371 patents
Page 3 of 19
Utility
System for extracting, classifying, and enriching cyber criminal communication data
4 Jul 23
An apparatus, including systems and methods, for classifying, mapping, and predicting cybercriminal activity is disclosed herein.
Johannes Everardus Fokker
Filed: 28 Sep 20
Utility
Methods and apparatus to identify suspicious electronic communication based on communication history
4 Jul 23
Example apparatus to process an electronic communication includes a trusted communication identifier including a contact identifier to compare sender information from the electronic communication to contact information from a contact datastore, determine that a communication has not previously been sent from a recipient of the electronic communication to the sender of the electronic communication when the sender information from the electronic communication is not found in the contact datastore, and in response to determining that the communication has not been previously sent, provide an alert message that the sender information from the electronic communication is unknown.
Oliver Georges Devane, Deepak Setty
Filed: 1 Jun 20
Utility
Methods and Apparatus to Determine Mutex Entropy for Malware Classification
29 Jun 23
Methods, apparatus, systems, and articles of manufacture are disclosed to determine mutex entropy for malware classification.
Niall Fitzgerald, German Lancioni, Brian Gaither
Filed: 23 Dec 21
Utility
Detection of ransomware
27 Jun 23
An apparatus, including systems and methods, for detecting ransomware is disclosed herein.
Oliver G. Devane, Abhishek Karnik, Sriram P
Filed: 17 Jun 20
Utility
Methods and apparatus to analyze network traffic for malicious activity
27 Jun 23
Methods, apparatus, systems and articles of manufacture are disclosed to analyze network traffic for malicious activity.
Yonghong Huang, Armando Rodriguez, Adam Wosotowsky, John Wagener, Joanna Negrete, Eric Peterson, Celeste Fralick
Filed: 13 Mar 20
Utility
Fuzzy hash algorithms to calculate file similarity
30 May 23
Methods, apparatus, systems and articles of manufacture to classify a first file are disclosed herein.
Di Tian
Filed: 17 May 21
Utility
Systems, methods, and media for securing connections to Internet of Things devices
30 May 23
Mechanisms (which can include systems, methods, and media) for securing connections to IoT devices are provided.
Sameer D. Karkhanis
Filed: 15 Mar 19
Utility
System, methods, and media for protecting network devices from malicious rich text format (RTF) files
23 May 23
Mechanisms, which can include systems, method, and media, for protecting network devices from malicious rich text format (RTF) files are provided, the mechanisms comprising: intercepting an RTF file destined for a network device; parsing the RTF file to identify a plurality of objects in the RTF file; checking a first object of the plurality of objects for a first heuristic; based upon an outcome of the checking of the first object for the first heuristic, increasing a cumulative weight by a first weight value; comparing the cumulative weight against at least one threshold to classify the RTF file; and based on the classification of the RTF file, taking a protective action on the RTF file.
Chintan Shah
Filed: 20 Nov 20
Utility
Systems, Methods, and Apparatus to Optimize Telemetry Collection and Processing of Transport Layer Security Parameters
18 May 23
Methods, apparatus, systems and articles of manufacture are disclosed to optimize telemetry collection and processing of Transport Layer Security (TLS) parameters.
Tirumaleswar Reddy Konda, Shashank Jain, Piyush Pramod Joshi, Himanshu Srivastava
Filed: 15 Nov 21
Utility
Methods and apparatus to accelerate security threat investigation
16 May 23
Methods, apparatus, systems and articles of manufacture are disclosed herein to accelerate security threat investigation.
Wayne Anderson
Filed: 30 Apr 20
Utility
System, method, and computer program product for preventing access to data with respect to a data access attempt associated with a remote data sharing session
9 May 23
A system, method, and computer program product are provided for preventing access to data associated with a data access attempt.
Gopi Krishna Chebiyyam, Prasanna Ganapathi Basavapatna
Filed: 4 Jan 18
Utility
Icon Based Phishing Detection
4 May 23
An apparatus for detecting a phishing website based on website icons is disclosed.
