257 patents
Page 9 of 13
Utility
Action detection and network security policy enforcement based on wireless-transmission interference patterns
16 Feb 21
Systems of the present disclosure can detect user activities on endpoint devices based on the interference patterns those actions produce in wireless transmissions between those endpoint devices and another device (e.g., an edge device operating as a web security gateway).
Ilya Sokolov, Keith Newstadt
Filed: 30 Mar 18
Utility
Systems and methods for managing location-based access control lists
16 Feb 21
The disclosed computer-implemented method for managing location-based access control lists may include (i) identifying a collection of devices that are located within a physical space, (ii) determining, based on user activity data received from the collection of devices, that an authorized user is attempting to modify, on a location-based access control list for a wireless network, the access rights of a target computing device near a location indicated by the authorized user in the physical space, (iii) detecting, based on the user activity data, the target computing device near the location indicated by the authorized user, and (iv) in response to detecting the target computing device indicated by the authorized user, modifying, on the location-based access control list, the access rights of the target computing device.
Lei Gu, Ilya Sokolov
Filed: 21 Dec 18
Utility
Geofencing and alerting around objects with verified attributes
16 Feb 21
The present disclosure includes a method for maintaining a dynamic geofence.
Ilya Sokolov, Keith Newstadt
Filed: 16 Feb 17
Utility
Systems and methods for utilizing custom tagging to protect against phishing attacks from malicious applications
2 Feb 21
The disclosed computer-implemented method for utilizing custom tagging to protect against phishing attacks from malicious applications may include (1) associating a tag with a source application such that the tag is displayed in a user interface generated by the source application (2) launching a target application sharing at least one common feature with the source application, (3) determining, upon launching the target application, whether a user interface generated by the target application is an attack by a malicious application potentially causing harm to the computing device based on a presence or absence of the tag in the user interface, and (4) performing a security action with respect to the target application to protect the computing device from the attack when the tag is determined be absent from the user interface generated by the target application.
Anuradha Joshi, Pallavi Rajput, Anand Darak
Filed: 13 Jun 18
Utility
Thwarting data leakage from a webpage
26 Jan 21
Thwarting data leakage from a webpage.
David Luz Silva, Johann Roturier
Filed: 26 Sep 18
Utility
Malware detection and alerting for network connected devices based on traffic flow analysis on local network
12 Jan 21
As described, embodiments presented herein provide techniques for detecting malware on computing devices connected to a local network segment by observing the traffic flows of such devices and generating signatures characterizing such traffic flows.
Jim Casaburi, Steven P. Stockman
Filed: 18 Dec 14
Utility
Systems and methods for tracking the flow of user information over a network
12 Jan 21
A computer-implemented method for tracking the flow of user information over a network may include (i) recording user information transmitted from a user's computing device, (ii) identifying at least one third-party communication that utilizes at least a portion of the user information, (iii) deriving communication metadata from the third-party communication, (iv) generating, based on the communication metadata and the recorded user information, an information flow report that describes (A) the user information that was transmitted over the network connection, (B) at least one third-party communication that utilized elements of the user information, and (C) at least one element of user information utilized by the third-party communication, and (v) providing the information flow report to the user via a graphical user interface (GUI).
Spencer Smith
Filed: 7 Mar 17
Utility
Security for IoT home voice assistants
4 Jan 21
A method for implementing security of Internet of Things (IoT) home voice assistants is described.
Susanta K. Nanda, Yuqiong Sun, Saurabh Shintre
Filed: 1 May 18
Utility
Systems and methods for anonymizing user accounts
4 Jan 21
The disclosed computer-implemented method for anonymizing user accounts may include (i) receiving an instruction to anonymize a user account to protect a user's personally identifiable information, (ii) accessing, by a security program, a settings portal for the user account in response to receiving the instruction to anonymize the user account, (iii) replacing, by the security program, original values within at least two fields within the settings portal for the user account with anonymized values to mask the user's personally identifiable information, and (iv) storing the anonymized values within a protected vault to enable the user to login to the user account.
SriHarsha Angara, Michael Lo, John Meehan, Srinivas Chillappa, Simon Tiku, Viral Mehta
Filed: 7 Dec 17
Utility
Systems and methods for enforcing secure shared access on computing devices by content state pinning
4 Jan 21
The disclosed computer-implemented method for enforcing secure shared access on computing devices by content state pinning may include (1) receiving, from a user, a selection of a content view to be shared with an additional user from content displayed on a computing device by an application, (2) associating, by the computing device, a change event with the content view, (3) detecting, by the computing device, the change event in response to an action by the additional user to change the content view, and (4) performing, by the computing device, a security action to protect the computing device from potentially malicious activity associated with the action by the additional user to change the content view.
