19 patents
Utility
Systems and Methods for Identifying Website Content Manipulation
11 Jan 24
The disclosed computer-implemented method for identifying website content manipulation may include (i) receiving a request for website content from a website and (ii) performing a security action that may include: (a) requesting the website content from the website via a first network interface device (NID); (b) requesting the website content from the website via a second NID, where the first NID and the second NID use different types of hardware interface technologies; (c) receiving first received content via the first NID; (d) receiving second received content via the second NID; (e) comparing the first received content to the second received content; and (f) identifying a probability of web content manipulation based on a degree of mismatch between the first received content and the second received content.
Joshua Opos
Filed: 24 Mar 20
Utility
Systems and Methods for Utilizing User Profile Data to Protect Against Phishing Attacks
14 Dec 23
The disclosed computer-implemented method for utilizing user profile data to protect against phishing attacks may include (i) detecting a target user profile associated services accessed by a network-based application, (ii) determining identifiers associated with each of the services, (iii) extracting, for each of the identifiers, feature vectors describing exploitable screen elements in the network-based application associated with phishing attacks, (iv) updating, based on the feature vectors, previously extracted feature vectors in a data repository storing additional profiles for other users associated with the services, (v) predicting, utilizing a machine-learning model, phishing attack threats for target profile user based on a similarity with the additional profiles, and (vi) performing a security action that protects against the phishing attack threats.
David Luz Silva, Johann Roturier, Petros Efstathopoulos, Iskander Sanchez Rola, Savino Dambra, Platon Kotzias, Leylya Yumer
Filed: 6 Jun 22
Utility
Systems and Methods for Detecting Unauthorized Online Transactions
23 Nov 23
The disclosed computer-implemented method for detecting unauthorized online transactions may include correlating, by at least one processor, one or more reported financial activities to one or more online financial activities tracked in network telemetry on one or more authorized devices.
Kevin Alejandro Roundy, Iskander Sanchez Rola, Goutham Kumar Nekkalapu, Emory Shing-Kuo Shyong, Platon Kotzias, Magesh Varadharajan
Filed: 6 Jun 22
Utility
Systems and Methods for Detecting Websites That Perpetrate at Least One of Scams or Frauds
12 Oct 23
The disclosed computer-implemented method for detecting websites that perpetrate at least one of scams or frauds may include correlating online interaction data with financial transaction data.
Iskander Sanchez Rola, Kevin Alejandro Roundy, Platon Kotzias, Emory Shing-Kuo Shyong, Goutham Kumar Nekkalapu, Magesh Varadharajan
Filed: 26 Apr 22
Utility
User Data Collection Privacy Using Probabilistic Data Structures
14 Sep 23
A method of collecting user device data includes receiving a probabilistic cardinality estimator data structure in the user device from a server, the probabilistic cardinality estimator data structure associated with a survey question.
Martin Mesrsmid
Filed: 9 Mar 22
Utility
Network Attack Prevention Systems and Methods
14 Sep 23
A system and method for preventing access to potentially malicious network destinations.
Armin Wasicek, Fabrizio Biondi, Thomas Salomon
Filed: 10 Mar 22
Utility
Network Resource Privacy Negotiation System and Method
7 Sep 23
A method for accessing a network resource including detecting an attempt by a user via a computing device to access a service enabled by a computing system via a network and transmitting via the network to the computing system a first request to access the service in response to detecting the attempt by the user to access the service, the first request including at least one empty personally identifiable data structure.
Sadia Afroz, Juyong Do, John Poothokaran
Filed: 11 May 23
Utility
Network Resource Privacy Negotiation System and Method
7 Sep 23
A method for accessing a network resource including detecting an attempt by a user via a computing device to access a service enabled by a computing system via a network and transmitting via the network to the computing system a first request to access the service in response to detecting the attempt by the user to access the service, the first request including at least one empty personally identifiable data structure.
Sadia Afroz, Juyong Do, John Poothokaran
Filed: 11 May 23
Utility
Detecting Malicious Url Redirection Chains
7 Sep 23
Malicious redirects in a redirect chain as a result of loading a web address are detected and blocked.
David Jursa, Jirí Sembera, Peter Kovác, Tomás Trnka, Elnaz Babayeva
Filed: 3 Mar 22
Utility
Data Sharing and Storage Control System and Method
31 Aug 23
A data sharing control method.
Sadia Afroz, Armin Wasicek
Filed: 8 May 23
Utility
Systems and Methods for Encryption In Network Communication
3 Aug 23
A system, computer-readable storage medium, and method for secure network communication.
