257 patents
Page 3 of 13
Utility
Systems and methods for managing digital personas for online services
2 May 23
The disclosed computer-implemented method for managing digital personas for online services may include generating a digital persona and a persona wear indicator (PWI) score for a user of an anonymized inbox with a communication alias to use for an online entity, determining, based on one or more communication messages associated with the communication alias, that the online entity has leaked information associated with the digital persona, recalculating the PWI score for the digital persona based at least in part on the determination that the online entity has leaked the information, determining that the PWI score exceeds a privacy score threshold; and in response to determining that the PWI score exceeds the privacy score threshold, performing a security action that protects privacy of the user.
Kapil Anturkar, SriHarsha Angara
Filed: 26 Mar 20
Utility
Systems and methods for protecting user data privacy against web tracking during browsing sessions
2 May 23
The disclosed computer-implemented method for protecting user data privacy against web tracking during browsing sessions may include (i) detecting a user request, including a private domain, for a website in a web browser address bar during a browsing session, (ii) separating, utilizing a browser container, a user browsing state associated with the private domain from other domains during the browsing session, (iii) routing the user website request to one or more servers in a random order to run the browsing session, (iv) performing a browsing state security action that protects against cross-website tracking by discarding user browsing state data collected during the browsing session, and (v) performing a web isolation security action that protects against use of browser fingerprint data for conducting malicious attacks based on the routing of the user website request to the servers in the random order.
Iskander Sanchez, Matteo DellAmico
Filed: 31 Mar 20
Utility
Systems and methods for protecting search privacy
21 Mar 23
The disclosed computer-implemented method for protecting search privacy may include (i) receiving, via a search interface, a search query comprising at least one search term, (ii) determining a sensitivity level of the search query based on the at least one search term, (iii) directing the search query to a search engine that has a level of privacy correlated with the sensitivity level of the search query, and (iv) returning, via the search interface, at least one result of directing the search query to the search engine that has the level of privacy correlated with the sensitivity level of the search query.
Susanta Nanda, Kevin Roundy, Ashwin Kayyoor
Filed: 31 Mar 20
Utility
Systems and methods for authenticating application points of entry to prevent unauthorized use of locked mobile applications
14 Mar 23
The disclosed computer-implemented method for authenticating application points of entry to prevent unauthorized use of locked mobile applications may include (i) identifying one or more mobile applications having an access restriction and a group of application entry points associated with at least one mobile application function, (ii) intercepting a series of device inputs from a user for accessing the application entry points to bypass the access restriction for the mobile applications, (iii) requesting authentication credentials to bypass the access restriction from the application entry points, (iv) determining that the requested authentication credentials are invalid, and (v) performing a security action that protects against potentially malicious activity associated with unauthorized access to the mobile applications upon determining that the requested authentication credentials are invalid.
Sharad Mhaske, Anand Darak
Filed: 4 Dec 20
Utility
Systems and methods for protecting against misleading clicks on websites
28 Feb 23
The disclosed computer-implemented method for protecting against misleading clicks on websites may include (i) detecting a user click event on a uniform resource locator (URL) for navigating to a website during a web browsing session, (ii) analyzing the user click event to identify expected domain behavior associated with navigating to the website based on the URL, (iii) determining, based on the analysis, that the user click event deviates from the expected domain behavior associated with navigating to the website based on the URL, and (iv) performing a security action that protects against potentially malicious activity caused by the user click event deviating from the expected domain behavior associated with navigating to the website based on the URL.
Iskander Sanchez, David Silva
Filed: 12 Aug 20
Utility
Systems and methods for detecting inter-personal attack applications
17 Jan 23
The disclosed computer-implemented method for detecting inter-personal attack applications may include (i) receiving application marketplace information describing application feature information, (ii) creating, by performing natural language processing on the feature information, a feature vector identifying a potentially malicious functionality of the application, (iii) creating a profiling vector that is a categorical feature representation of installation information from an application installation file, and (iv) performing a security action including (A) mapping, using a machine learning model, the feature vector and the profiling vector to a multi-dimensional output vector having element corresponding to a malware category and (B) determining a malicious extent of the application by combining the categories identified by the multi-dimensional output vector with bi-partite graph information identifying (I) relations between a plurality of applications and (II) relations between a plurality of computing devices hosting the plurality of applications.
