371 patents
Page 5 of 19
Utility
Methods and Apparatus to Detect Malware Using Micro-forests with Customer Trust Seeds
2 Feb 23
Methods and apparatus are disclosed to detect malware using micro-forests with customer trust seeds.
German Lancioni, Sorcha Healy
Filed: 23 Dec 21
Utility
Methods and apparatus to defend against adversarial machine learning
31 Jan 23
Methods, apparatus, systems and articles of manufacture to defend against adversarial machine learning are disclosed.
Sherin M. Mathews, Celeste R. Fralick
Filed: 27 Sep 19
Utility
Phishing Mitigation Service
26 Jan 23
There is disclosed a method of providing passive phishing remediation for an enterprise, including: displaying, to a user of a mobile device, an email; receiving from the user a one-click request to perform additional analysis of the email; providing the email to a phishing mitigation service; assigning the email a reputation score, generating a human-readable reputation display for the email, wherein the human-readable reputation display includes at least three grades comprising safe, unknown or unreliable, and unsafe or malicious; and providing the human-readable reputation display as a push notification to the mobile device.
Davoud Maha, Mykhaylo Melnyk, Lior Rudnik
Filed: 5 Oct 22
Utility
Distribution of neural networks with blockchains
24 Jan 23
Example apparatus disclosed herein generate blocks of a blockchain, the blockchain to store a neural network that has input nodes, hidden nodes and output nodes, with respective ones of the blocks of the blockchain including respective code and respective data to represent corresponding ones of the output nodes of the neural network, a first one of the blocks including first code and first data to implement operations to be performed by a first one of the output nodes, the hidden nodes and the input nodes on input data applied to the neural network to determine an output of the first one of the output nodes.
Amanda House, Celeste R. Fralick, Eric Wuehler, Sherin Mathews
Filed: 30 Jul 19
Utility
Quantified Social Media Privacy
19 Jan 23
A computing includes a hardware platform having a processor and a memory; and instructions encoded within the memory to instruct the processor to: on behalf of a human user, scan a social media platform for which the user has an account, and compute a proactive privacy risk score, wherein the proactive privacy risk score is a quantitative value based at least in part on an inherent risk of the social media platform according to data types that may be collected and exposed by the social media platform, and at least in part on privacy settings for the social media platform in relation to the data types; and recommend or initiate an action to improve the proactive privacy risk score.
Dattatraya Kulkarni, Urmil Mahendra Parikh, Jitesh Dattani, Himanshu Srivastava
Filed: 26 Oct 21
Utility
Gateway with access checkpoint
17 Jan 23
There is disclosed in one example a gateway apparatus to operate on an intranet, including: a hardware platform; and an access proxy engine to operate on the hardware platform and configured to: intercept an incoming packet; determine that the incoming packet is an access request directed to an access interface of a resource of the intranet; present an access checkpoint interface; receive an authentication input response; validate the authentication input response; and provide a redirection to the access interface of the device.
German Lancioni, Eric Donald Wuehler
Filed: 23 Jun 20
Utility
Methods and apparatus to facilitate malware detection using compressed data
17 Jan 23
Methods, apparatus, systems and articles of manufacture are disclosed to facilitate malware detection using compressed data.
German Lancioni, Pablo A. Michelis
Filed: 23 Dec 19
Utility
Determining computing system incidents using node graphs
10 Jan 23
Systems and methods for performing graph-based analysis of computing system threats and incidents, and determining response and/or mitigation actions for the threats and incidents, are described.
Elisabeth Maida, Roselle Safran
Filed: 22 Dec 20
Utility
Methods and Apparatus for Machine Learning Based Malware Detection and Visualization with Raw Bytes
29 Dec 22
Methods, apparatus, systems, and articles of manufacture are disclosed.
Yonghong Huang
Filed: 22 Jun 22
Utility
Security Risk Evaluation Across User Devices
29 Dec 22
Security risk evaluation across user devices is disclosed herein.
RAHUL DESHPANDE, GERMAN LANCIONI, CELESTE FRALICK
Filed: 29 Aug 22
Utility
Methods, systems, and media for mitigating damage resulting from a website being an intermediary in a cyberattack
27 Dec 22
Mechanisms for mitigating damage resulting from a website being an intermediary in a cyberattack, comprising: detecting a domain name server query made to the website; making a request to the website; receiving a header in response to the request; inspecting the header to identify a software stack component of the website; cross-referencing the software stack component to a common vulnerabilities and exposures (CVE) database to identify a CVE that applies to the software stack component; applying a rule to determine the impact of the CVE on whether the website is a possible intermediary in a cyberattack; determining that the website is a possible intermediary in a cyberattack; and taking action on the website to mitigate damage resulting from the website being an intermediary in a cyberattack.
