APPLICATION MONITORING AND DEVICE RESTRICTION SYSTEM AND METHOD

    公开(公告)号:US20210026978A1

    公开(公告)日:2021-01-28

    申请号:US16519556

    申请日:2019-07-23

    Abstract: A method of controlling use of network-connectable devices is provided. First network requests from a first user device executing a first operating system are monitored, and applications operating in the foreground on the first user device during the first network requests are monitored. A model is trained based on the first network requests and based on the applications respectively operating in the foreground on the first user device during the first network requests. Second network requests from a second user device executing a second operating system are monitored, and the model is applied to the second network requests from the second user device to determine a particular application operating in the foreground on the second user device. A function of the second user device is restricted based on the determining of the particular application operating in the foreground on the second user device.

    SECURE AUTHENTICATION IN ADVERSE ENVIRONMENTS
    122.
    发明申请

    公开(公告)号:US20200374277A1

    公开(公告)日:2020-11-26

    申请号:US16422591

    申请日:2019-05-24

    Abstract: A method of authenticating a user to a computer in an adverse environment includes receiving the user's password in a trusted user device, such as by the user typing the password, and encoding a keyword with a hash of the entered password to create an encoded keyword. The encoded keyword is sent from the trusted user device to the computer using a physical communication channel perceivable by the user; and the encoded keyword is compared in the computer with a keyword encoded with a known hash of the user's password in the computer to authenticate the user.

    Detecting malware with hash-based fingerprints

    公开(公告)号:US10678921B2

    公开(公告)日:2020-06-09

    申请号:US15721244

    申请日:2017-09-29

    Abstract: Detecting malware includes monitoring an event stream for an executable program, where the event stream includes a plurality of events such as API call events. A first plurality of hash values is determined for the event stream. In response to an occurrence of a trigger event in the event stream, the first plurality of hash values for the event stream can be compared with a second plurality of hash values that represents an event stream for a known malware executable. A determination can be made if a behavior represented by the first plurality of hash values is a permitted behavior based on the comparison.

    Mobile location security system
    126.
    发明授权

    公开(公告)号:US10582336B2

    公开(公告)日:2020-03-03

    申请号:US16451943

    申请日:2019-06-25

    Inventor: Juyong Do

    Abstract: A system and method is provided for sharing mobile device location information. The method includes receiving signals by a mobile device and determining by the mobile device a first location of the mobile device at a first time based on the signals received by the mobile device. Time data is accessed by the mobile device and the mobile device determines based on the time data that the first time is in a first time window. The first location is transmitted to a particular user device at least responsive to the first time being in the first time window. The mobile device determines a second location of the mobile device at a second time based on the signals received by the mobile device. A first error is applied to the second location at least responsive to the determining of the second location at the second time, and the second location is transmitted including the first error to the particular user device.

    System and method for determining device proximity

    公开(公告)号:US10574665B2

    公开(公告)日:2020-02-25

    申请号:US15716389

    申请日:2017-09-26

    Abstract: A computing device can initiate a pairing operation with mobile computing device. The computing device encodes a pairing secret into a displayable code for presentation. The size of the displayable code can be determined in accordance with a threshold distance and display parameters. The mobile computing device is positioned such that an image of the displayable code substantially fills a boundary whose size is determined according to a desired threshold distance, a focal length, and parameters of a sensor chip. The displayable code is decoded to reveal the pairing secret to the mobile computing device. The pairing secret is used to complete the pairing process with the computing device. Once pairing has been completed, the computing device can measure a signal strength between the computing device and the mobile computing device. The signal strength can be stored to be used for later authorization purposes.

    NEURAL NETWORK DETECTION OF MALICIOUS ACTIVITY
    128.
    发明申请

    公开(公告)号:US20190325134A1

    公开(公告)日:2019-10-24

    申请号:US16389710

    申请日:2019-04-19

    Inventor: Petr Gronát

    Abstract: A method of identifying malicious activity in a sequence of computer instructions includes providing the sequence of computer instructions into a recurrent neural network configured to provide an output based on both the current instruction being input and at least one prior instruction in the sequence, and evaluating the provided sequence of computer instructions in the recurrent neural network at multiple points within the sequence. An output is provided indicating whether the network has determined the code sequence to that point is likely malicious.

    Mobile device location anomaly detection based on non-location information

    公开(公告)号:US10448356B1

    公开(公告)日:2019-10-15

    申请号:US16370958

    申请日:2019-03-30

    Abstract: A location anomaly for a mobile device can be detected using non-location information from the mobile device. The non-location information does not include data from a location based device, such as a GPS. A probabilistic model is created using historical non-location information accumulated from the mobile device. Current non-location data is compared with the probabilistic model to determine a probability associated with the current non-location information. If the probability is less than a predetermined or configurable threshold, a location anomaly is detected. A notification of the location anomaly may be displayed and/or transmitted in response to detecting the location anomaly.

    Systems and methods for inference of malware labels in a graph database

    公开(公告)号:US10437995B2

    公开(公告)日:2019-10-08

    申请号:US15474007

    申请日:2017-03-30

    Abstract: Systems and methods are described which integrate file properties that in conventional systems has been considered weaker evidence of malware and analyzes the information to produce reliable results. Properties such as file paths, file names, source domains, IP protocol ASNs, section checksums, digital signatures that are not always present and not always reliable can be integrated into the classification process using a graph. A 1-neighborhood of object values in the graph may be created and analyzed to suggest a malware family label based on files having similar properties.

Patent Agency Ranking