237 patents
Page 3 of 12
Utility
Systems and methods for protecting user privacy
6 Sep 22
The disclosed computer-implemented method for protecting user privacy may include (i) detecting that a website indicates a user account identifier, (ii) detecting whether a third-party script has access to the user account identifier, and (iii) performing, based at least in part on detecting that the third-party script has access to the user account identifier, a security action to protect user privacy such that the security action facilitates an attempt to prevent the third-party script from actually accessing the user account identifier.
Iskander Sanchez
Filed: 23 Oct 20
Utility
Systems and methods for increasing cybersecurity protection
6 Sep 22
The disclosed computer-implemented method for increasing cybersecurity protection may include (i) receiving, at a subscription-management computing device, an alert indication that indicates (A) a cybersecurity status score on a protected computing device is lower than a threshold value and (B) the protected computing device is associated with an expired subscription to a cybersecurity service and (ii) performing, responsive to receiving the alert indication, a security action comprising sending, from the subscription-management computing device to a server, a transfer instruction directing the server to transfer, to the protected computing device, at least a portion of a duration of a valid subscription to the cybersecurity service.
Sharad Mhaske
Filed: 27 Feb 19
Utility
Facilitating third party utilization of personal computing resources in exchange for software usage
6 Sep 22
A method for facilitating utilization of processing resources of a plurality of user electronic devices for mining of cryptocurrency.
Andrei Stanciu, Daniel Nicola, Teodor Anton, Robert A. Clyde
Filed: 25 Jun 18
Utility
Systems and methods for protecting users
23 Aug 22
The disclosed computer-implemented method for protecting users may include (i) detecting, by a privacy-protecting security application, an attempt by a user to upload an item of media content, (ii) determining, by the privacy-protecting security application, that the item of media content matches a true identity signature for the user that the privacy-protecting security application generated based on other items of media content relating to the user, and (iii) prompting, by the privacy-protecting security application in response to determining that the item of media content matches the true identity signature, the user to perform a privacy-protecting security action to prevent exposing a true identity for the user.
Anant Mahajan, SriHarsha Angara
Filed: 30 Jul 19
Utility
Secure computer peripheral devices
2 Aug 22
A method for improving security of peripheral devices is described.
Chengi Jimmy Kuo, Haik Mesropian, Petrus Johannes Viljoen, David Kane
Filed: 19 Mar 19
Utility
Routing server communications through a nearby mobile device
2 Aug 22
Routing server communications through a nearby mobile device.
Anand Darak, Sharad Subhash Mhaske
Filed: 18 May 20
Utility
Systems and methods for adaptively managing data drift in a classifier
19 Jul 22
The disclosed computer-implemented method for adaptively managing data drift in a classifier may include (i) receiving, at a computing device, an input sample of digital information having an unknown reputation and (ii) performing a security action that may include (A) identifying the input sample as benign or malicious based on a result obtained by classifying the input sample using a machine learning model trained using activity regularization, (B) calculating an internal activity of the machine learning model occurring during the classifying, (C) calculating an activation entropy of the machine learning model occurring during the classifying, (D) comparing a combination of the internal activity and the activation entropy to a threshold, and (E) when the combination of the internal activity and the activation entropy meets or exceeds the threshold, identifying the result as a low-confidence result.
Keith Kenemer, Javier Echauz, Sarfaraz Hussein
Filed: 10 Sep 19
Utility
Systems and methods for hindering malicious computing actions
19 Jul 22
The disclosed computer-implemented method for hindering malicious computing actions may include (i) identifying an attempt by an agent to perform an action on a computing resource that is vulnerable to attempted actions performed by unauthorized agents, (ii) requesting from the agent, in response to identifying the attempt to perform the action on the computing resource, a payment to an owner of the computing resource equal to a monetary value assigned to performing the action on the computing resource, (iii) receiving, by the owner of the computing resource, the payment of the monetary value from the agent, and (iv) allowing, in response to receiving the payment of the monetary value from the agent, the attempt by the agent to perform the action on the computing resource.
Efrain Ortiz
Filed: 27 Dec 17
Utility
Systems and methods for detecting malicious in application transactions
12 Jul 22
The disclosed computer-implemented method for detecting malicious in-application transactions may include identifying an application running on a computing device, wherein the application is granted access to a payment system, monitoring data between the application and the payment system, determining at least one characteristic associated with the application, determining the at least one characteristic is associated with a malicious transaction on the payment system, and performing at least one action to prevent the malicious transaction.