German Lancioni, Joseph Padron
Filed: 24 Mar 20
Utility
Provisioning of Encrypted DNS Services
22 Dec 22
There is disclosed in one example an enrollment over secure transport (EST)-capable gateway device, including: a hardware platform including a processor and a memory; a first network interface to communicatively couple to an external network, including an external DNS server; a second network interface to communicatively couple to a home network; a caching DNS server including a local DNS cache, and logic to provide DNS services to the home network; and an EST proxy to authenticate to a local endpoint on the home network, provision a DNS server certificate on the local endpoint, provision an authentication domain name (ADN) on the local endpoint, and provide encrypted domain name system (DNS) services to the local endpoint.
Tirumaleswar Reddy Konda, Shashank Jain, Himanshu Srivastava, Naveen Kumar Reddy Kandadi, Piyush Pramod Joshi
Filed: 24 Aug 22
Utility
Ransomware detection and mitigation
20 Dec 22
There is disclosed in one example a computing apparatus, including: a hardware platform including a processor and a memory; a system profile store; and a ransomware detection engine including instructions encoded within the memory to instruct the processor to: detect an operation, by a process, that results in an operation on a file, wherein the operation includes newly creating the file including a file type identifier, or where the file is an existing file, changing a file type identifier for the file; querying the system profile store with a combination of the file type identifier and metadata about the file; based at least in part on the querying, determining that the process is a suspected ransomware attack; and taking a remedial action.
Abhishek Karnik, Xiaobing Lin, Asheer Malhotra, Oliver G. Devane
Filed: 12 Dec 19
Utility
System and method to protect digital content on external storage
20 Dec 22
An example authentication device disclosed herein is to access a message received via a wireless interface from an adapter, the message to indicate that a host device has connected to the adapter, the host device different from the authentication device.
Fernando Ruiz Altamirano, German Lancioni
Filed: 16 Apr 20
Utility
Trusted updates
20 Dec 22
There is disclosed in one example a computing apparatus, including: a hardware platform including a processor and a memory; and instructions encoded within the memory to instruct the processor to: provide a permission list; allocate an executable, the executable to have permissions according to the permission list; designate a child object of the executable; allocate a certificate for the child object; and after a system reboot, grant the child object permissions of the executable after validating the certificate.
Preet Mohinder, Ratnesh Pandey, Jaskaran Singh Khurana, Amritanshu Johri
Filed: 22 Feb 21
Utility
Explainability of an unsupervised learning algorithm outcome
20 Dec 22
There is disclosed in one example a malware analysis server, including: a hardware platform including a processor and a memory; a machine learning model; a store of known objects previously classified by the machine learning model; and instructions encoded within the memory to instruct the processor to: receive a test sample; apply the machine learning model to the test sample to provide the test sample with classified features; compute pairwise distances between the test sample and a set of known objects from the store of known objects; select a group of near neighbor samples from the set of known objects; select a group of far neighbor samples from the set of known objects; and generate an explanation for the test sample according to the near neighbor samples and far neighbor samples.
German Lancioni
Filed: 23 Mar 20
Utility
Learning maliciousness in cybersecurity graphs
20 Dec 22
Systems and methods for utilizing statistical relational learning techniques in order to predict factors for nodes of a node graph, such as a node graph that represents attacks and incidents to a computing system, are described.
Connor Walsh, Elisabeth Maida
Filed: 21 Sep 20
Utility
Methods and apparatus for defending against exploitation of vulnerable software
13 Dec 22
Methods, apparatus, systems and articles of manufacture are disclosed for defending against exploitation of vulnerable software.
Jyothi Mehandale, Craig Schmugar
Filed: 25 Nov 19
Utility
Remediation of Stale Online Accounts and Digital Exhaust
8 Dec 22
In an example, there is disclosed an end-user computing apparatus, including a hardware platform, having a processor and a memory; and instructions encoded within the memory to provide two or more network activity scanners for a user's network activity; operate the two or more network activity scanners to locally analyze the user's network activity, identify a plurality of online accounts associated with the user, and compute respective account identities and usage contexts for the accounts; and send the account identities and usage contexts to an analysis service for identification of accounts to modify.
Shashank Jain, Srikanth Nalluri, Dattatraya Kulkarni, Ram Sharan Singh
Filed: 12 Aug 21
Utility
Multi-dimensional malware analysis
6 Dec 22
There is disclosed in one example a computing apparatus, including: a hardware platform, including a processor, a memory, and a network interface; a bucketized reputation modifier table; and instructions encoded within the memory to instruct the processor to: perform a feature-based malware analysis of an object; assign the object a malware reputation according to the feature-based malware analysis; query and receive via the network interface a complementary score for a complementary property of the object; query the bucketized reputation modifier table according to the complementary score to receive a reputation modifier for the object; adjust the object's reputation according to the reputation modifier; and take a security action according to the adjusted reputation.
Steven Grobman, Jonathan B. King, Yonghong Huang, Amit Kumar
Filed: 29 Oct 20