237 patents
Page 4 of 12
Utility
Systems and methods for restoring applications
29 Mar 22
The disclosed computer-implemented method for restoring applications may include (i) detecting an indication to restore a previous version of an application installed within a mobile operating system environment, (ii) retrieving the previous version of the application from a protected location within the mobile operating system environment where a sandboxing security component stored the previous version of the application, and (iii) executing the previous version of the application within a security sandbox managed by the sandboxing security component.
Jonathon Salehpour, Radoslav Stanev, Somard Kruayatidee
Filed: 29 Mar 19
Utility
Systems and methods for managing connections
22 Mar 22
The disclosed computer-implemented method for managing connections may include (i) detecting, by a security agent on an endpoint, an attempt by another application on the endpoint to establish a connection according to a specific Internet protocol, and (ii) injecting, by the security agent on the endpoint, into an options field within a header of a network packet within the connection, the header formatted according to the specific Internet protocol, at least one byte that reveals identifying information about the application to enable an in-line proxy security device to manage the connection according to the revealed identifying information.
Qing Li
Filed: 2 Mar 21
Utility
Management and protection of internet of things devices
22 Mar 22
A method to manage Internet of Things (IoT) devices is described.
Susanta K Nanda, Yuqiong Sun
Filed: 27 Feb 18
Utility
Systems and methods for detecting anomalous system command line data
15 Mar 22
The disclosed computer-implemented method for detecting anomalous system command line data may include (i) receiving command line data from a target computing system, (ii) building a baseline model that utilizes machine-learning to analyze the command line data, the baseline model comprising a support-vector machine (SVM), natural language processing, and a hashing function, (iii) assigning, utilizing the baseline model, a score to each of a plurality of instances of the command line data, and (iv) identifying, based on the score, anomalous commands comprising potentially malicious data when any of the instances of the command line data fails to exceed a threshold.
Lamine Aouad, Slawomir Grzonkowski
Filed: 31 Mar 19
Utility
Systems and methods for protecting users from security threats
22 Feb 22
The disclosed computer-implemented method for protecting users from security threats may include (i) receiving a photograph of a target that a user is attempting to acquire, (ii) extracting, from the photograph, an identifier of the target, (iii) applying the identifier of the target to a software security policy that indicates whether the target is safe for the user, and (iv) releasing locked resources to enable the user to acquire the target based on a determination that the software security policy indicates that the target is safe for the user.
Santhana Krishnan K. C.
Filed: 11 Aug 20
Utility
Systems and methods for customizing security alert reports
8 Feb 22
The disclosed computer-implemented method for customizing security alert reports may include (i) identifying a local machine learning model that predicts how a client responds to security alerts generated for the client, (ii) identifying a set of peer machine learning models that predict how a set of peers of the client each responds to security alerts generated for each respective peer, (iii) measuring a level of similarity between the client and each respective peer of the set of peers according to a similarity metric to create a similarity model, (iv) aggregating the local machine learning model and at least one of the set of peer machine learning models based on the similarity model to create an aggregated machine learning model, and (v) protecting the client by applying the aggregated machine learning model to customize an electronically displayed security alert report.
Daniel Kats, Kevin Roundy
Filed: 4 Apr 18
Utility
Controlling access to a computing device with a wireless device using wireless signal strength measurements
8 Feb 22
A method for controlling access to a computing device includes detecting one or more wireless devices configured as wireless access points.
Vlad Mihai Buliga, Alexandru Cosmin Vlajoaga, Raluca Iulia Stanciu, Robert A. Clyde
Filed: 24 Apr 19
Utility
Systems and methods for protecting users
25 Jan 22
The disclosed computer-implemented method for protecting users may include (i) identifying a first light-and-radio frequency signature that was captured by a security device based on signals emanating from a mobile computing device at a first time and location, (ii) identifying a second light-and-radio frequency signature that was captured by a same or different security device based on signals emanating from the same mobile computing device at a second time and location, (iii) determining that the first light-and-radio frequency signature and the second light-and-radio frequency signature match such that an inference is made that an individual possessing the mobile computing device was present at both the first time and location and the second time and location, and (iv) performing, based on the inference, a security action to protect a user.
Qing Li, Brian Varner, Stanley Kiefer, Daniel Kats, Yun Shen, David Silva
Filed: 18 Mar 21
Utility
Systems and methods for verifying decentralized federated data using influence evaluation
18 Jan 22
The disclosed computer-implemented method for verifying decentralized federated data using influence evaluation may include (i) calculate an influence score for each of a group of data instances, (ii) rank the data instances based on the influence scores, (iii) determine an anomaly score for each of the ranked data instances, (iv) select the ranked data instances with the highest anomaly scores as containing potentially malicious data, and (v) perform a security action that protects against the potentially malicious data.
Christopher Gates, Yufei Han
Filed: 29 Mar 19
Utility
Systems and methods for password breach monitoring and notification
11 Jan 22
The disclosed computer-implemented method for password breach monitoring and notification may include (i) detecting a set of authentication credentials for a user, (ii) generating a one-way hash for a password associated with the authentication credentials, (iii) selecting a hash prefix including a subset of data in the hash, (iv) sending the hash prefix to a backend service for matching with a set of hash suffixes associated with known compromised passwords, (v) determining that a breach has occurred based on the password associated with the authentication credentials being compromised when the hash prefix matches a hash suffix in the set of hash suffixes, and (vi) performing a security action that protects against an additional breach associated with the compromised password.
