15 patents
Utility
User Data Collection Privacy Using Probabilistic Data Structures
14 Sep 23
A method of collecting user device data includes receiving a probabilistic cardinality estimator data structure in the user device from a server, the probabilistic cardinality estimator data structure associated with a survey question.
Martin Mesrsmid
Filed: 9 Mar 22
Utility
Network Attack Prevention Systems and Methods
14 Sep 23
A system and method for preventing access to potentially malicious network destinations.
Armin Wasicek, Fabrizio Biondi, Thomas Salomon
Filed: 10 Mar 22
Utility
Network Resource Privacy Negotiation System and Method
7 Sep 23
A method for accessing a network resource including detecting an attempt by a user via a computing device to access a service enabled by a computing system via a network and transmitting via the network to the computing system a first request to access the service in response to detecting the attempt by the user to access the service, the first request including at least one empty personally identifiable data structure.
Sadia Afroz, Juyong Do, John Poothokaran
Filed: 11 May 23
Utility
Network Resource Privacy Negotiation System and Method
7 Sep 23
A method for accessing a network resource including detecting an attempt by a user via a computing device to access a service enabled by a computing system via a network and transmitting via the network to the computing system a first request to access the service in response to detecting the attempt by the user to access the service, the first request including at least one empty personally identifiable data structure.
Sadia Afroz, Juyong Do, John Poothokaran
Filed: 11 May 23
Utility
Detecting Malicious Url Redirection Chains
7 Sep 23
Malicious redirects in a redirect chain as a result of loading a web address are detected and blocked.
David Jursa, Jirí Sembera, Peter Kovác, Tomás Trnka, Elnaz Babayeva
Filed: 3 Mar 22
Utility
Data Sharing and Storage Control System and Method
31 Aug 23
A data sharing control method.
Sadia Afroz, Armin Wasicek
Filed: 8 May 23
Utility
Systems and Methods for Encryption In Network Communication
3 Aug 23
A system, computer-readable storage medium, and method for secure network communication.
Christopher Joseph O’Connell, Barna Csukas, Gabor Miklos, Vitalii Sydorovych, Rui Santos, Michal Hojsík
Filed: 3 Feb 22
Utility
Blocked Xor Filter for Blacklist Filtering
20 Jul 23
A method of filtering a URL against a blacklist includes receiving at least a portion of a Uniform Resource Locator (URL), and determining which of a plurality of XOR filters is applicable to the received at least a portion of a URL, where each of the plurality of XOR filters represents a different portion of a URL blacklist.
Hai Tung Nguyen, Christopher Joseph O'Connell, Barna Csukas, Thomas Salomon
Filed: 4 Jan 22
Utility
System and Method for Data Compression and Decompression
6 Jul 23
A data processing method in the form of a data compression method is provided in which a plurality of integers are accessed.
Peter Kubov, Peter Matula
Filed: 5 Jan 22
Utility
Systems and Methods for Protecting Against Misleading Clicks on Websites
17 Feb 22
The disclosed computer-implemented method for protecting against misleading clicks on websites may include (i) detecting a user click event on a uniform resource locator (URL) for navigating to a website during a web browsing session, (ii) analyzing the user click event to identify expected domain behavior associated with navigating to the website based on the URL, (iii) determining, based on the analysis, that the user click event deviates from the expected domain behavior associated with navigating to the website based on the URL, and (iv) performing a security action that protects against potentially malicious activity caused by the user click event deviating from the expected domain behavior associated with navigating to the website based on the URL.
Iskander Sanchez, David Silva
Filed: 12 Aug 20
Utility
Systems and Methods for Identifying Software Vulnerabilities In Embedded Device Firmware
11 Nov 21
The disclosed computer-implemented method for identifying software vulnerabilities in embedded device firmware may include (i) collecting a firmware image for an Internet-of-Things device, (ii) extracting library dependencies from the firmware image for the Internet-of-Things device, (iii) identifying a true version of a library specified in the firmware image by checking a ground truth database that records confirmed values for true versions for previously encountered libraries, and (iv) performing a security action to protect a user from a security risk based on identifying the true version of the library specified in the firmware image.
Johannes Krupp, Pierre-Antoine Vervier, Yun Shen
Filed: 8 May 20
Utility
Systems and Methods for Protecting Search Privacy
30 Sep 21
The disclosed computer-implemented method for protecting search privacy may include (i) receiving, via a search interface, a search query comprising at least one search term, (ii) determining a sensitivity level of the search query based on the at least one search term, (iii) directing the search query to a search engine that has a level of privacy correlated with the sensitivity level of the search query, and (iv) returning, via the search interface, at least one result of directing the search query to the search engine that has the level of privacy correlated with the sensitivity level of the search query.
Susanta Nanda, Kevin Roundy, Ashwin Kayyoor
Filed: 31 Mar 20
Utility
Systems and Methods for Utilizing an Information Trail to Enforce Data Loss Prevention Policies on Potentially Malicious File Activity
9 Oct 19
The disclosed computer-implemented method for utilizing an information trail to enforce data loss prevention policies on potentially malicious file activity may include (1) recording, by a computing device, one or more current activities associated with a file retrieved from a server, (2) linking, by the computing device, the current activities to one or more previously recorded activities associated with the file, (3) generating, by the computing device, a graph including nodes representing an information trail of related events associated with the current activities and the previously recorded activities, (4) determining, by the computing device, a severity of the information trail based on one or more rules, and (5) performing, by the computing device, a data loss prevention action on one or more operations associated with the file based on potential malicious activity.
Manish Pai, Prahalad Deshpande, Sumesh Jaiswal
Filed: 20 May 18
Utility
Systems and Methods for Providing Secure Memory
2 Oct 19
The disclosed computer-implemented method for providing secure memory may include reserving, by a hypervisor stored in a memory device of the computing device, a portion of the memory device as a secure memory during a boot sequence of the computing device and preventing access to the secure memory by an operating system (OS).
Haik Mesropian, Costin Ionescu, Melissa Mendonca, Tirth Sanyal
Filed: 28 Mar 18
Utility
Securing of Internet of Things Devices Based on Monitoring of Information Concerning Device Purchases
2 Oct 19
Purchasing related activity that is executed on computing devices on a LAN is monitored.
Ilya Sokolov, Bruce McCorkendale, Keith Newstadt
Filed: 29 Mar 18
- Prev
- 1
- Next
Patents are sorted by USPTO publication date, most recent first