Systems and methods for updating network devices
Granted: July 30, 2019
Patent Number:
10365913
The disclosed computer-implemented method for updating network devices may include (1) determining, by monitoring at least one endpoint device connected to a network device that provides a network connection for the endpoint device, periodic time intervals in which a user of the endpoint device is unlikely to access the network connection via the network device, (2) detecting that a system update is available for the network device that will impair the ability of the network device to…
Systems and methods for protecting automated execution environments against enumeration attacks
Granted: July 23, 2019
Patent Number:
10360371
The disclosed computer-implemented method for protecting automated execution environments against enumeration attacks may include (1) monitoring a file that is undergoing a malware analysis in an automated execution environment, (2) while monitoring the file, detecting one or more behaviors exhibited by the file during the malware analysis in the automated execution environment, (3) determining, based at least in part on the behaviors exhibited by the file, that the file is attempting to…
Systems and methods for providing two-factor authentication with an enterprise gateway when an authentication server is unavailable
Granted: July 23, 2019
Patent Number:
10360366
The disclosed computer-implemented method for providing two-factor authentication with an enterprise gateway when an authentication server is unavailable may include (1) receiving, at a computing device, an authentication request from a client device; (2) determining the authentication server is unavailable; (3) sending, to the client device and in response to determining the authentication server is unavailable, a backup credential stored on the enterprise gateway; (4) receiving, from…
Systems and methods for providing interfaces for visualizing threats within networked control systems
Granted: July 9, 2019
Patent Number:
10348758
The disclosed computer-implemented method for providing interfaces for visualizing threats within networked control systems may include (i) receiving a request to provide a graphical interface to visualize a networked control system with multiple components, (ii) identifying within the networked control system a potential security threat involving a potentially compromised component of the networked control system, and (iii) providing the graphical interface by (a) ordering the…
Systems and methods for detecting network security deficiencies on endpoint devices
Granted: July 9, 2019
Patent Number:
10348755
The disclosed computer-implemented method for detecting network security deficiencies on endpoint devices may include (i) detecting, at a network device, a request from an endpoint device to automatically connect to a wireless network, (ii) establishing, via the network device, a network connection between the endpoint device and a wireless network that appears to be the wireless network requested by the endpoint device but is not actually the requested wireless network, (iii)…
Detecting malicious software
Granted: July 9, 2019
Patent Number:
10346611
A method for detecting malicious software is described. In one embodiment, the method includes identifying an unknown application on mobile device, identifying a package name of the unknown application, analyzing the package name of the unknown application in relation to package names of one or more categorized applications, and determining a likelihood the unknown application includes malware based at least in part on analyzing the package name of the unknown application.
Systems and methods for generating training documents used by classification algorithms
Granted: July 2, 2019
Patent Number:
10339423
The disclosed computer-implemented method for generating training documents used by classification algorithms may include (i) identifying a set of training documents used by a classification system to classify documents written in a first language, (ii) generating a list of tokens from within the training documents that indicate critical terms representative of classes defined by the classification system, (iii) translating the list of tokens from the first language to a second language,…
Systems and methods for obscuring user location
Granted: July 2, 2019
Patent Number:
10341858
The disclosed computer-implemented method for obscuring user location may include (i) detecting a motion of a user mobile device through a motion sensor of the user mobile device, (ii) checking whether the motion of the user mobile device satisfies a specified threshold that defines a threshold level of motion, (iii) determining that the motion of the user mobile device satisfies the specified threshold that defines the threshold level of motion, and (iv) protecting a user of the user…
Systems and methods for categorizing security incidents
Granted: July 2, 2019
Patent Number:
10341377
The disclosed computer-implemented method for categorizing security incidents may include (i) generating, within a training dataset, a feature vector for each of a group of security incidents, the feature vector including features that describe the security incidents and the features including categories that were previously assigned to the security incidents as labels to describe the security incidents, (ii) training a supervised machine learning function on the training dataset such…
Automatically detecting insider threats using user collaboration patterns
Granted: July 2, 2019
Patent Number:
10341373
Automatically detecting insider threats using user collaboration patterns. In one embodiment, a method may include identifying collaborative access of one or more network resources in a network between a target user using a target network device and other users using other network devices in the network during multiple prior time periods and during a current time period, generating prior collaboration graphs for the prior time periods, generating an average collaboration graph by…
Anonymous reputation requests
Granted: July 2, 2019
Patent Number:
10339340
A method for anonymous reputation requests is described. In one embodiment, the method includes calculating a full thumbprint of an object on a client machine, trimming one or more bits from the full thumbprint to generate a trimmed thumbprint, sending the trimmed thumbprint to a reputation server, and receiving a result from the reputation server regarding the trimmed thumbprint.
