DETECTION OF MALWARE IN DERIVED PATTERN SPACE

    公开(公告)号:US20170085585A1

    公开(公告)日:2017-03-23

    申请号:US15275039

    申请日:2016-09-23

    Inventor: Libor Morkovský

    Abstract: Systems and methods analyze input files to automatically determine malware signatures. A set of input files known to contain a particular type of malware can be provided to a file analyzer. The file analyzer can analyze the file using a sliding window to create vectors from values that are provided by multiple filters that process each window. The vectors created for a file define a response matrix. The response matrices for a set of input files can be analyzed by a classifier to determine useful vector components that can define a signature for the malware.

    GESTURE RECOGNITION FOR DEVICE UNLOCKING
    92.
    发明申请
    GESTURE RECOGNITION FOR DEVICE UNLOCKING 有权
    用于设备解锁的识别识别

    公开(公告)号:US20150363589A1

    公开(公告)日:2015-12-17

    申请号:US14737353

    申请日:2015-06-11

    Abstract: Systems and methods provide a security function for a device or applications running on a device. A lock tap sequence is entered by a user when the device is to be locked. When the user desires to unlock the device, the user enters a unlock tap sequence. If the lock tap sequence matches the unlock tap sequence, the device is unlocked.

    Abstract translation: 系统和方法为设备上运行的设备或应用程序提供安全功能。 当设备被锁定时,用户输入锁定抽头顺序。 当用户希望解锁设备时,用户输入解锁抽头序列。 如果锁定抽头顺序与解锁分接序列一致,则设备将被解锁。

    NETWORK RESOURCE PRIVACY NEGOTIATION SYSTEM AND METHOD

    公开(公告)号:US20250039182A1

    公开(公告)日:2025-01-30

    申请号:US18909465

    申请日:2024-10-08

    Abstract: A method for accessing a network resource including detecting an attempt by a user via a computing device to access a service enabled by a computing system via a network and transmitting via the network to the computing system a first request to access the service in response to detecting the attempt by the user to access the service, the first request including at least one empty personally identifiable data structure. A failure to access the service responsive to the first request is determined. A second request to access the service in response to the first failure to access the service is transmitted via the network to the computing system, the second request including artificial personally identifiable information, and access to the service from the computing system is received for the user.

    MALWARE ANALYSIS USING GROUP TESTING
    94.
    发明公开

    公开(公告)号:US20240362335A1

    公开(公告)日:2024-10-31

    申请号:US18306861

    申请日:2023-04-25

    CPC classification number: G06F21/577 G06F21/53 G06F2221/033

    Abstract: Malicious activity is identified in a plurality of sequences of computer instructions by identifying a plurality of sequences of computer instructions of interest, and assigning the plurality of sequences of computer instructions into two or more groups. A virtual machine sandbox is executed for each of the two or more groups, and each of the plurality of sequences of computer instructions is executed in the virtual machine sandbox into which the sequence of computer instructions has been assigned. Behavior of the executing instruction sequences is monitored, and is used to determine whether each of the groups has at least one executed sequence of computer instructions that is likely malicious.

    Network resource privacy negotiation system and method

    公开(公告)号:US12113798B2

    公开(公告)日:2024-10-08

    申请号:US18316023

    申请日:2023-05-11

    CPC classification number: H04L63/102 G06F16/9535 G06F21/6263

    Abstract: A method for accessing a network resource including detecting an attempt by a user via a computing device to access a service enabled by a computing system via a network and transmitting via the network to the computing system a first request to access the service in response to detecting the attempt by the user to access the service, the first request including at least one empty personally identifiable data structure. A failure to access the service responsive to the first request is determined. A second request to access the service in response to the first failure to access the service is transmitted via the network to the computing system, the second request including artificial personally identifiable information, and access to the service from the computing system is received for the user.

    SYSTEM AND METHOD FOR EVALUATING ONLINE DATA
    96.
    发明公开

    公开(公告)号:US20240259393A1

    公开(公告)日:2024-08-01

    申请号:US18159821

    申请日:2023-01-26

    CPC classification number: H04L63/123 G06F18/241

    Abstract: A method and system detects at a plurality of network locations a plurality of accuracy ratings of a plurality of media instances and detects the plurality of media instances. A particular accuracy rating of one or more particular media instances is detected at a particular network location, and the one or more particular media instances are detected. A bias of the particular accuracy rating is determined based on the particular accuracy rating, the one or more particular media instances, the plurality of accuracy ratings, and the plurality of media instances. An indication is transmitted to a user based on the bias of the particular accuracy rating.

    High-confidence malware severity classification of reference file set

    公开(公告)号:US11861006B2

    公开(公告)日:2024-01-02

    申请号:US17151462

    申请日:2021-01-18

    CPC classification number: G06F21/566 G06F18/217 G06F21/54 G06F21/568 G06N20/00

    Abstract: A reference file set having high-confidence malware severity classification is generated by selecting a subset of files from a group of files first observed during a recent observation period and including them in the subset. A plurality of other antivirus providers are polled for their third-party classification of the files in the subset and for their third-party classification of a plurality of files from the group of files not in the subset. A malware severity classification is determined for the files in the subset by aggregating the polled classifications from the other antivirus providers for the files in the subset after a stabilization period of time, and one or more files having a third-party classification from at least one of the polled other antivirus providers that changed during the stabilization period to the subset are added to the subset.

    Malware detection and mitigation system and method

    公开(公告)号:US11831672B2

    公开(公告)日:2023-11-28

    申请号:US17512015

    申请日:2021-10-27

    CPC classification number: H04L63/145 H04L63/1408 H04L63/205

    Abstract: A method and system for updating and applying a ruleset used for determining and mitigating malware threats. Communications of computing devices are monitored and first data file extracted. A first and second set of features are extracted. A first rule is applied to the first set of features of the first data file to determine a non-match. A second rule is applied to the second set of features to determine a match. A third rule is generated based on the first set of features, non-match, and match. Communications of a particular computing device are monitored and second data file extracted. A first set of features of the second data file are extracted. The third rule is applied to the first set of features of the second data file to determine a match. The second data file is disabled, blocked, or deleted based the match determination by the third rule.

Patent Agency Ranking