DYNAMIC BINARY TRANSLATION AND INSTRUMENTATION WITH POSTPONED ATTACHMENT TO RUNNING NATIVE THREADS
    191.
    发明申请
    DYNAMIC BINARY TRANSLATION AND INSTRUMENTATION WITH POSTPONED ATTACHMENT TO RUNNING NATIVE THREADS 审中-公开
    动态二进制翻译和仪器与运行中的内螺纹连接

    公开(公告)号:US20160378640A1

    公开(公告)日:2016-12-29

    申请号:US15192411

    申请日:2016-06-24

    Inventor: Martin Hron

    Abstract: Dynamic binary instrumentation (DBI) or dynamic binary translation (DBT) of an examined process can be postponed until a point of interest is reached. Portions of the examined process can be run in native mode until the point of interest is reached. Upon reaching the point of interest, DBI and/or DBT can be performed.

    Abstract translation: 检查过程的动态二进制检测(DBI)或动态二进制转换(DBT)可以推迟到达到感兴趣的点。 所检查过程的部分可以以纯模式运行,直到达到兴趣点。 达到兴趣点后,可以执行DBI和/或DBT。

    INJECTING CREDENTIALS INTO WEB BROWSER REQUESTS
    192.
    发明申请
    INJECTING CREDENTIALS INTO WEB BROWSER REQUESTS 审中-公开
    将注册信息注入网络浏览器请求

    公开(公告)号:US20160373420A1

    公开(公告)日:2016-12-22

    申请号:US15186177

    申请日:2016-06-17

    Inventor: Petr Dvorák

    CPC classification number: H04L63/062 G06F21/34 H04L63/083 H04L63/168

    Abstract: A password manager injects credentials into a web browser request. A user can browse to a form provided by a server that includes a password field. A plug-in requests a password for the field from a password manager. The actual password is not provided to the plug-in or the browser. The password manager provides a proxy password that is not the actual password for the field. A request interceptor in a separate process from the browser intercepts the completed request as it is sent to the server and replaces the proxy password with the actual password.

    Abstract translation: 密码管理器将凭据注入到Web浏览器请求中。 用户可以浏览包含密码字段的服务器提供的表单。 插件从密码管理器请求该字段的密码。 实际的密码未提供给插件或浏览器。 密码管理器提供的代理密码不是该字段的实际密码。 来自浏览器的单独进程中的请求拦截器会在完成的请求发送到服务器时拦截完成的请求,并使用实际的密码替换代理密码。

    AUTHENTICATION AND SECURE COMMUNICATION WITH APPLICATION EXTENSIONS
    193.
    发明申请
    AUTHENTICATION AND SECURE COMMUNICATION WITH APPLICATION EXTENSIONS 审中-公开
    应用扩展的认证和安全通信

    公开(公告)号:US20160364565A1

    公开(公告)日:2016-12-15

    申请号:US15179423

    申请日:2016-06-10

    CPC classification number: G06F21/44 G06F21/602 G06F21/606 G06F21/62

    Abstract: Systems and methods authenticate with application extensions. An application extension requests a token from a local application. The local application generates a token and either inserts the token into a protected storage accessible only by the application extension being run by the current user or returns the token back to the application extension after being confirmed by the legitimate user. The application extension uses the token to authenticate itself with the local application.

    Abstract translation: 系统和方法使用应用程序扩展进行身份验证。 应用程序扩展从本地应用程序请求令牌。 本地应用程序生成令牌,并将令牌插入受保护的存储,只能由当前用户正在运行的应用程序扩展,或者在合法用户确认之后将令牌返回到应用程序扩展。 应用程序扩展使用令牌与本地应用程序进行身份验证。

    LENGTH OF THE LONGEST COMMON SUBSEQUENCE ALGORITHM OPTIMIZATION
    194.
    发明申请
    LENGTH OF THE LONGEST COMMON SUBSEQUENCE ALGORITHM OPTIMIZATION 审中-公开
    最长常规随机算法优化的长度

    公开(公告)号:US20160364457A1

    公开(公告)日:2016-12-15

    申请号:US15178235

    申请日:2016-06-09

    Inventor: Antonín Kríz

    CPC classification number: G06F16/90348

    Abstract: Systems and methods perform various optimizations of an LLCS algorithm for use in determining if a set of input sequences are similar to a query sequence. The optimizations include filtering out sequence from the set of input sequences where the estimated similarity of the sequence with the query sequence is below a threshold value. The remaining sequences can then be provided to an LLCS algorithm where the output of the LLCS algorithm is used in a similarity function to determine an actual similarity of an input sequence with a query sequence.