SriHarsha Angara, Adam Stiles, Mahesh Kamsala
Filed: 23 Dec 19
Utility
Employing beacon messages to restart an application on a mobile device
4 Jan 22
Employing beacon messages to restart an application on a mobile device.
Lei Gu, Sharad Subhash Mhaske
Filed: 18 May 20
Utility
Systems and methods for automatically recovering from malware attacks
4 Jan 22
The disclosed computer-implemented methods for automatically recovering from malware attacks may include (1) saving, in response to determining that a reputation of a process is unknown, a backup copy of a file on a remote storage device prior to allowing the process to modify the file; (2) determining, after the process has modified the file, that the process is potentially malicious; and (3) restoring, in response to determining that the process is potentially malicious, the backup copy of the file from the remote storage device.
Lei Gu, Ilya Sokolov
Filed: 13 Sep 17
Utility
Systems and methods for selectively encrypting controlled information for viewing by an augmented reality device
4 Jan 22
The disclosed computer-implemented method for selectively encrypting controlled information for viewing by an augmented reality device may include (i) automatically identifying, at a computing device and using at least one of natural language processing and/or a pre-defined data loss prevention policy, a portion of a source text including controlled information, (ii) tokenizing the portion of the source text, and (iii) performing a security action that may include (A) generating a public key, (B) encrypting the tokenized portion of the source text with the public key to produce an encrypted marker, and (C) replacing the portion of the source text with the encrypted marker to produce a replacement document.
David Silva, Johann Roturier, Pratyush Banerjee
Filed: 24 Jun 19
Utility
Systems and methods for training malware classifiers
28 Dec 21
The disclosed computer-implemented method for training malware classifiers may include (1) perturbing, at a computing device, a binary file in a manner that maintains functionality of the binary file, (2) classifying the perturbed binary file with a first machine learning classifier to produce a classification result, (3) producing a transformed file by repeating the perturbing and classifying steps until the transformed file becomes misclassified, and (4) performing a security action comprising training a second machine learning classifier with the transformed file and an associated correct classification result.
Mahmood Sharif, Saurabh Shintre, Kevin Roundy, Sandeep Bhatkar
Filed: 25 Sep 18
Utility
Systems and methods for identifying privacy leakage information
21 Dec 21
The disclosed computer-implemented method for identifying privacy leakage information may include (1) identifying, at the computing device, at least one informative word in a digital text and (2) performing a security action that identifies privacy leakage information, where the security action includes (A) determining, for at least one identified informative word, a type of privacy leakage and a respective confidence score indicating a probability the identified informative word causes the type of privacy leakage, (B) determining, using the respective confidence score, a combined confidence score for each respective element within a level of detail to display, and (C) displaying, on a display device, the combined confidence score for each respective element within the level of detail to display.
Ashwin Kayyoor, Petros Efstathopoulos
Filed: 20 Dec 18
Utility
User-based cyber risk communications using personalized notifications
7 Dec 21
Methods and systems are provided for monitoring private information exposure.
Johann Roturier, Petros Efstathopoulos
Filed: 18 Dec 18
Utility
Adaptive security filtering on a client device
30 Nov 21
Adaptive security filtering on a client device.
Daniel Marino, Daniel Kats, Brian Schlatter
Filed: 7 Mar 19
Utility
Systems and methods for performing load balancing and distributed high-availability
30 Nov 21
The disclosed computer-implemented method for performing load balancing and distributed high-availability may include (i) detecting through a group communication channel that links all nodes of a computing cluster that an overburdened node of the computing cluster has fallen below a predefined performance level, (ii) determining to transfer a specific microservice transaction from the overburdened node to a helper node in the computing cluster, (iii) copying data for the specific microservice transaction from a portion of a central data store that is reserved for the overburdened node to another data store that is reserved for the helper node, and (iv) completing, by the helper node, the specific microservice transaction by referencing the copied data for the specific microservice transaction in the data store that is reserved for the helper node.
Qing Li
Filed: 2 Mar 21
Utility
Privacy preserving secure task automation
23 Nov 21
Privacy preserving secure task automation.
Sandeep Bhatkar, Susanta K. Nanda, Yuqiong Sun, Saurabh Shintre
Filed: 28 Sep 18
Utility
Systems and methods for crowd-storing encrypiion keys
23 Nov 21
The disclosed computer-implemented method for crowd-storing encryption keys may include (i) sending, from a client computing device and to a server, a recovery request, (ii) creating a first public-private key pair, (iii) receiving a plurality of encrypted shares of an encryption key from the server in response to the recovery request, where the encrypted shares are encrypted with a first public key of the first public-private key pair, and (iv) performing a security action including (A) decrypting the plurality of encrypted shares of the encryption key with a first private key of the first public-private key pair and (B) recovering the encryption key from the decrypted plurality of shares of the encryption key.
Ilya Sokolov, Lei Gu, Daniel Kats
Filed: 24 Dec 18