237 patents
Utility
High-confidence malware severity classification of reference file set
2 Jan 24
A reference file set having high-confidence malware severity classification is generated by selecting a subset of files from a group of files first observed during a recent observation period and including them in the subset.
Martin Bálek, Fabrizio Biondi, Dmitry Kuznetsov, Olga Petrova
Filed: 18 Jan 21
Utility
Assigning privacy ratings to tracking domains in order to increase user awareness of online privacy violations
19 Dec 23
Assigning privacy ratings to tracking domains in order to increase user awareness of online privacy violations.
Iskander Sanchez Rola, Leylya Yumer
Filed: 17 Aug 21
Utility
Systems and methods for removing whitespace from blocked resources in websites
28 Nov 23
The disclosed computer-implemented method for removing whitespace from blocked resources in websites may include identifying elements arranged in a hierarchy from a website at least partially loaded in a browser and identifying one or more whitespace candidates to be displayed as whitespace in the browser.
Iskander Sanchez Rola
Filed: 14 Dec 21
Utility
Data exfiltration detection
28 Nov 23
A computer-implemented method includes creating an account including an account value on an online service.
Martin Mesrsmid
Filed: 15 Jul 21
Utility
Malware detection and mitigation system and method
28 Nov 23
A method and system for updating and applying a ruleset used for determining and mitigating malware threats.
B{hacek over (r)}etislav {hacek over (S)}opík, Fabrizio Biondi, Jakub K{hacek over (r)}oustek, Olga Petrova
Filed: 27 Oct 21
Utility
Systems and methods for protecting data on devices
14 Nov 23
A computer-implemented method for protecting data on devices may include (i) identifying a device that is operated by a user and that comprises private data pertaining to the user, (ii) determining that stalkerware on the device is sending the private data to an unauthorized device not operated by the user, (iii) requesting, in response to determining that the stalkerware is sending the private data to the unauthorized device, that the user select at least one safety plan step from a set of safety plan options, and (iv) modifying, at least in part based on the safety plan step selected by the user, outgoing data sent by the stalkerware to the unauthorized device.
Yufei Han, Kevin Roundy, Acar Tamersoy, Daniel Kats
Filed: 3 Feb 21
Utility
Systems and methods for protecting user privacy
14 Nov 23
The disclosed computer-implemented method for protecting user privacy may include (i) receiving an indication to protect a photo with privacy-protecting blurring, (ii) generating a blurred version of the photo, (iii) generating, based on the blurred version of the photo, a video that progressively de-blurs the photo, (iv) linking through metadata the blurred version of the photo and the video that progressively de-blurs the photo as a combined motion-photo-object, and (v) storing the combined motion-photo-object in a configured location such that a photo display program uses the blurred version of the photo as a preview of the motion-photo-object when browsing but plays the video that progressively de-blurs the photo in response to additional user input selecting the preview.
Saurabh Shintre, Daniel Marino
Filed: 10 Feb 21
Utility
Systems and methods for protecting customer payment data against malware attacks on inline frame payment forms
7 Nov 23
The disclosed computer-implemented method for protecting customer payment data against malware attacks on inline frame payment forms may include (i) detecting a payment form in a payment page on an online merchant website (e.g., by monitoring the website for a user entry of payment information during a customer transaction session or by analyzing, in hypertext markup language associated with an inline frame (iframe), a document object model (DOM)) to identify the payment form, (ii) identifying the iframe on the online merchant website, (iii) determining whether the iframe is associated with a trusted domain utilized for processing the payment information to complete the customer transaction session, and (iv) performing a security action that protects against a potential malware attack by preventing completion of the customer transaction upon determining that the iframe is unassociated with the trusted domain.
Bahaa Naamneh
Filed: 21 Jul 21
Utility
Systems and methods for preventing social engineering attacks using distributed fact checking
7 Nov 23
The disclosed computer-implemented method for preventing social engineering attacks using distributed fact checking may include (i) capturing one or more words or tones received by a party to a communication, (ii) extracting speech features associated with the words or tones to identify one or more alleged facts in the communication, (iii) generating one or more queries to verify the alleged facts in the communication, (iv) determining, utilizing distributed fact checking, whether the alleged facts are true based on the queries, and (v) performing a security action that generates an alert to protect against a potential social engineering attack on the receiving party when at least one of the alleged facts are determined to be false.