Josh Opos
Filed: 20 Jun 19
Utility
Optimizing networks of decision nodes
5 Jul 22
A method for optimizing network decision nodes is described.
Daniel Marino
Filed: 13 Jul 17
Utility
Analyzing and mitigating website privacy issues by automatically classifying cookies
5 Jul 22
Analyzing and mitigating website privacy issues by automatically classifying cookies.
Iskander Sanchez, Leylya Yumer
Filed: 12 Dec 19
Utility
Systems and methods to mitigate stalkerware by rendering it useless
21 Jun 22
The disclosed computer-implemented method for mitigating stalkerware by rendering it useless is performed, at least in part, by a computing device comprising at least one processor.
Anubhav Savant, Arif Mohammed Shaikh
Filed: 20 Dec 19
Utility
Identifying and protecting against a computer security threat while preserving privacy of individual client devices using differential privacy for text documents
14 Jun 22
Identifying and protecting against a computer security threat while preserving privacy of individual client devices using differential privacy for text documents.
Geoffrey So, Melanie Beck, Jasjeet Dhaliwal, Andrew B. Gardner, Aleatha Parker-Wood
Filed: 18 Dec 18
Utility
Systems and methods for detecting potentially malicious content in decentralized machine-learning model updates
14 Jun 22
The disclosed computer-implemented method for detecting potentially malicious content in decentralized machine-learning model updates may include (i) receiving messages communicated within a group of client devices for performing an update of a shared machine-learning model, (ii) determining a bias of a target message in the messages communicated from a target client device in the group with respect to a remaining number of the messages in the messages communicated from the other client devices in the group, (iii) assigning a confidence score to each of the other client devices based on the bias determined for the target message, the confidence score representing a likelihood of potentially malicious content in the target message, and (iv) performing, based on the confidence score, a security action that prevents the potentially malicious content from compromising the update of the shared machine-learning model.
Christopher Gates, Yufei Han
Filed: 28 Mar 19
Utility
Analyzing and mitigating privacy issues on a computing device using cookie generation flows
7 Jun 22
Analyzing and mitigating privacy issues on a computing device using cookie generation flows.
Iskander Sanchez, Leylya Yumer
Filed: 21 Jun 19
Utility
Realtime financial transaction approval
24 May 22
A method for approving financial transactions is described.
Radoslav Stanev
Filed: 28 Mar 19
Utility
Employing SNI hostname extraction to populate a reverse DNS listing to protect against potentially malicious domains
17 May 22
Server Name Indication (SNI) hostname extraction to populate a reverse Domain Name System (DNS) listing to protect against potentially malicious domains.
Bruce McCorkendale
Filed: 7 May 20
Utility
Systems and methods for securing communications
3 May 22
The disclosed computer-implemented method for securing communications may include (i) establishing an overlay network within a publicly available on-demand cloud computing platform, the overlay network enabling secure communications between devices by maintaining within the overlay network a services mapping table that defines access rights to at least one of shared data or services, and (ii) transferring data, by the overlay network acting as an intermediary, from a first device that has securely connected to the overlay network to a second device that has securely connected to the overlay network, in accordance with the access rights defined in the services mapping table.
Qing Li
Filed: 30 Jan 19
Utility
Systems and methods for protecting users
26 Apr 22
The disclosed computer-implemented method for protecting users may include (i) intercepting, through a cloud-based security proxy service, network traffic originating from a mobile application at a mobile device connected to a local area network protected by the cloud-based security proxy service, (ii) detecting, by the cloud-based security proxy service, a threat indicator indicated by the mobile application, and (iii) modifying the network traffic originating from the mobile application at the mobile device by applying, by the cloud-based security proxy service based on detecting the threat indicator indicated by the mobile application, a security policy to protect the local area network from a candidate threat corresponding to the threat indicator.
Qing Li, Samir Kapuria, Wenjing Wang, Howard Chen
Filed: 12 Aug 19
Utility
Identifying and protecting against surveillance apps installed on client devices
5 Apr 22
Identifying and protecting against malicious apps installed on client devices.
Kevin Alejandro Roundy, Acar Tamersoy
Filed: 26 Feb 19