Systems and methods for identifying suspicious controller area network messages
Granted: June 18, 2019
Patent Number:
10326788
The disclosed computer-implemented method for identifying suspicious controller area network messages may include (i) monitoring, for a predetermined period of time, messages sent by an electronic control unit that comprise a controller area network identifier for at least one controller area network device, (ii) observing, in the messages, a set of corresponding patterns that each comprise a content pattern and a timing pattern, (v) detecting a message that comprises the controller area…
Systems and methods for anonymizing log entries
Granted: June 18, 2019
Patent Number:
10326772
The disclosed computer-implemented method for anonymizing log entries may include (1) detecting a data pattern in a group of log entries documenting events performed by at least one process executing on at least one device, (2) identifying, in the data pattern, at least one data field in the log entries that contains variable data, (3) evaluating the data field containing variable data to determine whether the data field contains sensitive data, and (4) in response to determining whether…
Systems and methods for facilitating single sign-on for multiple devices
Granted: June 18, 2019
Patent Number:
10326733
The disclosed computer-implemented method for facilitating single sign-on for multiple devices may include (1) establishing a login session for a user account, (2) in response to establishing the login session, providing, to a device associated with the user account, a session token for the user account, (3) receiving, from at least one client, a request to access resources associated with the user account, (4) determining that the associated device possesses the session token for the…
Techniques for protecting against unauthorized tech support calls
Granted: June 18, 2019
Patent Number:
10325093
Techniques for protecting against unauthorized technique support calls are disclosed. In one embodiment, the techniques may be realized as a system for protecting against unauthorized technique support calls including one or more computer processors. The one or more computer processors may be configured to register a client security application installed on a client device. The client security application may be associated with a mobile device. The client device may be separate from the…
Systems and methods for uniquely identifying malicious advertisements
Granted: June 11, 2019
Patent Number:
10320816
The disclosed computer-implemented method for uniquely identifying malicious advertisements may include (1) associating, by a browser advertisement platform, a browser advertisement with a unique identifier for the browser advertisement, (2) transmitting, by the browser advertisement platform, the browser advertisement to be displayed on at least one endpoint computing device in conjunction with the unique identifier, (3) receiving, at the browser advertisement platform, a message from…
Managing generic data
Granted: June 11, 2019
Patent Number:
10320940
According to at least one embodiment, a computer-implemented method for managing generic data is described. In one embodiment, a request may be received to customize the generic data. The generic data may be downloaded based at least in part on the request. The generic data may be customized for the computing device. The customized data may be installed on the computing device.
Securely sharing a transport layer security session with one or more trusted devices
Granted: June 11, 2019
Patent Number:
10320842
Securely sharing a Transport Layer Security (TLS) session with one or more trusted devices. In one embodiment, a method may include establishing a TLS session between a client device and a server device, communicating encrypted messages that are encrypted using encryption keys between the client device and the server device, and intercepting and decrypting one or more of the encrypted messages at a trusted device using the encryption keys. In this embodiment, the establishing of the TLS…
Retuning of random classification forests to improve efficacy
Granted: June 11, 2019
Patent Number:
10320834
Methods and apparatus for optimizing computer detection of malware using pattern recognition by refreshing random classification forests are described. In one embodiment, the method may include building a random forest with two or more binary decision trees based at least in part on a first set of categorized data, sending the random forest to a client device with a first random forest control value, identifying a second set of categorized data different from the first set of categorized…
Systems and methods for applying security updates to endpoint devices
Granted: June 11, 2019
Patent Number:
10320831
The disclosed computer-implemented method for applying security updates to endpoint devices may include (1) calculating a reputation score for an endpoint device that indicates a security state of the endpoint device, (2) transmitting, from the endpoint device to a security server that provides security updates, a request to receive a security update with a degree of urgency based on the reputation score of the endpoint device, (3) receiving the security update from the security server…
Systems and methods for detecting malicious computing events
Granted: June 11, 2019
Patent Number:
10320818
The disclosed computer-implemented method for detecting malicious computing events may include (i) determining, for multiple computing events detected within an enterprise, an initial disposition score for each computing event based on currently-available security information, (ii) determining an initial classification of each computing event as malicious or non-malicious by comparing the initial disposition score of each computing event with a threshold disposition score, (iii) for each…
Systems and methods for evaluating security software configurations
Granted: June 11, 2019
Patent Number:
10318742
