DYNAMIC ANALYSIS FOR MALICIOUS BROWSER EXTENSIONS

    公开(公告)号:US20250094580A1

    公开(公告)日:2025-03-20

    申请号:US18467444

    申请日:2023-09-14

    Abstract: The behavior of browser extensions when installed and operating in a browser environment is monitored, such as by observing changes to a web page with and without the browser extensions installed. Document Object Model (DOM) changes to the web page, such as scripts that only run when an extension is installed, or other web content that changes as a result of differences in a web page with and without the browser extension installed are observed. These differences may be attributed to the browser extension, and the changed or added elements may be inspected for malicious content or behavior. If malicious behavior is found in the different content, the content and/or the browser extension may be flagged as malicious behavior and a signature used to identify the malicious browser extension in future applications.

    SYSTEMS AND METHODS FOR VERIFYING DIGITAL DOCUMENTS

    公开(公告)号:US20250028863A1

    公开(公告)日:2025-01-23

    申请号:US18356439

    申请日:2023-07-21

    Abstract: A system and method are provided by which an electronic address associated with a user is monitored. Based on the monitoring, an electronic message is detected including a digital document. A cryptographic function is applied to the digital document to generate a hash which is rendered accessible at a network location. An identification of the network location of the hash is transmitted to a first computing system associated with the user.

    System and method for data compression and decompression

    公开(公告)号:US12147396B2

    公开(公告)日:2024-11-19

    申请号:US17569071

    申请日:2022-01-05

    Abstract: A data processing method in the form of a data compression method is provided in which a plurality of integers are accessed. Each of the plurality of integers is split to generate a first plurality of numbers respectively paired with a second plurality of numbers. A first tuple is generated based on the first plurality of numbers. A second tuple is generated based on the second plurality of numbers and the first plurality of numbers. The first tuple and the second tuple are stored. A system and computer readable medium enabling the data processing method are further provided.

    USER AND GROUP SPECIFIC THREAT PROTECTION SYSTEM AND METHOD

    公开(公告)号:US20240259402A1

    公开(公告)日:2024-08-01

    申请号:US18591669

    申请日:2024-02-29

    Inventor: Allan Thomson

    CPC classification number: H04L63/1416 H04L63/104

    Abstract: A method of managing access to a network destination. The method includes establishing a first network zone for a user, the first network zone including a plurality of network destinations. The first network zone is monitored and one or more changes in the first network zone are determined. A first network destination in the first network zone is analyzed responsive to determining the one or more changes in the first network zone to determine a first threat. An attempt by the user to access the first network destination is detected, and access by the user to the first network destination is restricted based on the determining the first threat.

    User and group specific threat protection system and method

    公开(公告)号:US11949693B2

    公开(公告)日:2024-04-02

    申请号:US17317707

    申请日:2021-05-11

    Inventor: Allan Thomson

    CPC classification number: H04L63/1416 H04L63/104

    Abstract: A method of managing access to a network destination. The method includes establishing a first network zone for a user, the first network zone including a plurality of network destinations. The first network zone is monitored and one or more changes in the first network zone are determined. A first network destination in the first network zone is analyzed responsive to determining the one or more changes in the first network zone to determine a first threat. An attempt by the user to access the first network destination is detected, and access by the user to the first network destination is restricted based on the determining the first threat.

    Online content evaluation system and methods

    公开(公告)号:US11941052B2

    公开(公告)日:2024-03-26

    申请号:US17342463

    申请日:2021-06-08

    CPC classification number: G06F16/835 G06F40/295 G06N20/00 G06Q30/0201

    Abstract: A method including detecting a webpage accessed by a user on a computing device via a browser. Content on the webpage is determined, and a model is applied to the content to determine a plurality of keyword sets. A network search is performed based on each of the plurality of keyword sets to generate a plurality of search results. The plurality of search results are compared to the content, and the plurality of search results are compared to each other. A factualness of the content is determined based on the comparing of the plurality of search results to the content and based on the comparing of the plurality of the search results to each other, and the user is notified via the browser of the factualness of the content.

    COMPUTING THREAT DETECTION RULE SYSTEMS AND METHODS

    公开(公告)号:US20240037103A1

    公开(公告)日:2024-02-01

    申请号:US17873611

    申请日:2022-07-26

    Inventor: Michal Najman

    CPC classification number: G06F16/24564 G06F16/244

    Abstract: A computing threat detection rule method and system for performing the method. The method includes determining identifiers for data points. One or more terms for each of the data points are determined to determine terms respectively associated with the identifiers. Collections of identifiers respectively associated with the terms are determined, the number of identifiers in each of the collections of identifiers limited to a threshold number. Conditions of a rule are determined. The conditions of the rule are compared to the terms to determine matching terms respectively associated with corresponding collections of identifiers. An intersection of the corresponding collections of identifiers is determined, and a number of the data points covered by the rule is determined based on the intersection of the corresponding collections of identifiers. A transmission is performed based on the number of the data points covered by the rule.

    Data exfiltration detection
    119.
    发明授权

    公开(公告)号:US11829509B2

    公开(公告)日:2023-11-28

    申请号:US17377298

    申请日:2021-07-15

    Inventor: Martin Mesrsmid

    Abstract: A computer-implemented method includes creating an account including an account value on an online service. The account value is modified periodically to activate a plurality of account values respectively associated with a plurality of times at which the plurality of account values were respectively activated on the account. A network-accessible data repository is scanned to detect a first value of the plurality of account values, the first value associated with a first time of the plurality of times at which the first value was activated. Responsive to detecting the first value a notification is provided indicating a data leak from the online service including an indication of when the data leak occurred based on the first time at which the first value was activated on the account and a second time at which a second value was activated on the account to replace the first value.

    USER DATA COLLECTION PRIVACY USING PROBABILISTIC DATA STRUCTURES

    公开(公告)号:US20230289466A1

    公开(公告)日:2023-09-14

    申请号:US17654166

    申请日:2022-03-09

    Inventor: Martin Mesrsmid

    Abstract: A method of collecting user device data includes receiving a probabilistic cardinality estimator data structure in the user device from a server, the probabilistic cardinality estimator data structure associated with a survey question. An answer to the survey question associated with the probabilistic cardinality estimator data structure is determined, and one or more elements are selectively added to the probabilistic cardinality estimator data structure based on the determined answer to the survey question. The probabilistic cardinality estimator data structure is sent back to the server, which calculates the survey result from the probabilistic cardinality estimator data structure.

Patent Agency Ranking