Anuradha Joshi, Pallavi Rajput, Anand Darak
Filed: 5 Jun 18
Utility
Systems and methods for protecting a cloud storage against suspected malware
4 Jan 21
The disclosed computer-implemented method for protecting a cloud storage against suspected malware may include (1) receiving a backup of one or more encrypted files over a network, (2) determining that the one or more encrypted files match one or more criteria associated with suspected malware, and (3) performing a security action that protects a computing device against the suspected malware.
Ilya Sokolov, Lei Gu, Mark Kennedy
Filed: 25 Sep 18
Utility
Efficient incident response through tree-based visualizations of hierarchical clustering
28 Dec 20
A computer system stores incident records in a database.
David Silva, Matteo Dell'Amico, Kevin Alejandro Roundy, Michael Hart, Christopher Gates
Filed: 30 May 17
Utility
Systems and methods for improving network efficiency
28 Dec 20
The disclosed computer-implemented method for improving network efficiency may include (i) receiving, from a client device, and at a publicly available on-demand cloud computing platform, a network packet that indicates an origination network address of an intermediary local network gateway that forwarded the network packet rather than an actual network address of the client device, and (ii) inserting, into the network packet, and at the publicly available on-demand cloud computing platform, network address translation information indicating a path to the actual network address of the client device to enable a virtual node within the publicly available on-demand cloud computing platform to identify the client device.
Qing Li
Filed: 30 Jan 19
Utility
Software application activation using a picture-based activation key
21 Dec 20
Software activation using a picture-based activation key.
Somard Kruayatidee, Jonathon Salehpour
Filed: 17 Jun 18
Utility
Systems and methods for detecting malicious programmatic clicks directed to view elements displayed on touchscreens
14 Dec 20
The disclosed computer-implemented method for detecting malicious programmatic clicks directed to view elements displayed on touchscreens may include (1) receiving an indication of a click event directed to a view element of a user interface displayed on a touchscreen of a computing device, (2) determining that the click event was not immediately preceded by a touch event directed to the view element displayed on the touchscreen, (3) classifying, in response to determining that the click event was not immediately preceded by the touch event directed to the view element, the click event as potentially malicious, and (4) performing, in response to classifying the click event as potentially malicious, a security action that prevents performance of an operation requested by the click event.
Sachin Chauhan
Filed: 19 Mar 17
Utility
Systems and methods for preventing display of blocked content
14 Dec 20
The disclosed computer-implemented method for preventing display of blocked content may include (i) displaying, by the computing device, content to a user, (ii) receiving, from a user, an indication to block the content, (iii) adding the content to a block list, (iv) receiving, at a later time, the content to display to the user, (v) determining the content is on the block list, and (vi) in response to determining the content is on the block list, performing a security action to prevent display of the content.
Santhanakrishnan KC
Filed: 23 Sep 18
Utility
Systems and methods for detecting and protecting against malicious software
23 Nov 20
The disclosed computer-implemented method for detecting and protecting against malicious software may include loading an untrusted application having a defined entry point into an emulated computing environment, executing a first instance of the untrusted application in the emulated computing environment beginning at the defined entry point, executing a second instance of the untrusted application beginning at a second entry point downstream from the defined entry point so as to bypass at least a portion of the untrusted application executed in the first instance, identifying the untrusted application as a potential threat based on information extracted from the second instance of the untrusted application, and performing a security action to protect against the untrusted application identified as a threat.
Mircea Ciubotariu, Dumitru Stama
Filed: 18 Jun 18
Utility
Preventing application installation using system-level messages
9 Nov 20
Methods and systems are provided for preventing the installation of malicious applications using system-level messages.
Shrikant Pawar, Sharad Subhash Mhaske, Arif Mohammed Shaikh
Filed: 15 Mar 18
Utility
Systems and methods for validating a user's physical location
26 Oct 20
The disclosed computer-implemented method for validating a user's physical location may include (i) identifying a plurality of sensor-equipped devices that are connected to a local network, wherein the local network is associated with a physical location, (ii) receiving a request to validate that a user is present at the physical location that is associated with the local network, (iii) instructing, in response to receiving the request, the user to interact with at least one sensor-equipped device in the plurality of sensor-equipped devices, (iv) confirming, based on observing a response of the sensor-equipped device, that the user has interacted with the at least one sensor-equipped device, and (v) validating, in response to confirming that the user has interacted with the at least one sensor-equipped device, that the user is present at the physical location.
Ilya Sokolov, Keith Newstadt
Filed: 30 Oct 17
Utility
Method to determine whether device location indicates person location
26 Oct 20
Techniques are disclosed to predict whether a current location of a mobile device corresponds to a user of that mobile device.
Keith Newstadt, Ilya Sokolov
Filed: 15 Aug 16