    Abstract translation: 系统和方法执行LLCS算法的各种优化,以用于确定一组输入序列是否类似于查询序列。 优化包括从输入序列集合滤除序列,其中序列与查询序列的估计相似度低于阈值。 然后可以将剩余的序列提供给LLCS算法,其中在相似性函数中使用LLCS算法的输出来确定输入序列与查询序列的实际相似性。

    REBOOTING TO A UEFI APPLICATION FROM A UEFI SUPPORTED SYSTEM
    195.
    发明申请
    REBOOTING TO A UEFI APPLICATION FROM A UEFI SUPPORTED SYSTEM 有权
    从UEFI支持的系统重新应用UEFI应用程序

    公开(公告)号:US20160210163A1

    公开(公告)日:2016-07-21

    申请号:US14996788

    申请日:2016-01-15

    Inventor: Aaron McSorely

    CPC classification number: G06F9/44505 G06F9/4401 G06F9/4406

    Abstract: Systems and methods for rebooting a UEFI based system, for example from Microsoft Windows, to any UEFI application, include modifying boot configuration data by inserting a boot entry into the UEFI firmware boot manager to cause execution of a non-Windows UEFI application.

    Abstract translation: 用于将基于UEFI的系统(例如从Microsoft Windows)重新启动到任何UEFI应用的系统和方法包括通过将引导条目插入UEFI固件引导管理器来引起非Windows UEFI应用的执行来修改引导配置数据。

    Detecting malicious URL redirection chains

    公开(公告)号:US12301620B2

    公开(公告)日:2025-05-13

    申请号:US17653379

    申请日:2022-03-03

    Abstract: Malicious redirects in a redirect chain as a result of loading a web address are detected and blocked. A suspicion score is determined for a subject redirection domain based at least in part on the subject redirection domain's web address, and a rate of occurrence of the subject redirection domain in redirect chains leading to a malicious landing domain is calculated. Loading the subject redirection domain is blocked if the suspicion score exceeds a suspicion threshold or the rate of occurrence of the subject redirection domain exceeds a rate of occurrence threshold.

    SYSTEMS AND METHODS FOR DETECTING AND MITIGATING THREATS IN ELECTRONIC MESSAGES

    公开(公告)号:US20250097263A1

    公开(公告)日:2025-03-20

    申请号:US18469117

    申请日:2023-09-18

    Abstract: Systems and methods enable a notification based on determining a particular electronic message is associated with a particular cluster of electronic messages. A plurality of electronic messages from a first plurality of accounts directed to a second plurality of accounts over a network are received. The plurality of electronic messages are compared to determine a plurality of clusters of electronic messages. A particular electronic message is received from a first particular account directed to a second particular account. The particular electronic message is compared to the plurality of clusters of electronic messages to determine that the particular electronic message is associated with a particular cluster of the plurality of clusters of electronic messages. A notification is provided based on the determining that the particular electronic message is associated with the particular cluster of the plurality of clusters of electronic messages.

    DYNAMIC ANALYSIS FOR MALICIOUS BROWSER EXTENSIONS

    公开(公告)号:US20250094580A1

    公开(公告)日:2025-03-20

    申请号:US18467444

    申请日:2023-09-14

    Abstract: The behavior of browser extensions when installed and operating in a browser environment is monitored, such as by observing changes to a web page with and without the browser extensions installed. Document Object Model (DOM) changes to the web page, such as scripts that only run when an extension is installed, or other web content that changes as a result of differences in a web page with and without the browser extension installed are observed. These differences may be attributed to the browser extension, and the changed or added elements may be inspected for malicious content or behavior. If malicious behavior is found in the different content, the content and/or the browser extension may be flagged as malicious behavior and a signature used to identify the malicious browser extension in future applications.

    SYSTEMS AND METHODS FOR VERIFYING DIGITAL DOCUMENTS

    公开(公告)号:US20250028863A1

    公开(公告)日:2025-01-23

    申请号:US18356439

    申请日:2023-07-21

    Abstract: A system and method are provided by which an electronic address associated with a user is monitored. Based on the monitoring, an electronic message is detected including a digital document. A cryptographic function is applied to the digital document to generate a hash which is rendered accessible at a network location. An identification of the network location of the hash is transmitted to a first computing system associated with the user.

    System and method for data compression and decompression

    公开(公告)号:US12147396B2

    公开(公告)日:2024-11-19

    申请号:US17569071

    申请日:2022-01-05

    Abstract: A data processing method in the form of a data compression method is provided in which a plurality of integers are accessed. Each of the plurality of integers is split to generate a first plurality of numbers respectively paired with a second plurality of numbers. A first tuple is generated based on the first plurality of numbers. A second tuple is generated based on the second plurality of numbers and the first plurality of numbers. The first tuple and the second tuple are stored. A system and computer readable medium enabling the data processing method are further provided.

Patent Agency Ranking