257 patents
Page 11 of 13
Utility
Systems and methods for authenticating a multimedia stream
31 Aug 20
The disclosed computer-implemented method for authenticating a multimedia stream may include generating a metadata transcript based on at least a portion of a multimedia stream and digitally signing the metadata transcript.
Ilya Sokolov, Keith Newstadt
Filed: 5 Apr 18
Utility
Thwarting an impersonation attack using online decoy text
24 Aug 20
Thwarting an impersonation attack using online decoy text.
Johann Roturier, David Luz Silva, Pratyush Banerjee
Filed: 25 Sep 18
Utility
Systems and methods for controlling an application launch based on a security policy
17 Aug 20
The disclosed computer-implemented method for controlling an application launch based on a security policy may include (1) loading an application launcher into a sandbox, (2) monitoring one or more functions associated with launching an application from the application launcher, (3) determining that the functions associated with launching the application have been invoked by the application launcher, (4) querying a policy manager comprising a security policy to determine whether the application is potentially harmful, and (5) performing, based on the security policy, a security action preventing the application launcher from launching the application from the sandbox upon determining that the application is potentially harmful.
Jonathon Salehpour, Somard Kruayatidee, Rad Stanev
Filed: 21 May 18
Utility
Systems and methods for modifying file backups in response to detecting potential ransomware
10 Aug 20
A computer-implemented method for modifying file backups in response to detecting potential ransomware may include (1) detecting, during a file backup process, an anomaly that is potentially indicative of ransomware on a computing device, (2) in response to detecting the anomaly that is potentially indicative of ransomware, storing a backup copy in a separate location from other backup copies, (3) confirming that the anomaly is indicative of ransomware on the computing device, (4) adjusting a backup policy in response to confirming that the anomaly is indicative of ransomware on the computing device, and (5) managing the backup copy based on the adjusted backup policy.
Lei Gu, Ilya Sokolov
Filed: 31 Jan 16
Utility
Detecting and preventing execution of a malicious computer application using utility driven graph summarization
10 Aug 20
Utility driven graph summarization for use in detecting and preventing malicious computer application.
Ashwin Kumar Kayyoor, Petros Efstathopoulos
Filed: 17 Apr 18
Utility
Content-based automatic backup of images
27 Jul 20
The content of each specific image file on an endpoint is analyzed.
Lei Gu, Ilya Sokolov
Filed: 1 Jan 18
Utility
Systems and methods for categorizing security incidents
20 Jul 20
The disclosed computer-implemented method for categorizing security incidents may include (i) generating, within a training dataset, a feature vector for each of a group of security incidents, the feature vector including features that describe the security incidents and the features including categories that were previously assigned to the security incidents as labels to describe the security incidents, (ii) training a supervised machine learning function on the training dataset such that the supervised machine learning function learns how to predict an assignment of future categories to future security incidents, (iii) assigning a category to a new security incident by applying the supervised machine learning function to a new feature vector that describes the new security incident, and (iv) notifying a client of the new security incident and the category assigned to the new security incident.
Matteo Dell'Amico, Chris Gates, Michael Hart, Kevin Roundy
Filed: 26 Feb 19
Utility
Systems and methods for detecting system attacks
20 Jul 20
The disclosed computer-implemented method for detecting system attacks may include (1) receiving, from a detecting system capable of detecting attacks, information that identifies an attack that originated from a compromised client system that is remote from the detecting system, (2) determining that the attack originated from the compromised client system, (3) determining that the compromised client system includes an anti-malware agent, and (4) notifying the anti-malware agent on the compromised client system that the compromised client system performed the attack.
Christopher Alexander
Filed: 17 Jul 14
Utility
Systems and methods for protecting users
6 Jul 20
The disclosed computer-implemented method for protecting users may include (i) displaying, through a graphical user interface for a third-party security application executing within an operating system environment, a button for a user to select, (ii) displaying, through the graphical user interface, a prompt that prompts the user to select the button in order to receive a reward, (iii) configuring the graphical user interface such that selecting the button triggers both a conspicuous response that provides access to the reward and a more hidden response that initiates application of a security service to protect the user, and (iv) performing, based on receiving a selection of the button, both the conspicuous response and the more hidden response.
Qing Li, Samir Kapuria
Filed: 11 Aug 19
Utility
Systems and methods for enforcing privacy in cloud security
6 Jul 20
A computer-implemented method for enforcing privacy in cloud security may include (i) identifying, by a computing device, a set of files in a backup process for a cloud service, (ii) determining, by the computing device, that at least one file in the set of files is a private file, (iii) modifying, by the computing device encrypting the private file, the set of files in the backup process, (iv) completing the backup process for the cloud service with the modified set of files, and (v) enforcing a security policy of the cloud service based on a scan of file hashes.
