SYSTEMS AND METHODS FOR DEOBFUSCATION OF EXECUTABLE CODE
Granted: May 4, 2023
Application Number:
20230133651
Systems, devices, and methods are discussed that provide for discovering protected data from a code. Such detection provides an ability to discover potentially malicious code and/or datasets obfuscated within a code prior to full execution of the code.
SYSTEMS AND METHODS FOR UNPACKING PROTECTED DATA FROM OBFUSCATED CODE
Granted: May 4, 2023
Application Number:
20230140432
Systems, devices, and methods are discussed that provide for discovering protected data from a code. Such detection provides an ability to discover potentially malicious code and/or datasets obfuscated within a code prior to full execution of the code.
SYSTEMS AND METHODS FOR PREPARING CODE FOR MALICIOUS BEHAVIOR ANALYSIS
Granted: May 4, 2023
Application Number:
20230137942
Systems, devices, and methods are discussed that provide for discovering protected data from a code. Such detection provides an ability to discover potentially malicious code and/or datasets obfuscated within a code prior to full execution of the code.
SYSTEMS AND METHODS FOR DEOBFUSCATION OF EXECUTABLE CODE
Granted: May 4, 2023
Application Number:
20230133651
Systems, devices, and methods are discussed that provide for discovering protected data from a code. Such detection provides an ability to discover potentially malicious code and/or datasets obfuscated within a code prior to full execution of the code.
PTIVE RESOURCE PROVISIONING FOR A MULTI-TENANT DISTRIBUTED EVENT DATA STORE
Granted: April 20, 2023
Application Number:
20230124404
Systems and methods for adaptively provisioning a distributed event data store of a multi-tenant architecture are provided. According to one embodiment, a managed security service provider (MSSP) maintains a distributed event data store on behalf of each tenant of the MSSP. For each tenant, the MSSP periodically determines a provisioning status for a current active partition of the distributed event data store of the tenant. Further, when the determining indicates an under-provisioning…
SYSTEMS AND METHODS FOR PROCESSING MULTIPLE IP PACKET TYPES IN A NETWORK ENVIRONMENT
Granted: April 6, 2023
Application Number:
20230105602
Systems, devices, and methods are discussed for receiving a first packet type and outputting a second packet type based upon knowledge of a source device and a recipient device.
SECURE LINK AGGREGATION
Granted: March 30, 2023
Application Number:
20230099263
Systems and methods are for securing link aggregation are provided. According to an embodiment, a network device in a secure domain discovers device information associated with a peer network device in an untrusted domain that is connected through a first link directly connecting a first interface of the network device to a first interface of the peer network device, and authenticates the peer while allowing at least some network traffic to continue to be transmitted through the first…
Systems and Methods for Incorporating Passive Wireless Monitoring With Video Surveillance
Granted: March 23, 2023
Application Number:
20230087497
Various embodiments provide systems and methods for surveillance using a combination of video image capture and passive wireless detection.
SYSTEMS AND METHODS FOR RAPID NATURAL LANGUAGE BASED MESSAGE CATEGORIZATION
Granted: March 2, 2023
Application Number:
20230063871
Systems, devices, and methods are disclosed in relation to a system for natural language based message categorization designed to identify text from a particular topic from a potentially inexhaustible set of potential topics. In one of many possible implementations, a vector space model is first used to translate text into a vector representation. This vector is used to determine if the text can be recreated by swapping words and phrases from a training corpus of documents. This is done…
Systems and Methods for Automated Risk-Based Network Security Focus
Granted: March 2, 2023
Application Number:
20230069738
Systems, devices, and methods are discussed for automatically determining a risk-based focus in determining zero trust network access policy on one or more network elements.
SYSTEMS AND METHODS FOR INTERNAL SECURE NETWORK RESOLUTION
Granted: March 2, 2023
Application Number:
20230060895
Systems, devices, and methods are discussed for limiting exposure of internal network operations beyond the boundary of a secure network.
SYSTEMS AND METHODS FOR QUANTIFYING FILE ACCESS RISK EXPOSURE BY AN ENDPOINT IN A NETWORK ENVIRONMENT
Granted: February 23, 2023
Application Number:
20230058569
Systems, devices, and methods are discussed for identifying possible improper file accesses by an endpoint device. In some cases an agent is placed on each system to be surveilled that records the absolute paths for each file accessed for each user. This information may be accumulated and sent to a central server or computer for analysis of all such file accesses on a user basis. In some cases, a file access tree is created, and in some implementations be pruned of branches and leaves if…
SYSTEMS AND METHODS FOR GENERATING SYNTHETIC DATA REPRESENTING INSIDER ATTACKS
Granted: February 23, 2023
Application Number:
20230058516
Systems, methods, devices, and apparatus are discussed for generating data that appears to be an insider attack.
SYSTEMS AND METHODS FOR ENABLING DETECTION OF THREATS BASED UPON COLOR
Granted: February 23, 2023
Application Number:
20230057125
Systems, devices, and methods are disclosed for encoding behavioral information into an image format to facilitate image based behavioral identification.
SYSTEMS AND METHODS FOR TRAINING AN INSIDER ATTACK MODEL USING IMAGES HAVING BOTH REGION SPECIFICITY AND SPATIAL RELATIONSHIPS
Granted: February 23, 2023
Application Number:
20230054138
Systems, devices, and methods are disclosed that may be used for identifying potential insider attacks on a computer network.
SYSTEMS AND METHODS FOR USING VECTOR MODEL NORMAL EXCLUSION IN NATURAL LANGUAGE PROCESSING TO CHARACTERIZE A CATEGORY OF MESSAGES
Granted: February 23, 2023
Application Number:
20230053996
Systems, devices, and methods are disclosed in relation to a vector space model that may be used to characterize a category of messages. In one of many possible implementations, the frequency of words found within a piece of text is determined. These frequencies are compared against the frequencies of words within a given corpus like the Oxford English Corpus by first converting the frequencies to probabilities via the inverse cumulative distribution function assuming a normal…
SYSTEMS AND METHODS FOR ENCODING BEHAVIORAL INFORMATION INTO AN IMAGE DOMAIN FOR PROCESSING
Granted: February 23, 2023
Application Number:
20230053642
Systems, devices, and methods are disclosed for encoding behavioral information into an image format to facilitate image based behavioral identification.
Systems and Methods for Hierarchical Facial Image Clustering
Granted: February 16, 2023
Application Number:
20230048648
Various systems and methods for for clustering facial images in, for example, surveillance systems.
Systems and Methods for Hierarchical Facial Image Clustering
Granted: February 16, 2023
Application Number:
20230048648
Various systems and methods for for clustering facial images in, for example, surveillance systems.
Systems and Methods for Hierarchical Facial Image Clustering
Granted: February 16, 2023
Application Number:
20230048648
Various systems and methods for for clustering facial images in, for example, surveillance systems.