System and method for determining device proximity

    公开(公告)号:US10574665B2

    公开(公告)日:2020-02-25

    申请号:US15716389

    申请日:2017-09-26

    Abstract: A computing device can initiate a pairing operation with mobile computing device. The computing device encodes a pairing secret into a displayable code for presentation. The size of the displayable code can be determined in accordance with a threshold distance and display parameters. The mobile computing device is positioned such that an image of the displayable code substantially fills a boundary whose size is determined according to a desired threshold distance, a focal length, and parameters of a sensor chip. The displayable code is decoded to reveal the pairing secret to the mobile computing device. The pairing secret is used to complete the pairing process with the computing device. Once pairing has been completed, the computing device can measure a signal strength between the computing device and the mobile computing device. The signal strength can be stored to be used for later authorization purposes.

    Method and system for improving network security

    公开(公告)号:US10511602B2

    公开(公告)日:2019-12-17

    申请号:US15604206

    申请日:2017-05-24

    Abstract: Methods and systems for securing a network including IoT devices are provided. A networking device system can regulate the ability of IoT devices to communicate with their corresponding cloud servers over the Internet, for example, by allowing a device to connect to its associated cloud servers when a user (e.g., an authorized user) requests to use the device. The system can communicate (e.g., directly) with users outside of the network through an app and/or a software development kit installed on user client device(s), where communications received from the app or kit (e.g., to access one or more IoT devices on the network) can be presumed to originate from authorized users.

    Mobile device location anomaly detection based on non-location information

    公开(公告)号:US10448356B1

    公开(公告)日:2019-10-15

    申请号:US16370958

    申请日:2019-03-30

    Abstract: A location anomaly for a mobile device can be detected using non-location information from the mobile device. The non-location information does not include data from a location based device, such as a GPS. A probabilistic model is created using historical non-location information accumulated from the mobile device. Current non-location data is compared with the probabilistic model to determine a probability associated with the current non-location information. If the probability is less than a predetermined or configurable threshold, a location anomaly is detected. A notification of the location anomaly may be displayed and/or transmitted in response to detecting the location anomaly.

    Systems and methods for inference of malware labels in a graph database

    公开(公告)号:US10437995B2

    公开(公告)日:2019-10-08

    申请号:US15474007

    申请日:2017-03-30

    Abstract: Systems and methods are described which integrate file properties that in conventional systems has been considered weaker evidence of malware and analyzes the information to produce reliable results. Properties such as file paths, file names, source domains, IP protocol ASNs, section checksums, digital signatures that are not always present and not always reliable can be integrated into the classification process using a graph. A 1-neighborhood of object values in the graph may be created and analyzed to suggest a malware family label based on files having similar properties.

    Detection of malware in derived pattern space

    公开(公告)号:US10200391B2

    公开(公告)日:2019-02-05

    申请号:US15275039

    申请日:2016-09-23

    Abstract: Systems and methods analyze input files to automatically determine malware signatures. A set of input files known to contain a particular type of malware can be provided to a file analyzer. The file analyzer can analyze the file using a sliding window to create vectors from values that are provided by multiple filters that process each window. The vectors created for a file define a response matrix. The response matrices for a set of input files can be analyzed by a classifier to determine useful vector components that can define a signature for the malware.

    Identification of mislabeled samples via phantom nodes in label propagation

    公开(公告)号:US10198576B2

    公开(公告)日:2019-02-05

    申请号:US15374865

    申请日:2016-12-09

    Inventor: Martin Vejmelka

    Abstract: Systems and method identify potentially mislabeled file samples. A graph is created from a plurality of sample files. The graph includes nodes associated with the sample files and behavior nodes associated with behavior signatures. Phantom nodes are created in the graph for those sample files having a known label. During a label propagation operation, a node receives data indicating a label distribution of a neighbor node in the graph. In response to determining that the current label for the node is known, a neighborhood opinion is determined for the associated phantom node, based at least in part on the label distribution of the neighboring nodes. After the label propagation operation has completed, differences between the neighborhood opinion and the current label distribution for nodes are determined. If the difference exceeds a threshold, then the current label may be incorrect.

    Method for regulating usage of a browser store for a web browser featuring tabbed web page viewing based on browser activity

    公开(公告)号:US10019533B2

    公开(公告)日:2018-07-10

    申请号:US14718901

    申请日:2015-05-21

    CPC classification number: G06F16/9577 G06F16/9535 G06F16/957 G06F16/986

    Abstract: Methods and systems for administering a browser store for computing device web browser applications, particularly browsers featuring tabbed viewing of web pages. A qualifying trigger event, such as a change in the current active tab of the browser, or a navigation to a URL in the active tab, is detected by an exemplary system. The system, having been monitoring user interaction with the browser's tabs, regulates the browser store such that, upon detecting a trigger event, only data (e.g., cookies) pertaining to the web site whose web page is presently displayed in the browser's active tab is retained. Any other data unrelated to the web site is copied to a virtual memory for future reference and purged from the browser store. Additionally, any data pertaining to the web site that may have been previously transferred to the virtual memory is retrieved therefrom and relocated to the browser store. Moreover, any such data retrieved from the virtual memory that require updating, e.g., upon request or instruction by the site's web server, is updated or replaced as appropriate.

Patent Agency Ranking