Enabling wireless security measures based on wireless access point attributes

    公开(公告)号:US10568017B2

    公开(公告)日:2020-02-18

    申请号:US16370831

    申请日:2019-03-29

    Abstract: A processor-implemented method including scanning wirelessly by a plurality of mobile devices and selecting a plurality of wireless access points based on the scanning by the plurality of mobile devices. Particular attributes of the plurality of wireless access points are determined, and the particular attributes of the plurality of wireless access points are compared. A particular set of the plurality of wireless access points are grouped based on the comparing of the particular attributes, and a particular geographic location is assigned to the particular set of the plurality of wireless access points. A particular security protocol is assigned to the particular geographic location based on the particular attributes of the particular set of the plurality of wireless access points. A particular mobile device is determined to be positioned within a particular distance of the particular geographic location, and wireless communication of the particular mobile device is restricted.

    Enabling Wireless Security Measures Based on Wireless Access Point Attributes

    公开(公告)号:US20190306781A1

    公开(公告)日:2019-10-03

    申请号:US16370831

    申请日:2019-03-29

    Abstract: A processor-implemented method including scanning wirelessly by a plurality of mobile devices and selecting a plurality of wireless access points based on the scanning by the plurality of mobile devices. Particular attributes of the plurality of wireless access points are determined, and the particular attributes of the plurality of wireless access points are compared. A particular set of the plurality of wireless access points are grouped based on the comparing of the particular attributes, and a particular geographic location is assigned to the particular set of the plurality of wireless access points. A particular security protocol is assigned to the particular geographic location based on the particular attributes of the particular set of the plurality of wireless access points. A particular mobile device is determined to be positioned within a particular distance of the particular geographic location, and wireless communication of the particular mobile device is restricted.

    Creating rules describing malicious files based on file properties

    公开(公告)号:US10255436B2

    公开(公告)日:2019-04-09

    申请号:US15275179

    申请日:2016-09-23

    Abstract: Systems and methods automatically determine rules for detecting malware. A fingerprint representing a file is received. A set of nearest neighbor fingerprints from at least a set of malware fingerprints that are nearest neighbors are determined. The set of malware fingerprints are analyzed to determine a representative fingerprint. A malicious file detection rule is generated based, at least in part, on the representative fingerprint.

    USER CONSENT FOR HYBRID LOCATION SHARING SERVICES

    公开(公告)号:US20190007790A1

    公开(公告)日:2019-01-03

    申请号:US16024606

    申请日:2018-06-29

    CPC classification number: H04W4/02 H04L67/18

    Abstract: A hybrid location service maintains a user state for each of a plurality of mobile devices communicably coupled to the hybrid location service via one or more networks. The hybrid location service can receive a request for a location of a mobile device. In response, the hybrid location service can determine a consent source. The consent source can include the mobile device or a network operator of the network used by the mobile device. The hybrid location service determines a response to the request for the location of the mobile device based, at least in part, on a user state of the mobile device and a user consent obtained from the consent source.

    NORMALIZING ENTRY POINT INSTRUCTIONS IN EXECUTABLE PROGRAM FILES

    公开(公告)号:US20190005238A1

    公开(公告)日:2019-01-03

    申请号:US16022587

    申请日:2018-06-28

    Abstract: Systems and methods for normalizing entry point instructions include receiving a scope of instructions starting at an entry point of executable code. For each instruction in the scope of instructions, a determination is made if the instruction performs an ineffective operation or if the instruction, in combination with another instruction, renders either or both instructions ineffective. Ineffective instructions are filtered such that they do not appear in an output buffer.

    MALWARE LABEL INFERENCE AND VISUALIZATION IN A LARGE MULTIGRAPH

    公开(公告)号:US20180293330A1

    公开(公告)日:2018-10-11

    申请号:US15941668

    申请日:2018-03-30

    Inventor: Peter Kovác

    Abstract: Analyzing a large number of files to identify malicious software including evaluating a multigraph including determining a graph having a plurality of nodes, including a source node and target nodes from a data set and merging the graph into a multigraph in response to a node score above a threshold level, for each target node; determining one or more specificity indexes for target node and determining a node score for the target node based, at least in part, on a specificity index

    DETECTING MALICIOUS SCRIPTS
    40.
    发明申请

    公开(公告)号:US20180096148A1

    公开(公告)日:2018-04-05

    申请号:US15719401

    申请日:2017-09-28

    Inventor: Jiri Sejtko

    CPC classification number: G06F21/566 G06F21/562 G06F2221/034

    Abstract: Systems and methods normalize an executable script. A file can be received that potentially contains an executable script. The characters in the file are translated to a single case (either upper case or lower case). Duplicate whitespace can be removed. A script is identified within the file. Tokens in the script are processed to create normalized output. The normalized output can include tokens that are retained keywords, control flow characters or data characters from the script file.

Patent Agency Ranking