models are disclosed.
Sorcha Healy, Gerard Murphy, David McCormack, Cedric Cochin
Filed: 30 Jun 20
Utility
Scanning of partial downloads
19 Dec 23
There is disclosed in one example a hardware computing platform, including: a processor; a memory; a network interface; and a security module, including instructions to cause the processor to: receive a request to download a file via the network interface; download a first portion of the file into a buffer of the memory; analyze the first portion for malware characteristics; assign a security classification to the file according to the analysis of the first portion; and act on the security classification.
Abhishek Tripathi, Mayur Arvind Bhole, Nithya Nadig Shikarpur, Tirumaleswar Reddy Konda, Mayank Bhatnagar
Filed: 5 Feb 21
Utility
Contextual management of browser extensions
5 Dec 23
There is disclosed in one example a computing endpoint, including: a hardware platform including a processor and a memory; an operating system to run on the hardware platform; a web browser to run on the operating system, and including an extension framework; and a management extension to run in the extension framework, and to contextually manage availability of other extensions according to a URL reputation and extension reputation.
Harsha Ramamurthy Joshi, Saravana Kumar Ramalingam, Jitesh Dattani, VijayaSumanth Pinapala, Sohan Lal, Dattatraya Kulkarni, Siddartha Y. Ramamohan, Srikanth Nalluri
Filed: 12 Jan 21
Utility
Optical feedback for visual recognition authentication
5 Dec 23
Providing optical watermark signals for a visual authentication session by performing at least the following: receive, at an anti-spoof engine, an instruction to perform visual authentication operations for a visual authentication session, generate, with the anti-spoof engine, an optical watermark signal based on receiving the instruction, wherein the optical watermark signal includes at least one optical identifier to authenticate images captured during the visual authentication session, obtain, with the anti-spoof engine, an image source that includes captured images of the visual authentication session, determine, with the anti-spoof engine, whether the image source includes a reflected optical watermark signal, and compare, with the anti-spoof engine, whether the reflected optical watermark signal matches the generated optical watermark signal based on the determination that the image source includes the reflected optical watermark signal.
Alex Nayshtut, Igor Muttik, Oleg Pogorelik, Adam Marek
Filed: 23 Apr 21
Utility
Pairing of external device with random user action
28 Nov 23
Pairing of an external device using a random user action is disclosed herein.
Cedric Cochin, Jonathan Edwards, Aditya Kapoor
Filed: 21 Dec 17
Utility
Methods and apparatus to detect website phishing attacks
28 Nov 23
Methods, apparatus, systems and articles of manufacture to detect phishing websites are disclosed.
German Lancioni, Bhargav Shah, James Duldulao
Filed: 27 Sep 19
Utility
Secure over-the-air updates
28 Nov 23
In an example, there is disclosed a computing apparatus having: a network interface to communicate with a second device; a contextual data interface to receive and store contextual data; and one or more logic elements comprising a contextual security agent, operable to: receive a contextual data packet via the network interface; compare the contextual data packet to stored contextual data; and act on the comparing.
Alexander J. Hinchliffe, Pablo R. Passera
Filed: 22 Dec 15
Utility
Agentless security services
21 Nov 23
There is disclosed in one example a computing apparatus, including: a hardware platform including a processor, a memory, and a network interface; and instructions encoded within the memory to instruct the processor to: receive an incoming packet via the network interface; extract from the incoming packet a source port and a source internet protocol (IP) address; correlate the source port and source IP to a device identifier (ID); receive a network policy for the device ID; and apply the network policy to the incoming packet.
Harsha Ramamurthy Joshi, Tirumaleswar Reddy Konda, Shashank Jain, Piyush Pramod Joshi, Himanshu Srivastava
Filed: 20 Jul 20