Yufei Han, Kevin Roundy, Acar Tamersoy
Filed: 23 Jun 20
Utility
Systems and methods for proactive call spam/scam protection using network extensions
27 Dec 22
The disclosed computer-implemented method for proactive call spam/scam protection may include intercepting network traffic by the at least one processor employing a network extension feature of an operating system of a computing device.
Anand Darak, Sharad Mhaske
Filed: 9 Nov 20
Utility
Protecting personally identifiable information submitted through a browser
8 Nov 22
Protecting PII submitted through a browser.
SriHarsha Angara, Venkadesan Marimuthu, Aditya Subhash Sumant, Arun Ganesan, Mahesh Kamsala, Rahuraman Kaliyaperumal, A.Ramachandra Reddy
Filed: 21 May 20
Utility
Systems and methods for identifying and mitigating phishing attacks
8 Nov 22
The disclosed computer-implemented method for identifying and mitigating phishing attacks may include (i) receiving a request for sensitive data utilized to access a network service, (ii) launching an autofill provider for providing the sensitive data to the network service, (iii) identifying, utilizing the autofill provider, a domain for the network service and a data type associated with the sensitive data utilized to access the network service, (iv) determining, utilizing the autofill provider, a reputation for the network service based on the domain and the data type, and (v) performing a security action that protects against a phishing attack based on the reputation determined for the network service.
Xi Guo, Mrinal Khanvilkar, Darshini Rathod, Jiejie Wang
Filed: 4 Sep 19
Utility
Systems and methods for authenticating digital media content
11 Oct 22
The disclosed computer-implemented method for authenticating digital media content may include (i) receiving digital media content that has been captured by a capturing device and digitally signed through a cryptoprocessor embedded within the capturing device to provide an assurance of authenticity regarding how the capturing device captured the digital media content, and (ii) encoding an identifier of the received digital media content and a digital signature to an encrypted distributed ledger, the digital signature including at least one of a digital signature of the digital media content by the capturing device or a digital signature of the digital media content by an entity encoding the received digital media content such that the encoding becomes available for subsequent verification through the encrypted distributed ledger.
Daniel Kats, Christopher Gates, Acar Tamersoy, Daniel Marino
Filed: 21 Mar 19
Utility
Systems and methods for identifying security risks posed by application bundles
4 Oct 22
The disclosed computer-implemented method for identifying security risks posed by application bundles may include (i) intercepting, using a VPN client of the computing device, network traffic of the computing device, wherein an operating system of the computing device restricts applications into a sandboxed environment, (ii) storing, on the computing device, a copy of at least a portion of the network traffic of the computing device within a sandbox associated with the VPN client, (iii) identifying, by analyzing the copy of the network traffic, an application bundle within the network traffic, (iv) determining, by analyzing the application bundle in the sandbox associated with the VPN client, that the application bundle poses a security risk, and (v) in response to determining that the application bundle poses a security risk, performing a security action to remedy the security risk.
Ben Phung, Movses Margaryan, Joshua Opos
Filed: 20 Dec 19
Utility
Systems and methods for providing web tracking transparency to protect user data privacy
20 Sep 22
The disclosed computer-implemented method for providing web tracking transparency to protect user data privacy may include (i) receiving a browser request for target websites during a browsing session, (ii) identifying a tracking type for website trackers utilized by the target websites, the tracking type including a direct tracking type or a tracking sharing type, (iii) extracting an information category for the target websites, (iv) detecting text patterns shared between the target websites in a common information category, (v) determining information collected about a user by the website trackers by combining the tracking type for the website trackers, the information category for the target websites, and the detected text patterns, and (v) performing a security action that protects against unsolicited website tracking in future browsing sessions by providing the information collected by the website trackers to the user.
