Systems and methods for detecting suspicious microcontroller messages
Granted: January 29, 2019
Patent Number:
10193903
The disclosed computer-implemented method for detecting suspicious microcontroller messages may include (1) observing a typical interval at which messages are sent over a network by a microcontroller, (2) identifying a message sent over the network by the microcontroller, (3) determining that the interval between the message and the previous message sent by the microcontroller does not comprise the typical interval, and (4) categorizing the message as a suspicious message in response to…
Electronic communication impersonation detection
Granted: January 29, 2019
Patent Number:
10193899
Methods, apparatuses, and systems relating to narrow beam communications and wireless networking are disclosed. Exemplary methods for wireless networking and communications may include identifying a geographic area, receiving topography data related to the geographic area, analyzing the topography data, identifying a first line of sight path related to a first access point location and one or more customer premises device locations based at least in part on the analyzing, and identifying…
Systems and methods for registering user accounts with multi-factor authentication schemes used by online services
Granted: January 29, 2019
Patent Number:
10193880
The disclosed computer-implemented method for registering user accounts with multi-factor authentication schemes used by online services may include (1) determining that a user is associated with an account with an online service that allows the user to register the account with an MFA scheme that requests the user to complete multiple authentication steps before being allowed to access the account, (2) identifying, based on an analysis of the online service, at least a portion of the…
Technique for data loss prevention through clipboard operations
Granted: January 29, 2019
Patent Number:
10192074
Techniques describe preventing sensitive data from being misappropriated during a clipboard operation. A copy operation for data being copied to a clipboard is intercepted. Information describing a first application from which the data was copied is retrieved. The data and the information are stored into the clipboard. A paste operation is evaluated based on the data, and the information is evaluated against a policy to determine whether the paste operation should be blocked.
Method for integrating applications
Granted: January 29, 2019
Patent Number:
10192071
In certain embodiments, a method includes mapping, by a first application, personally identifiable information to an anonymous identification, generating, by the first application, a key, and sending, by a first appliance, the anonymous identification and the key to a second appliance, wherein the first appliance comprises the first application. The method also includes receiving, by the first appliance and from a browser, a token generated by a second application of the second…
System and method for determining an aggregate threat score
Granted: January 29, 2019
Patent Number:
10192058
According to one embodiment, a computer-implemented method comprises determining a first threat score and a second threat score respectively corresponding to a first user action and a second user action on one or more computer applications and calculating an aggregate threat score for the determined threat scores. Calculating the aggregate threat score comprises summing together the first threat score and a contribution of the second threat score, wherein the contribution of the second…
Systems and methods for authenticating whole disk encryption systems
Granted: January 29, 2019
Patent Number:
10192056
A computer-implemented method for authenticating whole disk encryption systems may include (i) detecting, by a computing device, an attempt to initiate a boot process on the computing device, (ii) verifying, by the computing device, an initial decryption key, (iii) decrypting, by the computing device, an initial set of software required to boot crucial functions of the computing device using the initial decryption key, (iv) detecting, by the computing device, a secondary device running…
Systems and methods for managing data loss prevention policies for applications
Granted: January 29, 2019
Patent Number:
10191908
A method for managing data loss prevention policies for applications may include 1) maintaining, in at least one database, a categorization of at least one application as either a business application or a personal application, 2) assigning, in the database, a data loss prevention policy to the application based on the categorization of the application in the database as either a business application or a personal application, 3) detecting that the application is attempting to access…
Behavioral classification of network data flows
Granted: January 22, 2019
Patent Number:
10187353
Methods, apparatuses and systems facilitating enhanced classification of network traffic based on observed flow-based and/or host-based behaviors.