Oliver Devane, Rafael Pena, Abhishek Karnik
Filed: 29 Dec 22
Utility
Home or enterprise router-based secure domain name services
18 Apr 23
There is disclosed in one example a home router, including: a hardware platform including a processor and a memory; a local area network (LAN) interface; a data store including rules for domain name-based services; and instructions encoded within the memory to instruct the processor to: provision a certificate and key pair to provide domain name system (DNS) over hypertext transfer protocol secure (DoH) or DNS over transport layer security (DoT) services; receive on the LAN interface an encrypted DNS request; decrypt the DNS request; query the data store according to the DNS request; receive a rule for the DNS request; and execute the rule.
Tirumaleswar Reddy Konda, Shashank Jain, Himanshu Srivastava
Filed: 12 Jun 20
Utility
Detection of malicious scripted activity in fileless attacks
18 Apr 23
There is disclosed in one example a computing apparatus, including: a processor and memory; and instructions encoded within the memory to instruct the processor to: identify a scripted process for security analysis; hook application programming interface (API) calls of the scripted process to determine a plurality of pre-execution parameters and runtime parameters; assign individual scores to the pre-execution parameters and runtime parameters; compute a sum of the individual scores; compare the sum to a threshold; and detect malicious or suspicious activity if the sum is above the threshold.
Debasish Mandal, Abhishek Karnik
Filed: 30 Sep 19
Utility
Systems, Methods, and Media for Sharing Information with Vendor Applications In Secure Environments
13 Apr 23
Mechanisms for sharing user-provided information from an original equipment manufacturer (OEM) application and a vendor application are provided, the mechanisms including: receiving the user-provided information at the OEM application; determining a system identifier of a system on which the OEM application is executing at the OEM application using a hardware processor; providing the user-provided information and the system identifier to a vendor cloud server from the OEM application; determining the system identifier at vendor application; providing the system identifier from the vendor application to the vendor cloud server; receiving the user-provided information at the vendor application from the vendor cloud server in response to providing the system identifier to the vendor cloud server; and using the user-provided information to configure the vendor application.
Shuborno Biswas, Annapoorani Natarajan, Balaji Rao, Chris Roy, Dipeka A.J
Filed: 9 Dec 21
Utility
Determining a reputation of data using a data visa including information indicating a reputation
11 Apr 23
Particular embodiments described herein provide for an electronic device that can be configured to receive data in a data flow, extract a data visa from the data flow, wherein the data visa is related to the data, and determine a reputation of the data from the data visa.
Michael Schneider, Paul Gartside, David Oxley, Ramon Peypoch
Filed: 29 Oct 19
Utility
User Sentiment Analysis for Url Reputations
6 Apr 23
A computing apparatus includes a hardware platform comprising a processor and a memory; and instructions encoded within the memory to receive a user-generated comment related to a uniform resource locator (URL); analyze the comment with a trained machine learning (ML) model to determine a user sentiment for the comment; assign a predicted reputation to the URL according to the user sentiment; and use the predicted reputation as an input to an analysis of the URL.
John Wagener, Joanna Negrete
Filed: 30 Sep 21
Utility
Object Inspection Via Operating System Share Function
30 Mar 23
A computing apparatus includes a hardware platform having a processor and a memory; an operating system (OS) having a GUI with a user-initiatable share function, and an interface to register a share target for the share function; and instructions encoded within the memory to provide a security agent, the instructions to instruct the processor to: receive from the OS a notification that an object has been shared to the security agent via the share function; responsive to the notification, initiate a security scan or reputation action for the shared object; receive a security or reputation response from the security scan or reputation action; and based at least in part on the security scan or reputation response, display a security or reputation notification via the GUI.
Weiguo Yang, Kathryn Young
Filed: 30 Sep 21
Utility
Methods, Systems, Articles of Manufacture and Apparatus to Reduce Computation Corresponding to Inspection of Non-malicious Data Flows
30 Mar 23
Methods, apparatus, systems, and articles of manufacture are disclosed to improve the inspection of network data flows.
Tirumaleswar Reddy Konda, Himanshu Srivastava, Shashank Jain
Filed: 23 Sep 21
Utility
Methods and apparatus for detecting anomalous activity of an IoT device
28 Mar 23
Methods, apparatus, systems, and articles of manufacture for detecting anomalous activity of an IoT device are disclosed.
Ameya Sanzgiri, Yi Zheng
Filed: 23 Aug 19