The disclosed computer-implemented method for evaluating security software configurations may include (1) identifying, within a software security system, a live configuration that includes active configuration settings applied by the software security system when protecting a computing system, (2) establishing a test configuration that includes at least one configuration setting that is different from the live configuration, (3) recording a live result of the software security system…
Systems and methods to enable automatic password management in a proximity based authentication
Granted: June 11, 2019
Patent Number:
10318725
The present disclosure relates to changing a password in a proximity-based authentication system. After a successful proximity-based authentication, a password agent may determine that a password does not comply with an administrative password policy. The password agent may then generate a new password that does comply with the administrative password policy and submit a password change request to an administrator of that password policy, without any input by a user at these steps. The…
Systems and methods for managing application updates
Granted: June 11, 2019
Patent Number:
10318272
The disclosed computer-implemented method for managing application updates may include (i) recording network activity of a target application, (ii) recording an identifying attribute of the target application that is associated with a current version of the target application, (iii) determining, based on recording the identifying attribute, that the target application has attempted to update from a previous version of the target application to the current version of the target…
Systems and methods for locating functions for later interception
Granted: June 11, 2019
Patent Number:
10318250
The disclosed computer-implemented method for locating functions for later interception may include (i) identifying a function to be intercepted during an execution of a file that comprises an instance of the function, (ii) procuring, from a description of the function, a string that, when located in any given file within a set of files, indicates a location of the function within the given file, (iii) scanning the file to identify a location of the string within the file, (iv)…
Systems and methods for assessing security risks of users of computer networks of organizations
Granted: June 4, 2019
Patent Number:
10313386
The disclosed computer-implemented method for assessing security risks of users of computer networks of organizations may include (i) detecting, at a risk computing device, a location of a host electronically accessed by a user computing device, the host location having an electronic address outside of a computer network of an organization, (ii) identifying, at the risk computing device, a host user credential sent to the host location from the user computing device, (iii) determining,…
Systems and methods for making security-related predictions
Granted: June 4, 2019
Patent Number:
10313379
The disclosed computer-implemented method for making security-related predictions may include (i) gathering information that comprises both signatures of events that occurred on computing systems during consecutive time slots and incident labels about incidents on the computing systems during the consecutive time slots, (ii) using the gathered information to train a machine learning model, (iii) predicting, by the machine learning model, at least one of an incident label about an…
Blocking malicious internet content at an appropriate hierarchical level
Granted: June 4, 2019
Patent Number:
10313369
Blocking malicious Internet content at an appropriate hierarchical level. In one embodiment, a method may include identifying evidence of security risks in hierarchical levels of an Internet hierarchy. The method may also include generating security risk scores for the hierarchical levels of the Internet hierarchy based on the evidence of security risks. The method may further include identifying a security risk threshold. The method may also include identifying, as an appropriate…
Preventing a malicious computer application from executing in a computing environment
Granted: June 4, 2019
Patent Number:
10311231
Preventing a malicious computer application from executing in a computing environment. In one embodiment, a method may include identifying a base graph, identifying a perturbed graph, determining an importance of each of the edges in the base graph using an Edge Current-Flow Based Betweenness Centrality (ECFBBC) metric, identifying the edges in the base graph that match the edges in the perturbed graph, determining a utility value for the perturbed graph, determining whether the utility…
Systems and methods for preventing unauthorized access to computing devices implementing computer accessibility services
Granted: May 14, 2019
Patent Number:
10289839
The disclosed computer-implemented method for preventing unauthorized access to computing devices implementing computer accessibility services may include (i) detecting, at a client computing device, an instruction to perform a user interface action utilizing a computer accessibility service, (ii) determining, at the client computing device, whether the instruction was triggered based on a touch event initiated by a user of the client computing device, and (iii) performing, at the client…
Method, system, and computer-readable medium for warning users about untrustworthy application payment pages
Granted: May 14, 2019
Patent Number:
10290033
The disclosed computer-implemented method for warning users about untrustworthy application payment pages may include (1) detecting, within an Internet browser, a payment page to purchase an application, (2) determining a source of origin of the payment page, (3) querying a reputation database to determine a reputation of the source of origin of the payment page, (4) receiving a response from the reputation database indicating that the source of origin of the payment page is…