33 patents
Utility
System and method for providing an in-line and sniffer mode network based identity centric firewall
15 Nov 22
The instant disclosure is directed to an attack/unwanted activity detecting firewall for use in protecting authentication-based network resources.
Ajit Sancheti, Roman Blachman, Amir Jakoby, Eyal Karni
Filed: 5 Dec 18
Utility
Parametric Behavioral Pattern Definition
30 Dec 20
A security agent implemented on a monitored computing device is described herein.
David F. Diehl, Daniel W. Brown, Aaron Javan Marks, Kirby J. Koster, Daniel T. Martin
Filed: 10 Sep 20
Utility
Securely and Efficiently Providing User Notifications About Security Actions
16 Dec 20
A security agent executing in kernel mode may receive a request from the anti-malware component executing with low privileges in user mode, and, in response, the security agent may perform a security action with respect to a malicious file detected on the computing device.
Ion-Alexandru Ionescu
Filed: 30 Aug 20
Utility
Security agent
30 Nov 20
A security agent is described herein.
David F. Diehl, Dmitri Alperovitch, Ion-Alexandru Ionescu, George Robert Kurtz
Filed: 12 Jun 18
Utility
Computational modeling and classification of data streams
9 Nov 20
Example techniques described herein determine a signature or classification of a data stream such as a file.
Sven Krasser, David Elkind, Patrick Crenshaw, Brett Meyer
Filed: 9 Jan 17
Utility
Identifying and correlating physical devices across disconnected device stacks
9 Nov 20
Drivers in different functional paths can use different types of identifiers for the same hardware device, such that the drivers may not be able to natively coordinate their actions related to the hardware device due to incompatible identifier types.
Cameron Gutman, Aaron LeMasters
Filed: 29 May 18
Utility
Validation-based determination of computational models
2 Nov 20
Example techniques described herein determine a validation dataset, determine a computational model using the validation dataset, or determine a signature or classification of a data stream such as a file.
Sven Krasser, David Elkind, Brett Meyer, Patrick Crenshaw
Filed: 9 Jan 17
Utility
Firmware Retrieval and Analysis
28 Oct 20
A bus filter driver and security agent components configured to retrieve and analyze firmware images are described herein.
Timo Kreuzer, Ion-Alexandru Ionescu, Aaron LeMasters
Filed: 21 Apr 20
Utility
Detecting Security-Violation-Associated Event Data
14 Oct 20
An event can be analyzed for association with a security violation.
Cory-Khoi Quang Nguyen, Jaron Michael Bradley, William Leon Charles Pauley
Filed: 9 Jul 19
Utility
Malicious/benign computational behavior detection using canonic patterns of behavior
12 Oct 20
A security agent implemented on a monitored computing device is described herein.
David F. Diehl, Daniel W. Brown, Aaron Javon Marks, Kirby Koster, Daniel T. Martin
Filed: 1 May 17
Utility
Computer-Security Event Clustering and Violation Detection
30 Sep 20
An event can be associated with a monitored computing device and a command-line record.
Cory-Khoi Quang Nguyen, Jaron Michael Bradley, John Lee, Brody Nisbet
Filed: 27 Mar 19
Utility
Computer-Security Violation Detection using Coordinate Vectors
30 Sep 20
Event vectors can be determined for respective events based on respective command-line records and a trained representation mapping.
Cory-Khoi Quang Nguyen, Jaron Michael Bradley, John Lee, Brody Nisbet
Filed: 27 Mar 19
Utility
Deception-Based Responses to Security Attacks
9 Sep 20
Deception-based techniques for responding to security attacks are described herein.
Adam S. Meyers, Dmitri Alperovitch, George Robert Kurtz, David F. Diehl, Sven Krasser
Filed: 26 May 20
Utility
Deception-Based Responses to Security Attacks
9 Sep 20
Deception-based techniques for responding to security attacks are described herein.
Adam S. Meyers, Dmitri Alperovitch, George Robert Kurtz, David F. Diehl, Sven Krasser
Filed: 26 May 20
Utility
Network Containment of Compromised Machines
2 Sep 20
A computing device can install and execute a kernel-level security agent that interacts with a remote security system as part of a detection loop aimed at defeating malware attacks.
Paul Meyer, Cameron Gutman, John R. Kooker
Filed: 17 May 20
Utility
Container Application for Android-based Devices
2 Sep 20
A computer-processor executable container application operates within an operating system, such as an Android operating system.
Vincenzo Iozzo, Giovanni Gola
Filed: 27 Feb 19
Utility
Securely and efficiently providing user notifications about security actions
31 Aug 20
A security agent executing in kernel mode may receive a request from the anti-malware component executing with low privileges in user mode, and, in response, the security agent may perform a security action with respect to a malicious file detected on the computing device.
Ion-Alexandru Ionescu
Filed: 10 Apr 18
Utility
Kernel- and user-level cooperative security processing
10 Aug 20
Some examples detect malicious activity on a computing device.
David F. Diehl, Milos Petrbok, Colin Christopher McCambridge, Aaron Putnam
Filed: 27 Dec 17
Utility
Malware detection using local computational models
27 Jul 20
Example techniques herein determine that a trial data stream is associated with malware (“dirty”) using a local computational model (CM).
Sven Krasser, David Elkind, Patrick Crenshaw, Kirby James Koster
Filed: 23 Jul 17
Utility
Deception-based responses to security attacks
13 Jul 20
Deception-based techniques for responding to security attacks are described herein.
Adam S. Meyers, Dmitri Alperovitch, George Robert Kurtz, David F. Diehl, Sven Krasser
Filed: 3 Mar 13