Cloud-based anomalous traffic detection and protection in a remote network via DNS properties

    公开(公告)号:US11005871B2

    公开(公告)日:2021-05-11

    申请号:US16245042

    申请日:2019-01-10

    Abstract: A central platform remote from a local network can detect anomalies on the local network. The central platform can assign a unique pair of DNS server IP addresses to the local network. The central platform can receive configuration data from the local network and use the configuration data and the assigned pair of DNS server IP addresses to uniquely identify devices on the local network. In the case that current network flow statistics do not match expected network flow statistics for the local network, a device causing the anomalous behavior can be identified using the assigned pair of DNS server IP addresses and configuration data.

    SSL/TLS SPOOFING USING TAGS
    172.
    发明申请

    公开(公告)号:US20210136106A1

    公开(公告)日:2021-05-06

    申请号:US16730868

    申请日:2019-12-30

    Abstract: A network is secured by managing domain name requests such that client devices are restricted from visiting malicious or undesirable domains. An endpoint Domain Name Server (DNS) agent is installed on client devices on a local network, and the endpoint DNS agents intercept DNS requests from the client devices and process the received DNS request in the endpoint DNS agent based on a security policy set for the client device via the endpoint DNS agent. In a further example, the endpoint DNS agent receives an HTTP message from a client browser including a Server Name Identifier tag, and generates a signed certificate spoofing the domain identified in the Server Name Identifier tag to insert itself as a man-in-the-middle between the identified domain and the client browser.

    Computing device use restriction system

    公开(公告)号:US10997278B2

    公开(公告)日:2021-05-04

    申请号:US16235427

    申请日:2018-12-28

    Abstract: A device control method includes monitoring location of a first user device of a first user and receiving an indication of a location of a second user device. The method further includes monitoring use of the second user device and determining a first time of use on the second user device. The first time of use on the second user device is allocated to a use time of a second user based on the location of the first user device relative to the location of the second user device, and a functional component of a third user device of the second user is disabled based at least on the use time of the second user.

    Normalizing entry point instructions in executable program files

    公开(公告)号:US10909243B2

    公开(公告)日:2021-02-02

    申请号:US16022587

    申请日:2018-06-28

    Abstract: Systems and methods for normalizing entry point instructions include receiving a scope of instructions starting at an entry point of executable code. For each instruction in the scope of instructions, a determination is made if the instruction performs an ineffective operation or if the instruction, in combination with another instruction, renders either or both instructions ineffective. Ineffective instructions are filtered such that they do not appear in an output buffer.

    APPLICATION MONITORING AND DEVICE RESTRICTION SYSTEM AND METHOD

    公开(公告)号:US20210026978A1

    公开(公告)日:2021-01-28

    申请号:US16519556

    申请日:2019-07-23

    Abstract: A method of controlling use of network-connectable devices is provided. First network requests from a first user device executing a first operating system are monitored, and applications operating in the foreground on the first user device during the first network requests are monitored. A model is trained based on the first network requests and based on the applications respectively operating in the foreground on the first user device during the first network requests. Second network requests from a second user device executing a second operating system are monitored, and the model is applied to the second network requests from the second user device to determine a particular application operating in the foreground on the second user device. A function of the second user device is restricted based on the determining of the particular application operating in the foreground on the second user device.

    Detecting malware with hash-based fingerprints

    公开(公告)号:US10678921B2

    公开(公告)日:2020-06-09

    申请号:US15721244

    申请日:2017-09-29

    Abstract: Detecting malware includes monitoring an event stream for an executable program, where the event stream includes a plurality of events such as API call events. A first plurality of hash values is determined for the event stream. In response to an occurrence of a trigger event in the event stream, the first plurality of hash values for the event stream can be compared with a second plurality of hash values that represents an event stream for a known malware executable. A determination can be made if a behavior represented by the first plurality of hash values is a permitted behavior based on the comparison.

    Mobile location security system
    180.
    发明授权

    公开(公告)号:US10582336B2

    公开(公告)日:2020-03-03

    申请号:US16451943

    申请日:2019-06-25

    Inventor: Juyong Do

    Abstract: A system and method is provided for sharing mobile device location information. The method includes receiving signals by a mobile device and determining by the mobile device a first location of the mobile device at a first time based on the signals received by the mobile device. Time data is accessed by the mobile device and the mobile device determines based on the time data that the first time is in a first time window. The first location is transmitted to a particular user device at least responsive to the first time being in the first time window. The mobile device determines a second location of the mobile device at a second time based on the signals received by the mobile device. A first error is applied to the second location at least responsive to the determining of the second location at the second time, and the second location is transmitted including the first error to the particular user device.

Patent Agency Ranking