CRYPTOCURRENCY MINING DETECTION USING NETWORK TRAFFIC

    公开(公告)号:US20210084060A1

    公开(公告)日:2021-03-18

    申请号:US16571945

    申请日:2019-09-16

    Abstract: A method of identifying cryptocurrency mining on a networked computerized device includes intercepting network traffic between the networked computerized device and a public network, and extracting Internet Protocol (IP) packet data of the intercepted network traffic. The IP packet data of the intercepted network traffic is evaluated such that if the intercepted network traffic is determined to be characteristic of communication with a cryptocurrency mining pool it is determined that the networked computerized device is mining cryptocurrency. One or more remedial actions are taken if it is determined that the networked computerized device is mining cryptocurrency, such as blocking traffic between the networked computerized device and the mining pool or notifying a user.

    Identifying devices on a remote network

    公开(公告)号:US10862862B2

    公开(公告)日:2020-12-08

    申请号:US16205074

    申请日:2018-11-29

    Abstract: A device identification module identifies devices on a remote network, where the remote network may use Network Address Translation techniques. The device identification module can receive a list of devices on the remote network. The devices in the remote network can be identified by the device classification module based, at least in part, on the device classification and one or more of Dynamic Host Configuration Protocol (DHCP) information for the remote network, port sequences used in Network Address Translation on the remote network, and a live Uniform Resource Locator (URL) check performed on the remote network.

    Default filter setting system and method for device control application

    公开(公告)号:US10855836B2

    公开(公告)日:2020-12-01

    申请号:US16140035

    申请日:2018-09-24

    Abstract: A content filter setting method includes enabling a user to choose a setting of a filter for a particular application in a user interface of a user device. The setting of the filter is received from the user via the user interface, and a model is applied to determine a plurality of default settings of a plurality of filters of the particular application based on the setting of the filter and the identifying information of the user. The plurality of default settings is displayed in the user interface, and modified settings of the default settings are received via the user interface.

    OBSERVATION AND CLASSIFICATION OF DEVICE EVENTS

    公开(公告)号:US20200089875A1

    公开(公告)日:2020-03-19

    申请号:US16694123

    申请日:2019-11-25

    Abstract: Systems and methods observe and classify device events. A model containing a set of features to be observed can be determined based on machine learning and training methods. A client application can issue a transaction request to an operating system service. A determination can be made whether the operating system service, a method associated with the transaction request, and the client application are currently being observed. In response to determining that the operating system service, a method associated with the transaction request, and the client application are being observed, a behavioral vector associated with the client application can be modified to indicate that the feature represented by the method is associated with the client application. The behavioral vector can be used to determine if the client application is malware.

    Detection of domain name system hijacking

    公开(公告)号:US10594728B2

    公开(公告)日:2020-03-17

    申请号:US15638160

    申请日:2017-06-29

    Abstract: Detecting a Domain Name Service (DNS) hijacking includes resolving names in a hijack target group list to their respective Internet Protocol (IP) addresses. In response to determining that two names in the hijack target group list resolved to a common IP address, a determination is made whether a legitimate reason exists for the two names in the hijack target group list to resolve to the common IP address. In response to determining that a legitimate reason does not exist for the two names in the hijack target group list to resolve to a common IP address, a DNS hijacking is indicated.

    AUTOMATIC LANGUAGE SELECTION IN MESSAGING APPLICATION

    公开(公告)号:US20190302897A1

    公开(公告)日:2019-10-03

    申请号:US15942360

    申请日:2018-03-30

    Abstract: An electronic messaging method is provided, the method implemented by one or more processors. The method includes launching a textual communication application by a user device including a user interface. In the user interface a data entry interface is enabled including language elements in a particular language determined based on an international calling code of a stored textual communication involving a user of the user device or a language of a stored textual communication involving a user of the user device, the stored textual communication comprising text transmitted by the user of the user device or text received by the user of the user device from a particular party. Textual input is received via the data entry interface including the language elements in the particular language.

    Mobile location security system
    178.
    发明授权

    公开(公告)号:US10349211B1

    公开(公告)日:2019-07-09

    申请号:US16024839

    申请日:2018-06-30

    Inventor: Juyong Do

    Abstract: A system and method is provided for sharing mobile device location information. The method includes receiving signals by a mobile device and determining by the mobile device a first location of the mobile device at a first time based on the signals received by the mobile device. Time data is accessed by the mobile device and the mobile device determines based on the time data that the first time is in a first time window. The first location is transmitted to a particular user device at least responsive to the first time being in the first time window. The mobile device determines a second location of the mobile device at a second time based on the signals received by the mobile device. A first error is applied to the second location at least responsive to the determining of the second location at the second time, and the second location is transmitted including the first error to the particular user device.

    Cloud based reputation system for browser settings

    公开(公告)号:US10346518B2

    公开(公告)日:2019-07-09

    申请号:US14879892

    申请日:2015-10-09

    Abstract: A method and apparatus for an automated classification and reset of browser settings is provided. A set of disreputable browser setting values is maintained based on statistics associated with the browser setting values. In response to determining that an attempt is made to set a browser setting to a value in the set of disreputable browser setting values, a notification can be presented to the user. The notification can include options in a set of reputable browser settings.

    Injecting credentials into web browser requests

    公开(公告)号:US10341316B2

    公开(公告)日:2019-07-02

    申请号:US15186177

    申请日:2016-06-17

    Abstract: A password manager injects credentials into a web browser request. A user can browse to a form provided by a server that includes a password field. A plug-in requests a password for the field from a password manager. The actual password is not provided to the plug-in or the browser. The password manager provides a proxy password that is not the actual password for the field. A request interceptor in a separate process from the browser intercepts the completed request as it is sent to the server and replaces the proxy password with the actual password.

Patent Agency Ranking