Systems and methods for sending push notifications that include preferred data center routing information
Granted: January 22, 2019
Patent Number:
10187485
The disclosed computer-implemented method for sending push notifications that include preferred data center routing information may include (1) configuring at least one rule for determining which data center out of a plurality of data centers is preferred to serve one or more download requests, (2) identifying a push notification that is configured to prompt a device to download data from a data center within the plurality of data centers, (3) using the rule to select, from the plurality…
Methods to impede common file/process hiding techniques
Granted: January 22, 2019
Patent Number:
10185838
A processor-based method to defeat file and process hiding techniques in a computing device is provided. The method includes generating one of a path permutation, a symlink, or an address, for a path to open or obtain status of a tool or function in a library in a mobile computing device and making an open or status call for the tool or function, using the one of the path permutation, symlink or address. The method includes avoiding a pattern match and blocking, by an injected library,…
Systems and methods for automatically making selections in user interfaces
Granted: January 22, 2019
Patent Number:
10185480
The disclosed computer-implemented method for automatically making selections in user interfaces may include (1) detecting, on a computing device, a user interface that comprises a prompt for a user of the computing device to select between a first option and a second option, (2) identifying a profile for making, on behalf of the user, a predetermined selection of one of the first option and the second option, (3) determining that the predetermined selection indicates that the first…
Techniques for presenting information on a graphical user interface
Granted: January 22, 2019
Patent Number:
10185465
Techniques for presenting information on a graphical user interface are disclosed. In one embodiment, the techniques may be realized as a method for presenting information on a graphical user interface including displaying an endpoint interface via the graphical user interface on a display unit, determining whether an event mode for the endpoint interface has been selected, displaying the endpoint interface in the event mode when the event mode has been selected, determining whether an…
Prioritizing the scanning of messages using the reputation of the message destinations
Granted: January 15, 2019
Patent Number:
10182064
Methods, computer program products, computer systems, and the like, which protect messages in an electronic messaging system, are disclosed. The methods, computer program products, computer systems, and the like include detecting an occurrence of an event, and, in response to the detecting the occurrence of the event, scanning a message. The occurrence of the event indicates that the message should be scanned. The message includes recipient information, which identifies a recipient of…
Systems and methods for automatically populating one-time-password input fields
Granted: January 15, 2019
Patent Number:
10182048
The disclosed computer-implemented method for automatically populating one-time-password input fields may include (1) detecting, at a first computing device of a user, an input field that requires a one-time password that is included in a message that is sent by a one-time-password provider to a second computing device of the user, (2) identifying, at the second computing device, the message that includes the one-time password, (3) transmitting the one-time password from the second…
Systems and methods for providing computing security by classifying organizations
Granted: January 15, 2019
Patent Number:
10181039
The disclosed computer-implemented method for providing computing security by classifying organizations may include (1) identifying a request to classify an organization, (2) generating a web page dynamically in response to the request, the web page including content that describes the organization, (3) locating, within the web page, an advertisement that is dynamically generated by an advertisement network based at least in part on the content of the web page, (4) analyzing the…
System and method for .Net PE file malware detection
Granted: January 15, 2019
Patent Number:
10181035
A system and method for .Net PE files malware detection is provided. The method may include accessing two or more portable executable (PE) files and detecting at least one identical global user identifier (GUID) attribute. In response to finding identical GUID attributes, the method may include clustering a group of files into family clusters each having the same GUID attribute. The method may generate and release a signature for the family cluster. An exoneration criteria level may be…
Techniques for presenting information on a graphical user interface
Granted: January 15, 2019
Patent Number:
10180768
Techniques for presenting information on a graphical user interface are disclosed. In one embodiment, the techniques may be realized as a method for presenting information on a graphical user interface including displaying a deployment map via the graphical user interface on a display unit, determining whether an input has been detected with respect to the deployment map, determining a type of input when the input has been detected, generating an updated deployment map based on the…
System and method for dynamic detection of command and control malware
Granted: January 8, 2019
Patent Number:
10176325
A system and method for dynamic detection of Command and Control (C&C) malware is provided. The method may include hooking API within an application and analyzing the code of the hooked API using static analysis. The method may further include conducting dynamic analysis; wherein incoming network and file content is collected and data patterns relating to C&C are detected from this content. Using these data patterns, this system may identify C&C URLs and further filter these…
Systems and methods for detecting unknown vulnerabilities in computing processes
Granted: January 8, 2019
Patent Number:
10176329
The disclosed computer-implemented method for detecting unknown vulnerabilities in computing processes may include (1) monitoring a computing environment that facilitates execution of a computing process by logging telemetry data related to the computing process while the computing process is running within the computing environment, (2) determining that the computing process crashed while running within the computing environment, (3) searching the telemetry data for evidence of any…