Network resource privacy negotiation system and method

    公开(公告)号:US12113798B2

    公开(公告)日:2024-10-08

    申请号:US18316023

    申请日:2023-05-11

    CPC classification number: H04L63/102 G06F16/9535 G06F21/6263

    Abstract: A method for accessing a network resource including detecting an attempt by a user via a computing device to access a service enabled by a computing system via a network and transmitting via the network to the computing system a first request to access the service in response to detecting the attempt by the user to access the service, the first request including at least one empty personally identifiable data structure. A failure to access the service responsive to the first request is determined. A second request to access the service in response to the first failure to access the service is transmitted via the network to the computing system, the second request including artificial personally identifiable information, and access to the service from the computing system is received for the user.

    SYSTEM AND METHOD FOR EVALUATING ONLINE DATA
    152.
    发明公开

    公开(公告)号:US20240259393A1

    公开(公告)日:2024-08-01

    申请号:US18159821

    申请日:2023-01-26

    CPC classification number: H04L63/123 G06F18/241

    Abstract: A method and system detects at a plurality of network locations a plurality of accuracy ratings of a plurality of media instances and detects the plurality of media instances. A particular accuracy rating of one or more particular media instances is detected at a particular network location, and the one or more particular media instances are detected. A bias of the particular accuracy rating is determined based on the particular accuracy rating, the one or more particular media instances, the plurality of accuracy ratings, and the plurality of media instances. An indication is transmitted to a user based on the bias of the particular accuracy rating.

    High-confidence malware severity classification of reference file set

    公开(公告)号:US11861006B2

    公开(公告)日:2024-01-02

    申请号:US17151462

    申请日:2021-01-18

    CPC classification number: G06F21/566 G06F18/217 G06F21/54 G06F21/568 G06N20/00

    Abstract: A reference file set having high-confidence malware severity classification is generated by selecting a subset of files from a group of files first observed during a recent observation period and including them in the subset. A plurality of other antivirus providers are polled for their third-party classification of the files in the subset and for their third-party classification of a plurality of files from the group of files not in the subset. A malware severity classification is determined for the files in the subset by aggregating the polled classifications from the other antivirus providers for the files in the subset after a stabilization period of time, and one or more files having a third-party classification from at least one of the polled other antivirus providers that changed during the stabilization period to the subset are added to the subset.

    Malware detection and mitigation system and method

    公开(公告)号:US11831672B2

    公开(公告)日:2023-11-28

    申请号:US17512015

    申请日:2021-10-27

    CPC classification number: H04L63/145 H04L63/1408 H04L63/205

    Abstract: A method and system for updating and applying a ruleset used for determining and mitigating malware threats. Communications of computing devices are monitored and first data file extracted. A first and second set of features are extracted. A first rule is applied to the first set of features of the first data file to determine a non-match. A second rule is applied to the second set of features to determine a match. A third rule is generated based on the first set of features, non-match, and match. Communications of a particular computing device are monitored and second data file extracted. A first set of features of the second data file are extracted. The third rule is applied to the first set of features of the second data file to determine a match. The second data file is disabled, blocked, or deleted based the match determination by the third rule.

    SYSTEM AND METHOD FOR DATA COMPRESSION AND DECOMPRESSION

    公开(公告)号:US20230214367A1

    公开(公告)日:2023-07-06

    申请号:US17569071

    申请日:2022-01-05

    CPC classification number: G06F16/211 H03M7/30

    Abstract: A data processing method in the form of a data compression method is provided in which a plurality of integers are accessed. Each of the plurality of integers is split to generate a first plurality of numbers respectively paired with a second plurality of numbers. A first tuple is generated based on the first plurality of numbers. A second tuple is generated based on the second plurality of numbers and the first plurality of numbers. The first tuple and the second tuple are stored. A system and computer readable medium enabling the data processing method are further provided.

    Virtual network function enabled secure communication systems and methods

    公开(公告)号:US11689388B2

    公开(公告)日:2023-06-27

    申请号:US17034719

    申请日:2020-09-28

    CPC classification number: H04L12/4641 H04L12/4633 H04L63/1408 H04L63/1441

    Abstract: A method for enabling secure communication. The method includes providing a first virtual network function (“VNF”) at a first network location and providing a second VNF at a second network location. A first Layer 3 virtual private network (“L3 VPN”) tunnel is constructed by the first VNF and the second VNF between the first network location and the second network location, and a first local area network (“LAN”) at the first network location and a second LAN at the second network location are connected by the first L3 VPN tunnel. Further provided is a method for establishing a secure communication environment.

    Creating generic rules in a high dimensional sparse feature space using negative feedback

    公开(公告)号:US11550910B2

    公开(公告)日:2023-01-10

    申请号:US16588704

    申请日:2019-09-30

    Inventor: Peter Kovác

    Abstract: Systems and methods use negative feedback to create generic rules for a high dimensional sparse feature space. A system receives a set of fingerprints, where a fingerprint can be a set of features of a file. The fingerprints can be clustered according to similarity. For each cluster, a proto-rule is created that has a condition for each feature. The proto-rule is simplified using negative feedback to create a well-formed rule having a comparatively small subset of the conditions in the proto-rule that are useful in determining malware. The well-formed rule can be added to a set of rules used in a malware detection system.

    USER AND GROUP SPECIFIC THREAT PROTECTION SYSTEM AND METHOD

    公开(公告)号:US20220368699A1

    公开(公告)日:2022-11-17

    申请号:US17317707

    申请日:2021-05-11

    Inventor: Allan Thomson

    Abstract: A method of managing access to a network destination. The method includes establishing a first network zone for a user, the first network zone including a plurality of network destinations. The first network zone is monitored and one or more changes in the first network zone are determined. A first network destination in the first network zone is analyzed responsive to determining the one or more changes in the first network zone to determine a first threat. An attempt by the user to access the first network destination is detected, and access by the user to the first network destination is restricted based on the determining the first threat.

    Privacy preference based device controls

    公开(公告)号:US11496479B2

    公开(公告)日:2022-11-08

    申请号:US16714318

    申请日:2019-12-13

    Inventor: Rajarshi Gupta

    Abstract: A method for controlling application enabling includes receiving from a user an indication of data for sharing and an indication of one or more recipients with which to share the data. A multidimensional zone is determined based on the indication of the data and the indication of the one or more recipients. A request from the user to enable an application via a computing device is detected. Data permission requirements of the application are accessed, and a multidimensional coordinate is determined based on the data permission requirements of the application. The multidimensional zone is compared to the multidimensional coordinate, and the user is notified via the computing device of the comparing of the multidimensional zone to the multidimensional coordinate. An affirmation of the request is received from the user via the computing device, and the application is enabled responsive to the affirmation of the request.

Patent Agency Ranking