236 patents
Utility
Content feed delivery system and method
19 Sep 23
A method of providing a content feed.
B{hacek over (r)}etislav {hacek over (S)}opik
Filed: 8 Sep 22
Utility
User Data Collection Privacy Using Probabilistic Data Structures
14 Sep 23
A method of collecting user device data includes receiving a probabilistic cardinality estimator data structure in the user device from a server, the probabilistic cardinality estimator data structure associated with a survey question.
Martin Mesrsmid
Filed: 9 Mar 22
Utility
Network Attack Prevention Systems and Methods
14 Sep 23
A system and method for preventing access to potentially malicious network destinations.
Armin Wasicek, Fabrizio Biondi, Thomas Salomon
Filed: 10 Mar 22
Utility
Network Resource Privacy Negotiation System and Method
7 Sep 23
A method for accessing a network resource including detecting an attempt by a user via a computing device to access a service enabled by a computing system via a network and transmitting via the network to the computing system a first request to access the service in response to detecting the attempt by the user to access the service, the first request including at least one empty personally identifiable data structure.
Sadia Afroz, Juyong Do, John Poothokaran
Filed: 11 May 23
Utility
Network Resource Privacy Negotiation System and Method
7 Sep 23
A method for accessing a network resource including detecting an attempt by a user via a computing device to access a service enabled by a computing system via a network and transmitting via the network to the computing system a first request to access the service in response to detecting the attempt by the user to access the service, the first request including at least one empty personally identifiable data structure.
Sadia Afroz, Juyong Do, John Poothokaran
Filed: 11 May 23
Utility
Detecting Malicious Url Redirection Chains
7 Sep 23
Malicious redirects in a redirect chain as a result of loading a web address are detected and blocked.
David Jursa, Jirí Sembera, Peter Kovác, Tomás Trnka, Elnaz Babayeva
Filed: 3 Mar 22
Utility
Systems and methods for encryption in network communication
5 Sep 23
A system, computer-readable storage medium, and method for secure network communication.
Christopher Joseph O'Connell, Barna Csukas, Gabor Miklos, Vitalii Sydorovych, Rui Santos, Michal Hojsík
Filed: 3 Feb 22
Utility
Systems and methods for preventing potential phishing attacks by translating double-byte character set domain name system records
5 Sep 23
The disclosed computer-implemented method for preventing potential phishing attacks by translating double-byte character set domain name system records may include (i) extracting a domain extension from a double-byte character set (DBCS) domain name in a universal resource locator (URL) received by a computing device, (ii) identifying a locale code associated with a language utilized on the computing device, (iii) determining if the domain extension matches the locale code, (iv) translating the DBCS domain name to a corresponding single byte character set (SBCS) domain name system (DNS) record when the domain extension matches the locale code, and (v) performing a security action that protects against a potential phishing attack based on the translated DBCS domain name.
Somard Kruayatidee, Jonathon Salehpour
Filed: 29 Apr 21
Utility
Data Sharing and Storage Control System and Method
31 Aug 23
A data sharing control method.
Sadia Afroz, Armin Wasicek
Filed: 8 May 23
Utility
Systems and methods for selectively monitoring devices
22 Aug 23
A computer-implemented method for selectively monitoring devices may include (i) identifying a set of characteristics of a device-usage session of a device, (ii) calculating, based on the set of characteristics, a privacy score for the device-usage session, (iii) selecting, for the device, a device monitoring profile that is correlated with the privacy score and that defines an intensity level of monitoring actions to be performed on the device, and (iv) monitoring activity performed on the device during the device-usage session in accordance with the device monitoring profile that is correlated with the privacy score for the device-usage session.
Lei Gu, Chengi Kuo
Filed: 30 Mar 20
Utility
SSL/TLS spoofing using tags
22 Aug 23
A network is secured by managing domain name requests such that client devices are restricted from visiting malicious or undesirable domains.
Gandhi Balasubramaniam
Filed: 30 Dec 19
Utility
Low latency cloud-assisted network security with local cache
22 Aug 23
Latency in a cloud security service provided via a network security device is reduced by receiving in the network security device a new network connection request for a connection between a local network device and a remote server.
Michal Vaner, Ji{hacek over (r)}í Horkÿ
Filed: 30 Dec 20
Utility
Detecting malware by linking background intelligent transfer service (BITS) and scheduled task service (STS) activities to a source program
15 Aug 23
Detecting malware by linking Background Intelligent Transfer Service (BITS) and Scheduled Task Service (STS) activities to a source program.
Andrei Stanciu, Teodor Anton, Alin Enachescu, Robert A. Clyde
Filed: 30 Sep 21
Utility
Systems and Methods for Encryption In Network Communication
3 Aug 23
A system, computer-readable storage medium, and method for secure network communication.
Christopher Joseph O’Connell, Barna Csukas, Gabor Miklos, Vitalii Sydorovych, Rui Santos, Michal Hojsík
Filed: 3 Feb 22
Utility
Network resource privacy negotiation system and method
25 Jul 23
A method for accessing a network resource including detecting an attempt by a user via a computing device to access a service enabled by a computing system via a network and transmitting via the network to the computing system a first request to access the service in response to detecting the attempt by the user to access the service, the first request including at least one empty personally identifiable data structure.
Sadia Afroz, Juyong Do, John Poothokaran
Filed: 16 Mar 20
Utility
Blocked Xor Filter for Blacklist Filtering
20 Jul 23
A method of filtering a URL against a blacklist includes receiving at least a portion of a Uniform Resource Locator (URL), and determining which of a plurality of XOR filters is applicable to the received at least a portion of a URL, where each of the plurality of XOR filters represents a different portion of a URL blacklist.
Hai Tung Nguyen, Christopher Joseph O'Connell, Barna Csukas, Thomas Salomon
Filed: 4 Jan 22
Utility
Network-shared data managing system and method
18 Jul 23
A data managing method.
John Poothokaran, Juyong Do, Rajarshi Gupta
Filed: 28 Dec 20
Utility
System and Method for Data Compression and Decompression
6 Jul 23
A data processing method in the form of a data compression method is provided in which a plurality of integers are accessed.
Peter Kubov, Peter Matula
Filed: 5 Jan 22
Utility
Virtual network function enabled secure communication systems and methods
27 Jun 23
A method for enabling secure communication.
Bin Hu, Rajarshi Gupta
Filed: 28 Sep 20
Utility
Systems and methods for managing digital personas for online services
2 May 23
The disclosed computer-implemented method for managing digital personas for online services may include generating a digital persona and a persona wear indicator (PWI) score for a user of an anonymized inbox with a communication alias to use for an online entity, determining, based on one or more communication messages associated with the communication alias, that the online entity has leaked information associated with the digital persona, recalculating the PWI score for the digital persona based at least in part on the determination that the online entity has leaked the information, determining that the PWI score exceeds a privacy score threshold; and in response to determining that the PWI score exceeds the privacy score threshold, performing a security action that protects privacy of the user.
Kapil Anturkar, SriHarsha Angara
Filed: 26 Mar 20