237 patents
Page 2 of 12
Utility
Systems and methods for selectively monitoring devices
22 Aug 23
A computer-implemented method for selectively monitoring devices may include (i) identifying a set of characteristics of a device-usage session of a device, (ii) calculating, based on the set of characteristics, a privacy score for the device-usage session, (iii) selecting, for the device, a device monitoring profile that is correlated with the privacy score and that defines an intensity level of monitoring actions to be performed on the device, and (iv) monitoring activity performed on the device during the device-usage session in accordance with the device monitoring profile that is correlated with the privacy score for the device-usage session.
Lei Gu, Chengi Kuo
Filed: 30 Mar 20
Utility
SSL/TLS spoofing using tags
22 Aug 23
A network is secured by managing domain name requests such that client devices are restricted from visiting malicious or undesirable domains.
Gandhi Balasubramaniam
Filed: 30 Dec 19
Utility
Low latency cloud-assisted network security with local cache
22 Aug 23
Latency in a cloud security service provided via a network security device is reduced by receiving in the network security device a new network connection request for a connection between a local network device and a remote server.
Michal Vaner, Ji{hacek over (r)}í Horkÿ
Filed: 30 Dec 20
Utility
Detecting malware by linking background intelligent transfer service (BITS) and scheduled task service (STS) activities to a source program
15 Aug 23
Detecting malware by linking Background Intelligent Transfer Service (BITS) and Scheduled Task Service (STS) activities to a source program.
Andrei Stanciu, Teodor Anton, Alin Enachescu, Robert A. Clyde
Filed: 30 Sep 21
Utility
Network resource privacy negotiation system and method
25 Jul 23
A method for accessing a network resource including detecting an attempt by a user via a computing device to access a service enabled by a computing system via a network and transmitting via the network to the computing system a first request to access the service in response to detecting the attempt by the user to access the service, the first request including at least one empty personally identifiable data structure.
Sadia Afroz, Juyong Do, John Poothokaran
Filed: 16 Mar 20
Utility
Network-shared data managing system and method
18 Jul 23
A data managing method.
John Poothokaran, Juyong Do, Rajarshi Gupta
Filed: 28 Dec 20
Utility
Virtual network function enabled secure communication systems and methods
27 Jun 23
A method for enabling secure communication.
Bin Hu, Rajarshi Gupta
Filed: 28 Sep 20
Utility
Systems and methods for managing digital personas for online services
2 May 23
The disclosed computer-implemented method for managing digital personas for online services may include generating a digital persona and a persona wear indicator (PWI) score for a user of an anonymized inbox with a communication alias to use for an online entity, determining, based on one or more communication messages associated with the communication alias, that the online entity has leaked information associated with the digital persona, recalculating the PWI score for the digital persona based at least in part on the determination that the online entity has leaked the information, determining that the PWI score exceeds a privacy score threshold; and in response to determining that the PWI score exceeds the privacy score threshold, performing a security action that protects privacy of the user.
Kapil Anturkar, SriHarsha Angara
Filed: 26 Mar 20
Utility
Systems and methods for protecting user data privacy against web tracking during browsing sessions
2 May 23
The disclosed computer-implemented method for protecting user data privacy against web tracking during browsing sessions may include (i) detecting a user request, including a private domain, for a website in a web browser address bar during a browsing session, (ii) separating, utilizing a browser container, a user browsing state associated with the private domain from other domains during the browsing session, (iii) routing the user website request to one or more servers in a random order to run the browsing session, (iv) performing a browsing state security action that protects against cross-website tracking by discarding user browsing state data collected during the browsing session, and (v) performing a web isolation security action that protects against use of browser fingerprint data for conducting malicious attacks based on the routing of the user website request to the servers in the random order.
Iskander Sanchez, Matteo DellAmico
Filed: 31 Mar 20
Utility
Systems and methods for protecting search privacy
21 Mar 23
The disclosed computer-implemented method for protecting search privacy may include (i) receiving, via a search interface, a search query comprising at least one search term, (ii) determining a sensitivity level of the search query based on the at least one search term, (iii) directing the search query to a search engine that has a level of privacy correlated with the sensitivity level of the search query, and (iv) returning, via the search interface, at least one result of directing the search query to the search engine that has the level of privacy correlated with the sensitivity level of the search query.
Susanta Nanda, Kevin Roundy, Ashwin Kayyoor
Filed: 31 Mar 20
Utility
Systems and methods for authenticating application points of entry to prevent unauthorized use of locked mobile applications
14 Mar 23
The disclosed computer-implemented method for authenticating application points of entry to prevent unauthorized use of locked mobile applications may include (i) identifying one or more mobile applications having an access restriction and a group of application entry points associated with at least one mobile application function, (ii) intercepting a series of device inputs from a user for accessing the application entry points to bypass the access restriction for the mobile applications, (iii) requesting authentication credentials to bypass the access restriction from the application entry points, (iv) determining that the requested authentication credentials are invalid, and (v) performing a security action that protects against potentially malicious activity associated with unauthorized access to the mobile applications upon determining that the requested authentication credentials are invalid.
Sharad Mhaske, Anand Darak
Filed: 4 Dec 20
Utility
Systems and methods for protecting against misleading clicks on websites
28 Feb 23
The disclosed computer-implemented method for protecting against misleading clicks on websites may include (i) detecting a user click event on a uniform resource locator (URL) for navigating to a website during a web browsing session, (ii) analyzing the user click event to identify expected domain behavior associated with navigating to the website based on the URL, (iii) determining, based on the analysis, that the user click event deviates from the expected domain behavior associated with navigating to the website based on the URL, and (iv) performing a security action that protects against potentially malicious activity caused by the user click event deviating from the expected domain behavior associated with navigating to the website based on the URL.
