89 patents
Utility
Methods and Apparatus to Protect Open and Closed Operating Systems
30 Sep 20
Methods, apparatus, systems and articles of manufacture are disclosed.
Vishnu Varadaraj, Li Xiao, Kathryn Young
Filed: 26 Mar 19
Utility
Unencrypted Client-Only Virtual Private Network
30 Sep 20
There is disclosed in one example a computing apparatus, including: a hardware platform, including a processor and a memory; and executable instructions encoded in the memory to provide a client-only virtual private network (VPN) including a VPN client and a VPN server implementation on a single physical device, wherein the VPN client is configured to communicatively couple to the VPN server and to provide proxied Internet protocol (IP) communication services.
Lior Rudnik
Filed: 23 May 19
Utility
Client-only Virtual Private Network
30 Sep 20
There is disclosed in one example a computing apparatus, including: a hardware platform, including a processor and a memory; and executable instructions encoded in the memory to provide a client-only virtual private network (VPN) including a VPN client and a VPN server on a single physical device, wherein the VPN client is configured to communicatively couple to the VPN server and to provide proxied Internet protocol (IP) communication services via the VPN server.
Lior Rudnik
Filed: 28 Mar 19
Utility
Persona-based Contextual Security
30 Sep 20
There is disclosed in one example a computing apparatus, including: a hardware platform including a processor and a memory; a contextual reputation store; and instructions encoded within the memory to provision a security agent configured to: create a user persona in the contextual reputation store based at least in part on the user's interaction with the computing apparatus; compute a persona-weighted reputation for an action and store the persona-weighted reputation action to the contextual reputation store; intercept a user action on the computing apparatus; determine a current user persona; determine from the contextual reputation store a persona-weighted reputation for the user action; and take a security action based at least in part on the persona-weighted reputation for the user action.
Craig Schmugar, Robert Leong
Filed: 26 Mar 19
Utility
Systems, Methods, and Media for Securing Internet of Things Devices
30 Sep 20
Mechanisms (which can include systems, methods, and media) for securing an Internet of Things (IoT) device are provided, the mechanisms comprising: receiving a DNS request identifying a fully qualified domain name (FQDN) that originated from the IoT device; in response to receiving the DNS request, determining by a hardware processor whether to allow or drop a connection between the IoT device and a target domain corresponding to the FQDN; and responding to the DNS request with instructions to allow or drop the connection based on the determining.
Harsha R. Joshi, Tirumaleswar Reddy Konda, Shashank Jain, Abhishek Tripathi
Filed: 2 Jun 19
Utility
Cached File Reputations
30 Sep 20
There is disclosed in one example a computing apparatus, including: a network interface; a hardware platform, including at least a processor and a memory; and instructions encoded in the memory to instruct the processor to: identify an executable object to be run on the apparatus, the executable object to provision a plurality of local files or objects with unknown local reputations; query via the network interface a remote service with an identification of the executable object; responsive to the query, receive from the remote service a reputation batch for the local files or object; and selectively permit installation of the executable object and/or the plurality of local files or objects based at least in part on individual reputations within the reputation batch.
Craig Schmugar, Jyothi Mehandale
Filed: 27 Mar 19
Utility
Authenticating network services provided by a network
28 Sep 20
Particular embodiments described herein provide for an electronic device that can be configured to establish a connection with a router, obtain identification for the router, communicate the identification of the router to a network element, receive a hash of at least a portion of a certificate for the router, and disconnect the connection and establish a new connection with the router, where the hash is used to authenticate network services received from the router during the new connection.
Tirumaleswar Reddy Konda, Himanshu Srivastava, Harsha Ramamurthy Joshi, Srikanth Nalluri, Dattatraya Kulkarni
Filed: 28 Mar 18
Utility
Systems, Methods, and Media for Controlling Traffic to Internet of Things Devices
23 Sep 20
Mechanisms for controlling traffic to an Internet of Things (IoT) device are provided, the mechanisms comprising: identifying a first IoT device having an Internet Protocol (IP) address and a Media Access Control (MAC) address; sending a first Address Resolution Protocol (ARP) broadcast on a local area network (LAN) indicating that the IP address of the first IoT device is to be associated with a MAC address of a router on the LAN; receiving first traffic on the LAN; extracting the IP Address of the first IoT device from the first traffic; determining that the first traffic is allowed; and forwarding the first traffic to the first IoT device by inserting the MAC address of the first IoT device in the first traffic and re-broadcasting the first traffic.