Iskander Sanchez Rola, Leyla Bilge, Pierre-Antoine Vervier, David Luz Silva
Filed: 15 Jun 20
Utility
Systems and methods for protecting against password attacks by concealing the use of honeywords in password files
6 Sep 22
The disclosed computer-implemented method for protecting against password attacks by concealing the use of honeywords in password files may include (i) receiving a login request comprising a candidate password for a user, (ii) authenticating the login request by determining whether a hash of a true password for the user stored in a honeyserver matches a hash of the candidate password, (iii) determining whether the candidate password has matches a hash of a honeyword stored in a password file when the true password hash fails to match the candidate password hash, (iv) classifying the password file as being potentially compromised when the candidate password hash matches the honeyword hash stored in the password file, and (v) performing a security action that protects against a password attack utilizing the potentially compromised password file.
Matteo Dell'Amico
Filed: 18 Dec 19
Utility
Systems and methods for protecting user privacy
6 Sep 22
The disclosed computer-implemented method for protecting user privacy may include (i) detecting that a website indicates a user account identifier, (ii) detecting whether a third-party script has access to the user account identifier, and (iii) performing, based at least in part on detecting that the third-party script has access to the user account identifier, a security action to protect user privacy such that the security action facilitates an attempt to prevent the third-party script from actually accessing the user account identifier.
Iskander Sanchez
Filed: 23 Oct 20
Utility
Systems and methods for increasing cybersecurity protection
6 Sep 22
The disclosed computer-implemented method for increasing cybersecurity protection may include (i) receiving, at a subscription-management computing device, an alert indication that indicates (A) a cybersecurity status score on a protected computing device is lower than a threshold value and (B) the protected computing device is associated with an expired subscription to a cybersecurity service and (ii) performing, responsive to receiving the alert indication, a security action comprising sending, from the subscription-management computing device to a server, a transfer instruction directing the server to transfer, to the protected computing device, at least a portion of a duration of a valid subscription to the cybersecurity service.
Sharad Mhaske
Filed: 27 Feb 19
Utility
Facilitating third party utilization of personal computing resources in exchange for software usage
6 Sep 22
A method for facilitating utilization of processing resources of a plurality of user electronic devices for mining of cryptocurrency.
Andrei Stanciu, Daniel Nicola, Teodor Anton, Robert A. Clyde
Filed: 25 Jun 18
Utility
Systems and methods for protecting users
23 Aug 22
The disclosed computer-implemented method for protecting users may include (i) detecting, by a privacy-protecting security application, an attempt by a user to upload an item of media content, (ii) determining, by the privacy-protecting security application, that the item of media content matches a true identity signature for the user that the privacy-protecting security application generated based on other items of media content relating to the user, and (iii) prompting, by the privacy-protecting security application in response to determining that the item of media content matches the true identity signature, the user to perform a privacy-protecting security action to prevent exposing a true identity for the user.
Anant Mahajan, SriHarsha Angara
Filed: 30 Jul 19
Utility
Secure computer peripheral devices
2 Aug 22
A method for improving security of peripheral devices is described.
Chengi Jimmy Kuo, Haik Mesropian, Petrus Johannes Viljoen, David Kane
Filed: 19 Mar 19
Utility
Routing server communications through a nearby mobile device
2 Aug 22
Routing server communications through a nearby mobile device.
Anand Darak, Sharad Subhash Mhaske
Filed: 18 May 20
Utility
Systems and methods for adaptively managing data drift in a classifier
19 Jul 22
The disclosed computer-implemented method for adaptively managing data drift in a classifier may include (i) receiving, at a computing device, an input sample of digital information having an unknown reputation and (ii) performing a security action that may include (A) identifying the input sample as benign or malicious based on a result obtained by classifying the input sample using a machine learning model trained using activity regularization, (B) calculating an internal activity of the machine learning model occurring during the classifying, (C) calculating an activation entropy of the machine learning model occurring during the classifying, (D) comparing a combination of the internal activity and the activation entropy to a threshold, and (E) when the combination of the internal activity and the activation entropy meets or exceeds the threshold, identifying the result as a low-confidence result.
Keith Kenemer, Javier Echauz, Sarfaraz Hussein
Filed: 10 Sep 19