Christopher Joseph O’Connell, Barna Csukas, Gabor Miklos, Vitalii Sydorovych, Rui Santos, Michal Hojsík
Filed: 3 Feb 22
Utility
Blocked Xor Filter for Blacklist Filtering
20 Jul 23
A method of filtering a URL against a blacklist includes receiving at least a portion of a Uniform Resource Locator (URL), and determining which of a plurality of XOR filters is applicable to the received at least a portion of a URL, where each of the plurality of XOR filters represents a different portion of a URL blacklist.
Hai Tung Nguyen, Christopher Joseph O'Connell, Barna Csukas, Thomas Salomon
Filed: 4 Jan 22
Utility
System and Method for Data Compression and Decompression
6 Jul 23
A data processing method in the form of a data compression method is provided in which a plurality of integers are accessed.
Peter Kubov, Peter Matula
Filed: 5 Jan 22
Utility
Systems and Methods for Protecting Against Misleading Clicks on Websites
17 Feb 22
The disclosed computer-implemented method for protecting against misleading clicks on websites may include (i) detecting a user click event on a uniform resource locator (URL) for navigating to a website during a web browsing session, (ii) analyzing the user click event to identify expected domain behavior associated with navigating to the website based on the URL, (iii) determining, based on the analysis, that the user click event deviates from the expected domain behavior associated with navigating to the website based on the URL, and (iv) performing a security action that protects against potentially malicious activity caused by the user click event deviating from the expected domain behavior associated with navigating to the website based on the URL.
Iskander Sanchez, David Silva
Filed: 12 Aug 20
Utility
Systems and Methods for Identifying Software Vulnerabilities In Embedded Device Firmware
11 Nov 21
The disclosed computer-implemented method for identifying software vulnerabilities in embedded device firmware may include (i) collecting a firmware image for an Internet-of-Things device, (ii) extracting library dependencies from the firmware image for the Internet-of-Things device, (iii) identifying a true version of a library specified in the firmware image by checking a ground truth database that records confirmed values for true versions for previously encountered libraries, and (iv) performing a security action to protect a user from a security risk based on identifying the true version of the library specified in the firmware image.
Johannes Krupp, Pierre-Antoine Vervier, Yun Shen
Filed: 8 May 20
Utility
Systems and Methods for Protecting Search Privacy
30 Sep 21
The disclosed computer-implemented method for protecting search privacy may include (i) receiving, via a search interface, a search query comprising at least one search term, (ii) determining a sensitivity level of the search query based on the at least one search term, (iii) directing the search query to a search engine that has a level of privacy correlated with the sensitivity level of the search query, and (iv) returning, via the search interface, at least one result of directing the search query to the search engine that has the level of privacy correlated with the sensitivity level of the search query.
Susanta Nanda, Kevin Roundy, Ashwin Kayyoor
Filed: 31 Mar 20
Utility
Systems and Methods for Utilizing an Information Trail to Enforce Data Loss Prevention Policies on Potentially Malicious File Activity
9 Oct 19
The disclosed computer-implemented method for utilizing an information trail to enforce data loss prevention policies on potentially malicious file activity may include (1) recording, by a computing device, one or more current activities associated with a file retrieved from a server, (2) linking, by the computing device, the current activities to one or more previously recorded activities associated with the file, (3) generating, by the computing device, a graph including nodes representing an information trail of related events associated with the current activities and the previously recorded activities, (4) determining, by the computing device, a severity of the information trail based on one or more rules, and (5) performing, by the computing device, a data loss prevention action on one or more operations associated with the file based on potential malicious activity.
Manish Pai, Prahalad Deshpande, Sumesh Jaiswal
Filed: 20 May 18
Utility
Systems and Methods for Providing Secure Memory
2 Oct 19
The disclosed computer-implemented method for providing secure memory may include reserving, by a hypervisor stored in a memory device of the computing device, a portion of the memory device as a secure memory during a boot sequence of the computing device and preventing access to the secure memory by an operating system (OS).
Haik Mesropian, Costin Ionescu, Melissa Mendonca, Tirth Sanyal
Filed: 28 Mar 18
Utility
Securing of Internet of Things Devices Based on Monitoring of Information Concerning Device Purchases
2 Oct 19
Purchasing related activity that is executed on computing devices on a LAN is monitored.
Ilya Sokolov, Bruce McCorkendale, Keith Newstadt
Filed: 29 Mar 18
- Prev
- 1
- Next
Patents are sorted by USPTO publication date, most recent first