Sameer D. Karkhanis
Filed: 18 Mar 19
Utility
Systems, Methods, and Media for Intelligent Split-tunneling
23 Sep 20
Mechanisms for split tunneling are provided, the method comprising: identifying a plurality of user devices; determining that communications for a first device of the plurality of user devices are to be tunneled; receiving a DNS request from a second device of the plurality of user devices; modifying the DNS request to request meta information corresponding to a domain identified in the DNS request; sending the DNS request to a DNS server using the hardware processor; receiving a response to the DNS request including the meta information; determining that communications for the second device are not to be tunneled based at least in part based on the meta information; and causing the communication for the first device to be tunneled and the communications for the second device to not be tunneled.
Tirumaleswar Reddy Konda, JR., Harsha R. Joshi, Eric Wuehler, Shashank Jain
Filed: 5 May 19
Utility
Backup and recovery of data files using hard links
21 Sep 20
Methods, apparatus, systems and articles of manufacture to perform backup and recovery of data files using hard links are disclosed.
David McCormack
Filed: 21 Sep 17
Utility
Device, system and method for defending a computer network
21 Sep 20
A router includes a processor-readable medium including code representing instructions to cause a processor to perform operations.
Christopher J. Jordan
Filed: 22 Oct 17
Utility
Learning maliciousness in cybersecurity graphs
21 Sep 20
Systems and methods for utilizing statistical relational learning techniques in order to predict factors for nodes of a node graph, such as a node graph that represents attacks and incidents to a computing system, are described.
Connor Walsh, Elisabeth Maida
Filed: 9 Dec 18
Utility
Security risk evaluation across user devices
21 Sep 20
Rahul Deshpande, German Lancioni, Celeste Fralick
Filed: 4 Mar 18
Utility
Systems, Methods, and Media for Securing Connections to Internet of Things Devices
16 Sep 20
Mechanisms (which can include systems, methods, and media) for securing connections to IoT devices are provided.
Sameer D. Karkhanis
Filed: 14 Mar 19
Utility
Decrypting transport layer security traffic without man-in-the-middle proxy
14 Sep 20
A network security platform (NSP) device and interaction method are disclosed.
Manikandan Kenyan, Shelendra Sharma, Anil Abraham
Filed: 4 Apr 18
Utility
Methods and apparatus to enhance security of authentication
14 Sep 20
A system is disclosed that includes a processor including watermark logic to output a first watermark to an output device that outputs a first watermark signal, based on the first watermark, to an acoustic transmission medium.
Igor Muttik, Adam Marek, Alex Nayshtut
Filed: 14 Nov 19
Utility
Systems and methods for phishing and brand protection
14 Sep 20
Systems and methods for phishing and brand protection of websites via copycat detection are disclosed herein.
Simon Hunt, Venkata Ramanan Sambandam
Filed: 3 Feb 19
Utility
Advanced threat protection cross-product security controller
7 Sep 20
A system for securing electronic devices includes a processor, non-transitory machine readable storage medium communicatively coupled to the processor, security applications, and a security controller.
Derek Pearcy, Jessica Heinrich, Michael Bishop, Cristian Fiorentino, Jessica Gaskins, Martina Borkowsky
Filed: 16 Sep 18
Utility
Methods, systems, and media for storing and retrieving data from distributed vaults
31 Aug 20
Methods, systems, and media for storing and retrieving data from distributed vaults are provided.
Martin Stecher
Filed: 26 Jul 18
Utility
Implicit crowdsourcing for untracked correction or verification of categorization information
31 Aug 20
Embodiments of the present disclosure are directed to updating categorization of online content.
Craig Philip Olinsky
Filed: 22 Aug 18