Ilya Sokolov, Lei Gu, Jason Holler, Tim van der Horst
Filed: 10 Jul 17
Utility
Consumer device generation of limited-use credit card numbers
22 Jun 20
Methods and systems for generating limited-use credit card numbers at a consumer device and verifying said numbers for completing transactions are provided.
Chengi Kuo
Filed: 19 Dec 17
Utility
Systems and methods for creating application ratings
22 Jun 20
The disclosed computer-implemented method for creating application ratings may include (i) determining that a user device has downloaded an application, (ii) monitoring the usage of the application on the user device, (iii) deducing a value of the application based at least in part on the monitored usage, and (iv) creating a rating for the application that indicates the deduced value of the application.
Lei Gu, Keith Newstadt
Filed: 14 Aug 16
Utility
Insider threat detection under user-resource bi-partite graphs
15 Jun 20
A method for insider threat detection under user-resource bi-partite graphs is described.
Saurabh Shintre, Sandeep Bhatkar, Ashwin Kumar Kayyoor
Filed: 27 Sep 17
Utility
Systems and methods for evaluating unfamiliar executables
8 Jun 20
The disclosed computer-implemented method for evaluating unfamiliar executables may include (i) identifying, on the computing device, (a) a code object that is generated from source code written in a programming language, that is specified in an intermediate language different from the programming language, and that can be compiled into an executable file by a just-in-time compiler on the computing device and (b) an executable file that lacks an assigned reputation in a reputation system that distinguishes benign and malicious files, (ii) determining that the executable file was produced by the just-in-time compiler compiling the code object on the computing device, (iii) retrieving, from the reputation system, a reputation for the code object, and (iv) performing a security action on the executable file that is based on the reputation of the code object.
Brian T. Witten, Christopher Gates
Filed: 28 Nov 17
Utility
Securing a network device from a malicious embedded script hosted on a third-party domain
8 Jun 20
Securing a network device from a malicious embedded script hosted on a third-party domain.
David Luz Silva, Petros Efstathopoulos
Filed: 28 Nov 17
Utility
Systems and methods for enforcing access-control policies
1 Jun 20
The disclosed computer-implemented method for enforcing access-control policies may include (1) detecting, at a network device capable of configuring networks according to access-control policies, an attempt to connect a client to an access-controlled network, (2) identifying an access-control policy that applies to the access-controlled network, (3) configuring the access-controlled network according to the access-control policy, and (4) notifying the client that the access-controlled network is available.
Justin Harmon
Filed: 16 May 16
Utility
Systems and methods for detecting suspicious voice calls
18 May 20
The disclosed computer-implemented method for detecting suspicious voice calls may include (i) identifying an incoming voice call, (ii) extracting, from audio of the incoming voice call, a plurality of characteristics, (iii) calculating a trustworthiness score of the plurality of the characteristics based on a response by a recipient of the incoming voice call, and (iv) storing the trustworthiness score of the plurality of characteristics in a reputation database that (a) receives a request for the trustworthiness score, the request originating from an additional computing device and including an additional plurality of characteristics extracted from an additional incoming voice call, (b) determines that the additional plurality of characteristics matches the plurality of characteristics, and (c) enables the additional computing device to perform a security action on the additional incoming voice call by sending the trustworthiness to the additional computing device.
Keith Newstadt, Ilya Sokolov
Filed: 14 Dec 17
Utility
User-directed identity verification over a network
27 Apr 20
User-directed identity verification over a network.
Daniel Kats, Petros Efstathopoulos
Filed: 13 Jul 17
Utility
Systems and methods for protecting users
20 Apr 20
The disclosed computer-implemented method for protecting users may include (i) receiving, at an online social network from a first member of the online social network, a request to delegate an access right to an Internet-of-Things device possessed by the first member to a second member within the online social network to which the first member is connected as a social contact and (ii) granting, through the online social network, the request to delegate the access right to the Internet-of-Things device to the second member to provide the second member with at least a limited ability to interact with the Internet-of-Things device possessed by the first member of the online social network.
Qing Li, Samir Kapuria
Filed: 11 Aug 19
Utility
Systems and methods for detecting nonfunctional endpoint devices
13 Apr 20
The disclosed computer-implemented method for detecting nonfunctional endpoint devices may include (i) identifying, at a networking device, an endpoint device, (ii) identifying, at the networking device, a behavioral profile of the endpoint device that may include (a) a functional pattern of network behavior of the endpoint device that occurs while the endpoint device is in a functional state and/or (b) a nonfunctional pattern of network behavior of the endpoint device that occurs while the endpoint device is in a nonfunctional state, (iii) passively monitoring, at the networking device, network traffic of the endpoint device, (iv) determining, at the networking device, that the endpoint device is nonfunctional by detecting (a) an absence of the functional pattern in the network traffic and/or (b) a presence of the nonfunctional pattern in the network traffic, and (v) performing a security action.
Bruce McCorkendale, William E. Sobel
Filed: 27 Sep 16