Iskander Sanchez, David Silva
Filed: 12 Aug 20
Utility
Systems and methods for detecting inter-personal attack applications
17 Jan 23
The disclosed computer-implemented method for detecting inter-personal attack applications may include (i) receiving application marketplace information describing application feature information, (ii) creating, by performing natural language processing on the feature information, a feature vector identifying a potentially malicious functionality of the application, (iii) creating a profiling vector that is a categorical feature representation of installation information from an application installation file, and (iv) performing a security action including (A) mapping, using a machine learning model, the feature vector and the profiling vector to a multi-dimensional output vector having element corresponding to a malware category and (B) determining a malicious extent of the application by combining the categories identified by the multi-dimensional output vector with bi-partite graph information identifying (I) relations between a plurality of applications and (II) relations between a plurality of computing devices hosting the plurality of applications.
Yufei Han, Kevin Roundy, Acar Tamersoy
Filed: 23 Jun 20
Utility
Systems and methods for proactive call spam/scam protection using network extensions
27 Dec 22
The disclosed computer-implemented method for proactive call spam/scam protection may include intercepting network traffic by the at least one processor employing a network extension feature of an operating system of a computing device.
Anand Darak, Sharad Mhaske
Filed: 9 Nov 20
Utility
Protecting personally identifiable information submitted through a browser
8 Nov 22
Protecting PII submitted through a browser.
SriHarsha Angara, Venkadesan Marimuthu, Aditya Subhash Sumant, Arun Ganesan, Mahesh Kamsala, Rahuraman Kaliyaperumal, A.Ramachandra Reddy
Filed: 21 May 20
Utility
Systems and methods for identifying and mitigating phishing attacks
8 Nov 22
The disclosed computer-implemented method for identifying and mitigating phishing attacks may include (i) receiving a request for sensitive data utilized to access a network service, (ii) launching an autofill provider for providing the sensitive data to the network service, (iii) identifying, utilizing the autofill provider, a domain for the network service and a data type associated with the sensitive data utilized to access the network service, (iv) determining, utilizing the autofill provider, a reputation for the network service based on the domain and the data type, and (v) performing a security action that protects against a phishing attack based on the reputation determined for the network service.
Xi Guo, Mrinal Khanvilkar, Darshini Rathod, Jiejie Wang
Filed: 4 Sep 19
Utility
Systems and methods for authenticating digital media content
11 Oct 22
The disclosed computer-implemented method for authenticating digital media content may include (i) receiving digital media content that has been captured by a capturing device and digitally signed through a cryptoprocessor embedded within the capturing device to provide an assurance of authenticity regarding how the capturing device captured the digital media content, and (ii) encoding an identifier of the received digital media content and a digital signature to an encrypted distributed ledger, the digital signature including at least one of a digital signature of the digital media content by the capturing device or a digital signature of the digital media content by an entity encoding the received digital media content such that the encoding becomes available for subsequent verification through the encrypted distributed ledger.
Daniel Kats, Christopher Gates, Acar Tamersoy, Daniel Marino
Filed: 21 Mar 19
Utility
Systems and methods for identifying security risks posed by application bundles
4 Oct 22
The disclosed computer-implemented method for identifying security risks posed by application bundles may include (i) intercepting, using a VPN client of the computing device, network traffic of the computing device, wherein an operating system of the computing device restricts applications into a sandboxed environment, (ii) storing, on the computing device, a copy of at least a portion of the network traffic of the computing device within a sandbox associated with the VPN client, (iii) identifying, by analyzing the copy of the network traffic, an application bundle within the network traffic, (iv) determining, by analyzing the application bundle in the sandbox associated with the VPN client, that the application bundle poses a security risk, and (v) in response to determining that the application bundle poses a security risk, performing a security action to remedy the security risk.
Ben Phung, Movses Margaryan, Joshua Opos
Filed: 20 Dec 19
Utility
Systems and methods for providing web tracking transparency to protect user data privacy
20 Sep 22
The disclosed computer-implemented method for providing web tracking transparency to protect user data privacy may include (i) receiving a browser request for target websites during a browsing session, (ii) identifying a tracking type for website trackers utilized by the target websites, the tracking type including a direct tracking type or a tracking sharing type, (iii) extracting an information category for the target websites, (iv) detecting text patterns shared between the target websites in a common information category, (v) determining information collected about a user by the website trackers by combining the tracking type for the website trackers, the information category for the target websites, and the detected text patterns, and (v) performing a security action that protects against unsolicited website tracking in future browsing sessions by providing the information collected by the website trackers to the user.
Iskander Sanchez Rola, Leyla Bilge, Pierre-Antoine Vervier, David Luz Silva
Filed: 15 Jun 20
Utility
Systems and methods for protecting against password attacks by concealing the use of honeywords in password files
6 Sep 22
The disclosed computer-implemented method for protecting against password attacks by concealing the use of honeywords in password files may include (i) receiving a login request comprising a candidate password for a user, (ii) authenticating the login request by determining whether a hash of a true password for the user stored in a honeyserver matches a hash of the candidate password, (iii) determining whether the candidate password has matches a hash of a honeyword stored in a password file when the true password hash fails to match the candidate password hash, (iv) classifying the password file as being potentially compromised when the candidate password hash matches the honeyword hash stored in the password file, and (v) performing a security action that protects against a password attack utilizing the potentially compromised password file.
Matteo Dell'Amico
Filed: 18 Dec 19