David Silva, Johann Roturier, Yun Shen, Pratyush Banerjee
Filed: 8 May 20
Utility
Systems and methods for utilizing user identity notifications to protect against potential privacy attacks on mobile devices
7 Nov 23
The disclosed computer-implemented method for utilizing user identity notifications to protect against potential privacy attacks on mobile devices may include (i) monitoring a mobile computing device to detect one or more user interactions by a current user, (ii) identifying the current user of the mobile computing device, (iii) determining that the current user is a potentially malicious user associated with one or more privacy-invasive applications installed on the mobile computing device, and (iv) performing a security action that protects a benign user of the mobile computing device against an attack initiated by the potentially malicious user associated with the privacy-invasive applications.
Kevin Roundy, Acar Tamersoy, Yufei Han, Anil Sharma, Arif Shaikh
Filed: 19 Mar 21
Utility
Systems and methods for detecting coordinated propagation of social media content
24 Oct 23
A computer-implemented method for detecting coordinated propagation of social media content may include calculating, by a computing device, a content similarity score for each social media post in relation to other social media posts in a set of social media posts.
Daniel Kats
Filed: 30 Oct 20
Utility
Dual network security assessment engine
24 Oct 23
A method of determining the security condition of a network includes executing an agent program on one or more computerized devices coupled to the network.
Alain G. Sauve, Syed Kamran Bilgrami
Filed: 10 Sep 19
Utility
Systems and methods for utilizing federated machine-learning to protect against potentially malicious data
10 Oct 23
The disclosed computer-implemented method for utilizing federated machine-learning to protect against potentially malicious data may include (i) arranging a set of client devices into groups for applying a federated machine-learning model, (ii) determining model updates for each of the groups over a predetermined period, (iii) training one or more recurrent neural networks to derive a low-dimensional representation of the model updates, (iv) calculating a data quality score for each of the client devices based on the model updates, (v) applying the federated machine-learning model to classify data instances on each of the client devices as including clean data or potentially corrupt data, and (vi) performing a security action that protects against the potentially malicious data by tagging the data instances classified as the potentially corrupt data.
Yufei Han, Lella Bilge, Chris Gates
Filed: 31 Mar 20
Utility
Using physiological cues to measure data sensitivity and implement security on a user device
3 Oct 23
Using physiological cues to measure data sensitivity and implement security on a user device.
Saurabh Shintre, Darren Shou
Filed: 5 Mar 19
Utility
Systems and methods for restricting capture of self-portrait images on mobile devices
3 Oct 23
The disclosed computer-implemented method for restricting capture of self-portrait images on mobile devices may include (i) capturing sensor data associated with a surrounding environment, (ii) detecting a user input for taking one or more self-portrait images, determining, based on the sensor data, one or more potential hazards associated with the taking of the self-portrait images within the surrounding environment, and (iv) performing a security action to protect against the potential hazards associated with the taking of the self-portrait images within the surrounding environment.
Muthuramji Vadamalayan, Manojkumar Kumar Sundaram, Mohan Raj Senthilnathan
Filed: 29 Nov 22
Utility
Protecting against a tracking parameter in a web link
3 Oct 23
Protecting against a tracking parameter in a web link.
David Luz Silva, Iskander Sanchez Rola
Filed: 24 Jun 21
Utility
Identifying and removing a tracking capability from an external domain that performs a tracking activity on a host web page
3 Oct 23
Systems and methods for identifying and removing a tracking capability from an external domain that performs a tracking activity on a host web page.
Iskander Sanchez Rola, David Luz Silva, Daniel Marino, Leylya Yumer, Petros Efstathopoulos
Filed: 4 Nov 22
Utility
Content feed delivery system and method
19 Sep 23
A method of providing a content feed.
B{hacek over (r)}etislav {hacek over (S)}opik
Filed: 8 Sep 22
Utility
Systems and methods for preventing potential phishing attacks by translating double-byte character set domain name system records
5 Sep 23
The disclosed computer-implemented method for preventing potential phishing attacks by translating double-byte character set domain name system records may include (i) extracting a domain extension from a double-byte character set (DBCS) domain name in a universal resource locator (URL) received by a computing device, (ii) identifying a locale code associated with a language utilized on the computing device, (iii) determining if the domain extension matches the locale code, (iv) translating the DBCS domain name to a corresponding single byte character set (SBCS) domain name system (DNS) record when the domain extension matches the locale code, and (v) performing a security action that protects against a potential phishing attack based on the translated DBCS domain name.
Somard Kruayatidee, Jonathon Salehpour
Filed: 29 Apr 21
Utility
Systems and methods for encryption in network communication
5 Sep 23
A system, computer-readable storage medium, and method for secure network communication.
Christopher Joseph O'Connell, Barna Csukas, Gabor Miklos, Vitalii Sydorovych, Rui Santos, Michal Hojsík
Filed: 3 Feb 22