Detection of malicious attachments on messages
Granted: July 2, 2019
Patent Number:
10339310
A method for determining malicious attachments on messages is described. A computing device may receive an electronic message, including one or more unopened attachments, and identify one or more characteristic values of the message header, message body, or attachments of the message. The computing device may analyze the identified characteristics and in some instances compare at least a portion of the characteristics, individually or in combination, with one or more configured…
Systems and methods for remediating computer reliability issues
Granted: July 2, 2019
Patent Number:
10339308
The disclosed computer-implemented method for remediating computer reliability issues may include (1) obtaining a computer-generated log line that potentially includes information pertaining to a cause of a reliability issue experienced by a device, (2) determining that a product-specific schema has not been created for a product that generated the computer-generated log line, (3) in response to determining that a product-specific schema has not been created for the product, matching…
Systems and methods for generating tripwire files
Granted: July 2, 2019
Patent Number:
10339304
A computer-implemented method for generating tripwire files may include (1) generating an initial tripwire file according to an initial tripwire generation calculation, the initial tripwire file configured such that modification of the initial tripwire file triggers investigation of a security breach, (2) generating a subsequent tripwire file according to a subsequent tripwire generation calculation, the subsequent tripwire generation calculation differing from the initial tripwire…
Techniques for emulating microprocessor instructions
Granted: July 2, 2019
Patent Number:
10338943
Computer-implemented systems, methods, and media are provided for emulating microprocessor instructions. The computer-implemented systems, methods, and media may, for example, identify an instruction of a first software application using a second software application that emulates instructions of a type of microprocessor, add an additional bit to a length of an operation code of the instruction to create an extended operation code, wherein the extended operation code is represented in an…
Systems and methods for enabling safe memory de-duplication in shared-computing environments
Granted: July 2, 2019
Patent Number:
10338818
The disclosed computer-implemented method for enabling safe memory de-duplication in shared-computing environments may include (i) identifying a first virtual machine and a second virtual machine, (ii) calculating a trustworthiness score for the first virtual machine based on a trustworthiness score of each binary of the first virtual machine, (iii) calculating a trustworthiness score for the second virtual machine based on a trustworthiness score of each binary of the second virtual…
Systems and methods for automatically generating passwords that comply with password restrictions
Granted: June 25, 2019
Patent Number:
10331879
A computer-implemented method for automatically generating passwords that comply with password restrictions may include (1) maintaining a database that stores password criteria for a plurality of websites, (2) determining that a user is accessing a website that requests creation of a password, (3) determining a set of password complexity rules for the website by querying the database that stores the password criteria, (4) using the set of password complexity rules to automatically…
Automatically switching to a barricade mode to secure mobile computing devices in response to predetermined mobile computing device events
Granted: June 25, 2019
Patent Number:
10334444
A predetermined event occurring on a client device is detected. The predetermined event can be in the form of a user-initiated action, an audio command, geolocation information, a breaking of a wireless connection, or exceeding a relative distance. The detection of the predetermined event triggers a switch of the current access mode of the client device to a more secure access mode. Access mode switches on other client devices may also be triggered. Additional actions may be executed on…
Network device clusters
Granted: June 25, 2019
Patent Number:
10334039
In certain embodiments, a method comprises forming a cluster of peered network devices comprising a plurality of three or more peered network devices and a plurality of control information connections between pairs of the peered network devices. The method further comprises classifying a connection by associating the connection with an application, wherein a first peered network device associated with the cluster classifies the connection based at least in part on sequential payload…
Proactive protection of mobile operating system malware via blocking of infection vector
Granted: June 25, 2019
Patent Number:
10333949
The present disclosure relates to systems and methods for blocking an infection vector. In some embodiments, a method may include detecting, at a first device, a synchronization event with a second device, the first device and the second device operating with a proprietary mobile operating system. In some examples, the method may include recognizing, by the first device, that the first device is attempting to send a data package to the second device, and identifying the data package as…